CVE-2020-11003 – @fraction/oasis
Package
Manager: npm
Name: @fraction/oasis
Vulnerable Version: >=0 <2.15.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00138 pctl0.34439
Details
CSRF and DNS Rebinding in Oasis ### Impact _What kind of vulnerability is it? Who is impacted?_ If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_request_forgery) attacks to read/write to vulnerable applications. **There is no evidence that suggests that this has been used in the wild.** ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, 2.15.0. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No. ### References _Are there any links users can visit to find out more?_ No. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fraction/oasis](http://github.com/fraction/oasis) * Email me at [christianbundy@fraction.io](mailto:christianbundy@fraction.io)
Metadata
Created: 2020-04-16T03:14:39Z
Modified: 2021-01-08T20:59:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/04/GHSA-j438-45hc-vjhm/GHSA-j438-45hc-vjhm.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-j438-45hc-vjhm
Finding: F007
Auto approve: 1