This repository has been archived by the owner on May 6, 2021. It is now read-only.
CVE-2020-7608 (High) detected in yargs-parser-11.1.1.tgz #76
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2020-7608 - High Severity Vulnerability
Vulnerable Library - yargs-parser-11.1.1.tgz
the mighty option parser used by yargs
Library home page: https://registry.npmjs.org/yargs-parser/-/yargs-parser-11.1.1.tgz
Path to dependency file: /tmp/ws-scm/angular2-book-list/package.json
Path to vulnerable library: /tmp/ws-scm/angular2-book-list/node_modules/protractor/node_modules/yargs-parser/package.json
Dependency Hierarchy:
Found in HEAD commit: ee9bfd47f260e9ec9e2c8153b723f8d50814f465
Vulnerability Details
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "proto" payload.
Publish Date: 2020-03-16
URL: CVE-2020-7608
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7608
Release Date: 2020-03-16
Fix Resolution: v18.1.1;13.1.2;15.0.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: