Open mend-for-github-com[bot] opened 2 years ago
Extend nodejs util api, and it is light weight and simple
Library home page: https://registry.npmjs.org/utils-extend/-/utils-extend-1.0.8.tgz
Path to dependency file: /src/gwt/panmirror/src/editor/package.json
Path to vulnerable library: /src/gwt/panmirror/src/editor/node_modules/utils-extend/package.json
Dependency Hierarchy: - fuse-box-3.7.1.tgz (Root Library) - base64-img-1.0.4.tgz - ajax-request-1.2.3.tgz - :x: **utils-extend-1.0.8.tgz** (Vulnerable Library)
Found in HEAD commit: b3d036e0cb4bcb5dd4823827a94b172341b2b069
Found in base branch: main
Flaw in input validation in npm package utils-extend version 1.0.8 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using utils-extend.
Publish Date: 2020-04-03
URL: CVE-2020-8147
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
CVE-2020-8147 - High Severity Vulnerability
Vulnerable Library - utils-extend-1.0.8.tgz
Extend nodejs util api, and it is light weight and simple
Library home page: https://registry.npmjs.org/utils-extend/-/utils-extend-1.0.8.tgz
Path to dependency file: /src/gwt/panmirror/src/editor/package.json
Path to vulnerable library: /src/gwt/panmirror/src/editor/node_modules/utils-extend/package.json
Dependency Hierarchy: - fuse-box-3.7.1.tgz (Root Library) - base64-img-1.0.4.tgz - ajax-request-1.2.3.tgz - :x: **utils-extend-1.0.8.tgz** (Vulnerable Library)
Found in HEAD commit: b3d036e0cb4bcb5dd4823827a94b172341b2b069
Found in base branch: main
Vulnerability Details
Flaw in input validation in npm package utils-extend version 1.0.8 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using utils-extend.
Publish Date: 2020-04-03
URL: CVE-2020-8147
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.