uniquelyparticular / shipengine-request

A Particularly minimal ShipEngine API request library for Node.
https://uniquelyparticular.com
MIT License
1 stars 1 forks source link

CVE-2019-16777 (Medium) detected in npm-6.9.0.tgz - autoclosed #83

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 4 years ago

CVE-2019-16777 - Medium Severity Vulnerability

Vulnerable Library - npm-6.9.0.tgz

a package manager for JavaScript

Library home page: https://registry.npmjs.org/npm/-/npm-6.9.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/npm/package.json

Dependency Hierarchy: - semantic-release-15.14.0.tgz (Root Library) - npm-5.1.7.tgz - :x: **npm-6.9.0.tgz** (Vulnerable Library)

Found in HEAD commit: 15587aaa22c58ec0b1877768dc8c7f1c43a47116

Found in base branch: develop

Vulnerability Details

Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.

Publish Date: 2019-12-13

URL: CVE-2019-16777

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli

Release Date: 2019-12-13

Fix Resolution (npm): 6.13.4

Direct dependency fix Resolution (semantic-release): 16.0.0


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.