Skip to content

jsonpath has Arbitrary Code Injection via Unsafe Evaluation of JSON Path Expressions security vulnerabilities issue #1073

@devendranegi121

Description

@devendranegi121

Description Arbitrary Code Injection (Remote Code Execution & XSS):
A critical security vulnerability affects all versions of the jsonpath package. The library relies on the static-eval module to evaluate JSON Path expressions but fails to properly sanitize or sandbox the input.
This allows an attacker to inject arbitrary JavaScript code into the JSON Path expression. When the library evaluates this expression, the malicious code is executed.

Node.js Environments: This leads to Remote Code Execution (RCE), allowing an attacker to compromise the server.

Browser Environments: This leads to Cross-Site Scripting (XSS), allowing an attacker to hijack user sessions or exfiltrate data.

Affected Methods:
The vulnerability triggers when untrusted data is passed to any method that evaluates a path, including:

jsonpath.query
jsonpath.nodes
jsonpath.paths
jsonpath.value
jsonpath.parent
jsonpath.apply

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions