snowdensb / CSPBR

CSP Bit Ranger Solution
0 stars 0 forks source link

CVE-2023-46308 (Critical) detected in plotly-1.41.3.min.js #33

Open mend-for-github-com[bot] opened 2 weeks ago

mend-for-github-com[bot] commented 2 weeks ago

CVE-2023-46308 - Critical Severity Vulnerability

Vulnerable Library - plotly-1.41.3.min.js

The open source javascript graphing library that powers plotly

Library home page: https://cdnjs.cloudflare.com/ajax/libs/plotly.js/1.41.3/plotly.min.js

Path to vulnerable library: /public/plotly/plotly-latest.min.js

Dependency Hierarchy: - :x: **plotly-1.41.3.min.js** (Vulnerable Library)

Found in HEAD commit: 86334f0df744f6cfa35a438987cbb4d18d65b5c2

Found in base branch: master

Vulnerability Details

In Plotly plotly.js before 2.25.2, plot API calls have a risk of __proto__ being polluted in expandObjectPaths or nestedProperty.

Publish Date: 2024-01-03

URL: CVE-2023-46308

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2024-01-03

Fix Resolution: plotly.js - 2.25.2