*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
robinweser fast-loops v1.1.3 was discovered to contain a prototype pollution via the function objectMergeDeep. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
Vulnerable Library - react-northstar-0.52.1.tgz
Path to dependency file: /Source/CompanyCommunicator/ClientApp/package.json
Path to vulnerable library: /Source/CompanyCommunicator/ClientApp/node_modules/fast-loops/package.json
Vulnerabilities
Unreachable
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-39008
### Vulnerable Library - fast-loops-1.1.3.tgzSmall, performant & immutable iteration utilities for Arrays and Objects
Library home page: https://registry.npmjs.org/fast-loops/-/fast-loops-1.1.3.tgz
Path to dependency file: /Source/CompanyCommunicator/ClientApp/package.json
Path to vulnerable library: /Source/CompanyCommunicator/ClientApp/node_modules/fast-loops/package.json
Dependency Hierarchy: - react-northstar-0.52.1.tgz (Root Library) - react-bindings-0.52.1.tgz - react-northstar-fela-renderer-0.52.1.tgz - react-fela-10.8.2.tgz - fela-bindings-10.8.2.tgz - :x: **fast-loops-1.1.3.tgz** (Vulnerable Library)
Found in base branch: master
### Reachability AnalysisThe vulnerable code is unreachable
### Vulnerability Detailsrobinweser fast-loops v1.1.3 was discovered to contain a prototype pollution via the function objectMergeDeep. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
Publish Date: 2024-07-01
URL: CVE-2024-39008
### CVSS 3 Score Details (10.0)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2024-07-01
Fix Resolution: fast-loops - 1.1.4