Open mend-bolt-for-github[bot] opened 4 years ago
JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.
Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.9.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/node-forge/package.json
Dependency Hierarchy: - clasp-2.3.0.tgz (Root Library) - google-auth-library-5.10.1.tgz - gtoken-4.1.4.tgz - google-p12-pem-2.0.4.tgz - :x: **node-forge-0.9.2.tgz** (Vulnerable Library)
Found in HEAD commit: 0f7f7457f0275e4a3f942b76dfa5448784696453
Found in base branch: master
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
Publish Date: 2020-09-01
URL: CVE-2020-7720
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
Type: Upgrade version
Release Date: 2020-09-01
Fix Resolution (node-forge): 0.10.0
Direct dependency fix Resolution (@google/clasp): 2.3.1
Step up your Open Source Security Game with Mend here
CVE-2020-7720 - High Severity Vulnerability
Vulnerable Library - node-forge-0.9.2.tgz
JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.
Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.9.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/node-forge/package.json
Dependency Hierarchy: - clasp-2.3.0.tgz (Root Library) - google-auth-library-5.10.1.tgz - gtoken-4.1.4.tgz - google-p12-pem-2.0.4.tgz - :x: **node-forge-0.9.2.tgz** (Vulnerable Library)
Found in HEAD commit: 0f7f7457f0275e4a3f942b76dfa5448784696453
Found in base branch: master
Vulnerability Details
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
Publish Date: 2020-09-01
URL: CVE-2020-7720
CVSS 3 Score Details (7.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2020-09-01
Fix Resolution (node-forge): 0.10.0
Direct dependency fix Resolution (@google/clasp): 2.3.1
Step up your Open Source Security Game with Mend here