Closed mend-for-github-com[bot] closed 3 years ago
The browser package manager
Library home page: https://registry.npmjs.org/bower/-/bower-1.8.0.tgz
Path to dependency file: loggly-jslogger/package.json
Path to vulnerable library: loggly-jslogger/node_modules/bower/package.json
Dependency Hierarchy: - :x: **bower-1.8.0.tgz** (Vulnerable Library)
Found in HEAD commit: 3247b5841e5a8923baf2e98a1914570b38eadd97
Found in base branch: master
Bower before 1.8.8 has a path traversal vulnerability permitting file write in arbitrary locations via install command, which allows attackers to write arbitrary files when a malicious package is extracted.
Publish Date: 2019-09-13
URL: CVE-2019-5484
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5484
Release Date: 2019-09-13
Fix Resolution: 1.8.8
The vulnerability was fixed in this PR https://github.com/loggly/loggly-jslogger/pull/80/files
CVE-2019-5484 - High Severity Vulnerability
Vulnerable Library - bower-1.8.0.tgz
The browser package manager
Library home page: https://registry.npmjs.org/bower/-/bower-1.8.0.tgz
Path to dependency file: loggly-jslogger/package.json
Path to vulnerable library: loggly-jslogger/node_modules/bower/package.json
Dependency Hierarchy: - :x: **bower-1.8.0.tgz** (Vulnerable Library)
Found in HEAD commit: 3247b5841e5a8923baf2e98a1914570b38eadd97
Found in base branch: master
Vulnerability Details
Bower before 1.8.8 has a path traversal vulnerability permitting file write in arbitrary locations via install command, which allows attackers to write arbitrary files when a malicious package is extracted.
Publish Date: 2019-09-13
URL: CVE-2019-5484
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5484
Release Date: 2019-09-13
Fix Resolution: 1.8.8