vk-org / test-test-kvv-org

0 stars 0 forks source link

CVE-2019-10768 (High) detected in angular-1.4.2.min.js #22

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2019-10768 - High Severity Vulnerability

Vulnerable Library - angular-1.4.2.min.js

AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.

Library home page: https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.4.2/angular.min.js

Path to dependency file: /node_modules/autocomplete.js/test/playground_angular.html

Path to vulnerable library: /node_modules/autocomplete.js/test/playground_angular.html,/node_modules/autocomplete.js/examples/basic_angular.html

Dependency Hierarchy: - :x: **angular-1.4.2.min.js** (Vulnerable Library)

Found in HEAD commit: 56299047699038965e43d0686667f3f07749ad6a

Found in base branch: main

Vulnerability Details

In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload. WhiteSource Note: After conducting further research, WhiteSource has determined that versions 1.4.0-beta.6 before 1.7.9 of angular are vulnerable to CVE-2019-10768.

Publish Date: 2019-11-19

URL: CVE-2019-10768

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/angular/angular.js/commit/726f49dcf6c23106ddaf5cfd5e2e592841db743a

Release Date: 2019-11-19

Fix Resolution: angularjs - 1.7.8,1.7.8.1


Step up your Open Source Security Game with WhiteSource here