nekottyo / tatsuya_fujiwara

GAS script for Slack Bot
MIT License
0 stars 1 forks source link

CVE-2020-7720 (High) detected in node-forge-0.9.2.tgz #50

Open mend-bolt-for-github[bot] opened 4 years ago

mend-bolt-for-github[bot] commented 4 years ago

CVE-2020-7720 - High Severity Vulnerability

Vulnerable Library - node-forge-0.9.2.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.9.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/node-forge/package.json

Dependency Hierarchy: - clasp-2.3.0.tgz (Root Library) - google-auth-library-5.10.1.tgz - gtoken-4.1.4.tgz - google-p12-pem-2.0.4.tgz - :x: **node-forge-0.9.2.tgz** (Vulnerable Library)

Found in HEAD commit: 0f7f7457f0275e4a3f942b76dfa5448784696453

Found in base branch: master

Vulnerability Details

The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.

Publish Date: 2020-09-01

URL: CVE-2020-7720

CVSS 3 Score Details (7.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-09-01

Fix Resolution (node-forge): 0.10.0

Direct dependency fix Resolution (@google/clasp): 2.3.1


Step up your Open Source Security Game with Mend here