Open mend-bolt-for-github[bot] opened 3 years ago
👋 Thanks for reporting!
Greetings! Sorry to say but this is a very old issue that is probably not getting as much attention as it deservers. We encourage you to check if this is still an issue in the latest release and if you find that this is still a problem, please feel free to open a new one.
CVE-2020-7608 - Medium Severity Vulnerability
Vulnerable Library - yargs-parser-2.4.1.tgz
the mighty option parser used by yargs
Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-2.4.1.tgz
Path to dependency file: java-patterns/package.json
Path to vulnerable library: java-patterns/node_modules/deploy-to-gh-pages/node_modules/yargs-parser/package.json
Dependency Hierarchy: - deploy-to-gh-pages-1.3.7.tgz (Root Library) - yargs-4.8.1.tgz - :x: **yargs-parser-2.4.1.tgz** (Vulnerable Library)
Found in HEAD commit: 8bad729c83be710b20cd3f2d4defd1f1f0ebb100
Found in base branch: master
Vulnerability Details
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
Publish Date: 2020-03-16
URL: CVE-2020-7608
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2
Release Date: 2020-06-05
Fix Resolution: 5.0.1;13.1.2;15.0.1;18.1.1
Step up your Open Source Security Game with WhiteSource here