logo

CVE-2020-7608 yargs-parser

Package

Manager: npm
Name: yargs-parser
Vulnerable Version: >=6.0.0 <13.1.2 || >=14.0.0 <15.0.1 || >=16.0.0 <18.1.1 || >=0 <5.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.0011 pctl0.30065

Details

yargs-parser Vulnerable to Prototype Pollution Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`. ## Recommendation Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.

Metadata

Created: 2020-09-04T18:00:54Z
Modified: 2022-08-02T21:44:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-p9pc-299p-vxgp/GHSA-p9pc-299p-vxgp.json
CWE IDs: ["CWE-1321", "CWE-915"]
Alternative ID: GHSA-p9pc-299p-vxgp
Finding: F390
Auto approve: 1