vasind / try-ember

Ember related best practises and its TDD
MIT License
0 stars 0 forks source link

WS-2022-0363 (High) detected in ember-source-3.7.3.tgz #277

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 2 years ago

WS-2022-0363 - High Severity Vulnerability

Vulnerable Library - ember-source-3.7.3.tgz

A JavaScript framework for creating ambitious web applications

Library home page: https://registry.npmjs.org/ember-source/-/ember-source-3.7.3.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/ember-source/package.json

Dependency Hierarchy: - :x: **ember-source-3.7.3.tgz** (Vulnerable Library)

Vulnerability Details

A prototype pollution vulnerability exists in Ember.js prior to 3.24.7, 3.28.10, 4.4.4, 4.8.1, and 4.9.0-beta.3. An attacker can set paths like __proto__.__proto__.isAdmin to mutate unexpected objects, including Javascript intrinsics like the global Object. Depending on the specifics of your application, this can be leveraged as part of an attack to steal user credentials.

Publish Date: 2022-11-03

URL: WS-2022-0363

CVSS 3 Score Details (9.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://blog.emberjs.com/ember-4-8-1-released/

Release Date: 2022-11-03

Fix Resolution: 3.24.7


Step up your Open Source Security Game with Mend here

github-actions[bot] commented 1 year ago

Stale issue message