This repository has been archived by the owner on Feb 24, 2022. It is now read-only.
CVE-2020-7608 (Medium) detected in yargs-parser-9.0.2.tgz, yargs-parser-11.1.1.tgz #586
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2020-7608 - Medium Severity Vulnerability
Vulnerable Libraries - yargs-parser-9.0.2.tgz, yargs-parser-11.1.1.tgz
yargs-parser-9.0.2.tgz
the mighty option parser used by yargs
Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-9.0.2.tgz
Path to dependency file: /mig3-ui/package.json
Path to vulnerable library: /mig3-ui/node_modules/yargs-parser/package.json
Dependency Hierarchy:
yargs-parser-11.1.1.tgz
the mighty option parser used by yargs
Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-11.1.1.tgz
Path to dependency file: /mig3-ui/package.json
Path to vulnerable library: /mig3-ui/node_modules/webpack-dev-server/node_modules/yargs-parser/package.json
Dependency Hierarchy:
Vulnerability Details
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "proto" payload.
Publish Date: 2020-03-16
URL: CVE-2020-7608
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: yargs/yargs-parser@63810ca
Release Date: 2020-03-16
Fix Resolution (yargs-parser): 13.1.2
Direct dependency fix Resolution (@vue/cli-plugin-unit-jest): 4.0.0-alpha.0
Fix Resolution (yargs-parser): 13.1.2
Direct dependency fix Resolution (@vue/cli-service): 4.0.0-alpha.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: