-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - to-0.2.6.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json,/node_modules/underscore/package.json
Found in HEAD commit: f226a628a7b7abed6620448aa669dd8e7c2d1abb
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (to version) | Remediation Possible** | |
|---|---|---|---|---|---|---|
| CVE-2021-44906 | 9.8 | minimist-0.0.10.tgz | Transitive | N/A* | ❌ | |
| CVE-2020-7598 | 5.6 | minimist-0.0.10.tgz | Transitive | N/A* | ❌ | |
| CVE-2021-23358 | 3.3 | underscore-1.9.2.tgz | Transitive | 0.2.7 | ✅ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-44906
Vulnerable Library - minimist-0.0.10.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json,/node_modules/minimist/package.json
Dependency Hierarchy:
- to-0.2.6.tgz (Root Library)
- optimist-0.6.1.tgz
- ❌ minimist-0.0.10.tgz (Vulnerable Library)
- optimist-0.6.1.tgz
Found in HEAD commit: f226a628a7b7abed6620448aa669dd8e7c2d1abb
Found in base branch: master
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-xvch-5gv4-984h
Release Date: 2022-03-17
Fix Resolution: minimist - 0.2.4,1.2.6
CVE-2020-7598
Vulnerable Library - minimist-0.0.10.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json,/node_modules/minimist/package.json
Dependency Hierarchy:
- to-0.2.6.tgz (Root Library)
- optimist-0.6.1.tgz
- ❌ minimist-0.0.10.tgz (Vulnerable Library)
- optimist-0.6.1.tgz
Found in HEAD commit: f226a628a7b7abed6620448aa669dd8e7c2d1abb
Found in base branch: master
Vulnerability Details
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "proto" payload.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2020-03-11
URL: CVE-2020-7598
CVSS 3 Score Details (5.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Release Date: 2020-03-11
Fix Resolution: minimist - 0.2.1,1.2.3
CVE-2021-23358
Vulnerable Library - underscore-1.9.2.tgz
JavaScript's functional programming helper library.
Library home page: https://registry.npmjs.org/underscore/-/underscore-1.9.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json,/node_modules/underscore/package.json
Dependency Hierarchy:
- to-0.2.6.tgz (Root Library)
- ❌ underscore-1.9.2.tgz (Vulnerable Library)
Found in HEAD commit: f226a628a7b7abed6620448aa669dd8e7c2d1abb
Found in base branch: master
Vulnerability Details
The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
Publish Date: 2021-03-29
URL: CVE-2021-23358
CVSS 3 Score Details (3.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358
Release Date: 2021-03-29
Fix Resolution (underscore): 1.12.1
Direct dependency fix Resolution (to): 0.2.7
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.