This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
Vulnerable Library - gulp-4.0.0.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/copy-props/package.json
Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc
Vulnerabilities
Details
CVE-2020-28503
### Vulnerable Library - copy-props-2.0.4.tgzCopy properties deeply between two objects.
Library home page: https://registry.npmjs.org/copy-props/-/copy-props-2.0.4.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/copy-props/package.json
Dependency Hierarchy: - gulp-4.0.0.tgz (Root Library) - gulp-cli-2.0.1.tgz - :x: **copy-props-2.0.4.tgz** (Vulnerable Library)
Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc
Found in base branch: master
### Vulnerability DetailsThe package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
Publish Date: 2021-03-23
URL: CVE-2020-28503
### CVSS 3 Score Details (9.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2021-03-23
Fix Resolution (copy-props): 2.0.5
Direct dependency fix Resolution (gulp): 4.0.1
In order to enable automatic remediation, please create workflow rules
CVE-2020-7788
### Vulnerable Library - ini-1.3.5.tgzAn ini encoder/decoder for node
Library home page: https://registry.npmjs.org/ini/-/ini-1.3.5.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/ini/package.json
Dependency Hierarchy: - gulp-4.0.0.tgz (Root Library) - gulp-cli-2.0.1.tgz - liftoff-2.5.0.tgz - findup-sync-2.0.0.tgz - resolve-dir-1.0.1.tgz - global-modules-1.0.0.tgz - global-prefix-1.0.2.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library)
Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc
Found in base branch: master
### Vulnerability DetailsThis affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
Publish Date: 2020-12-11
URL: CVE-2020-7788
### CVSS 3 Score Details (9.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
Release Date: 2020-12-11
Fix Resolution (ini): 1.3.6
Direct dependency fix Resolution (gulp): 4.0.1
In order to enable automatic remediation, please create workflow rules
CVE-2021-23343
### Vulnerable Library - path-parse-1.0.6.tgzNode.js path.parse() ponyfill
Library home page: https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/path-parse/package.json
Dependency Hierarchy: - gulp-4.0.0.tgz (Root Library) - gulp-cli-2.0.1.tgz - liftoff-2.5.0.tgz - resolve-1.9.0.tgz - :x: **path-parse-1.0.6.tgz** (Vulnerable Library)
Found in HEAD commit: fbca9ba603e60373d9b92714517262109b92e2bc
Found in base branch: master
### Vulnerability DetailsAll versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
Publish Date: 2021-05-04
URL: CVE-2021-23343
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2021-05-04
Fix Resolution (path-parse): 1.0.7
Direct dependency fix Resolution (gulp): 4.0.1
In order to enable automatic remediation, please create workflow rules
In order to enable automatic remediation for this issue, please create workflow rules