spotfiresoftware / spotfire-wrapper

An Angular component packaged as custom elements that defined a new HTML element to display a Spotfire dashboard in a framework-agnostic way
BSD 3-Clause "New" or "Revised" License
9 stars 6 forks source link

CVE-2020-7720 (High) detected in node-forge-0.9.0.tgz - autoclosed #78

Closed mend-for-github-com[bot] closed 2 years ago

mend-for-github-com[bot] commented 4 years ago

CVE-2020-7720 - High Severity Vulnerability

Vulnerable Library - node-forge-0.9.0.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.9.0.tgz

Path to dependency file: /tmp/ws-scm/spotfire-wrapper/package.json

Path to vulnerable library: /tmp/ws-scm/spotfire-wrapper/node_modules/node-forge/package.json

Dependency Hierarchy: - build-angular-0.1000.6.tgz (Root Library) - webpack-dev-server-3.11.0.tgz - selfsigned-1.10.7.tgz - :x: **node-forge-0.9.0.tgz** (Vulnerable Library)

Vulnerability Details

All versions of package node-forge are vulnerable to Prototype Pollution via the util.setPath function.

Publish Date: 2020-07-21

URL: CVE-2020-7720

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

mend-for-github-com[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.