Offensive-Sec / test-react

MIT License
0 stars 0 forks source link

browserify-13.3.0.tgz: 2 vulnerabilities (highest severity is: 7.5) #7

Open mend-bolt-for-github[bot] opened 12 months ago

mend-bolt-for-github[bot] commented 12 months ago
Vulnerable Library - browserify-13.3.0.tgz

Path to dependency file: /react-main/fixtures/packaging/browserify/dev/package.json

Path to vulnerable library: /react-main/fixtures/packaging/browserify/prod/package.json,/react-main/fixtures/packaging/browserify/dev/package.json,/fixtures/packaging/browserify/prod/package.json,/fixtures/packaging/browserify/dev/package.json

Found in HEAD commit: f7127272769002f98a4adb752b5ccfbffdc43a03

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (browserify version) Remediation Possible**
CVE-2018-16472 High 7.5 cached-path-relative-1.0.1.tgz Transitive 14.0.0
CVE-2021-23518 High 7.3 cached-path-relative-1.0.1.tgz Transitive 14.0.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2018-16472 ### Vulnerable Library - cached-path-relative-1.0.1.tgz

Memoize the results of the path.relative function

Library home page: https://registry.npmjs.org/cached-path-relative/-/cached-path-relative-1.0.1.tgz

Path to dependency file: /react-main/fixtures/packaging/browserify/prod/package.json

Path to vulnerable library: /react-main/fixtures/packaging/browserify/prod/package.json,/react-main/fixtures/packaging/browserify/dev/package.json,/fixtures/packaging/browserify/prod/package.json,/fixtures/packaging/browserify/dev/package.json

Dependency Hierarchy: - browserify-13.3.0.tgz (Root Library) - :x: **cached-path-relative-1.0.1.tgz** (Vulnerable Library)

Found in HEAD commit: f7127272769002f98a4adb752b5ccfbffdc43a03

Found in base branch: main

### Vulnerability Details

A prototype pollution attack in cached-path-relative versions <=1.0.1 allows an attacker to inject properties on Object.prototype which are then inherited by all the JS objects through the prototype chain causing a DoS attack. Mend Note: Converted from WS-2018-0215, on 2022-11-08.

Publish Date: 2018-11-06

URL: CVE-2018-16472

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16472

Release Date: 2018-11-06

Fix Resolution (cached-path-relative): 1.0.2

Direct dependency fix Resolution (browserify): 14.0.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2021-23518 ### Vulnerable Library - cached-path-relative-1.0.1.tgz

Memoize the results of the path.relative function

Library home page: https://registry.npmjs.org/cached-path-relative/-/cached-path-relative-1.0.1.tgz

Path to dependency file: /react-main/fixtures/packaging/browserify/prod/package.json

Path to vulnerable library: /react-main/fixtures/packaging/browserify/prod/package.json,/react-main/fixtures/packaging/browserify/dev/package.json,/fixtures/packaging/browserify/prod/package.json,/fixtures/packaging/browserify/dev/package.json

Dependency Hierarchy: - browserify-13.3.0.tgz (Root Library) - :x: **cached-path-relative-1.0.1.tgz** (Vulnerable Library)

Found in HEAD commit: f7127272769002f98a4adb752b5ccfbffdc43a03

Found in base branch: main

### Vulnerability Details

The package cached-path-relative before 1.1.0 are vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573

Publish Date: 2022-01-21

URL: CVE-2021-23518

### CVSS 3 Score Details (7.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23518

Release Date: 2022-01-21

Fix Resolution (cached-path-relative): 1.1.0

Direct dependency fix Resolution (browserify): 14.0.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)