gmright2 / DEFOLD_Gmright_INLINE

MIT License
0 stars 5 forks source link

CVE-2021-23518 (Critical) detected in cached-path-relative-1.0.1.tgz #169

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2021-23518 - Critical Severity Vulnerability

Vulnerable Library - cached-path-relative-1.0.1.tgz

Memoize the results of the path.relative function

Library home page: https://registry.npmjs.org/cached-path-relative/-/cached-path-relative-1.0.1.tgz

Path to dependency file: /Gmright/Milestones/Gmright-market/cordova-plugin-purchase-master/cordova-plugin-purchase-master/package.json

Path to vulnerable library: /Gmright/Milestones/Gmright-market/cordova-plugin-purchase-master/cordova-plugin-purchase-master/node_modules/cached-path-relative/package.json,/Gmright/Milestones/Gmright-market/cordova-plugin-purchase-master/cordova-plugin-purchase-master/node_modules/cached-path-relative/package.json

Dependency Hierarchy: - cordova-6.5.0.tgz (Root Library) - cordova-lib-6.5.0.tgz - cordova-js-4.2.1.tgz - browserify-13.3.0.tgz - :x: **cached-path-relative-1.0.1.tgz** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The package cached-path-relative before 1.1.0 are vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573

Publish Date: 2022-01-21

URL: CVE-2021-23518

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23518

Release Date: 2022-01-21

Fix Resolution (cached-path-relative): 1.1.0

Direct dependency fix Resolution (cordova): 6.5.1-nightly.2017.2.15.abe6b8f1


Step up your Open Source Security Game with Mend here