cli-plugin-eslint-4.5.7.tgz: 4 vulnerabilities (highest severity is: 9.8) #1937
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
wontfix
This will not be worked on
Vulnerable Library - cli-plugin-eslint-4.5.7.tgz
Path to dependency file: /components/dashboard/node_modules/@vue/cli-plugin-eslint/package.json
Path to vulnerable library: /components/discovery/yarn.lock,/docs/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,/components/dashboard/node_modules/glob-parent/package.json
Vulnerabilities
Details
CVE-2021-23440
Vulnerable Library - set-value-2.0.1.tgz
Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.
Library home page: https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz
Path to dependency file: /components/dashboard/node_modules/set-value/package.json
Path to vulnerable library: /components/dashboard/node_modules/set-value/package.json,/docs/node_modules/set-value/package.json,/components/discovery/yarn.lock
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440.
Publish Date: 2021-09-12
URL: CVE-2021-23440
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-09-12
Fix Resolution (set-value): 4.0.1
Direct dependency fix Resolution (@vue/cli-plugin-eslint): 5.0.0
Step up your Open Source Security Game with Mend here
CVE-2021-42740
Vulnerable Library - shell-quote-1.7.2.tgz
quote and parse shell commands
Library home page: https://registry.npmjs.org/shell-quote/-/shell-quote-1.7.2.tgz
Path to dependency file: /docs/package.json
Path to vulnerable library: /docs/node_modules/shell-quote/package.json,/components/dashboard/node_modules/shell-quote/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character.
Publish Date: 2021-10-21
URL: CVE-2021-42740
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42740
Release Date: 2021-10-21
Fix Resolution (shell-quote): 1.7.3
Direct dependency fix Resolution (@vue/cli-plugin-eslint): 4.5.8
Step up your Open Source Security Game with Mend here
CVE-2022-38900
Vulnerable Library - decode-uri-component-0.2.0.tgz
A better decodeURIComponent
Library home page: https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz
Path to dependency file: /components/discovery/yarn.lock
Path to vulnerable library: /components/discovery/yarn.lock,/docs/node_modules/decode-uri-component/package.json,/components/dashboard/node_modules/decode-uri-component/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
Publish Date: 2022-11-28
URL: CVE-2022-38900
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-w573-4hg7-7wgq
Release Date: 2022-11-28
Fix Resolution (decode-uri-component): 0.2.1
Direct dependency fix Resolution (@vue/cli-plugin-eslint): 4.5.8
Step up your Open Source Security Game with Mend here
CVE-2020-28469
Vulnerable Library - glob-parent-3.1.0.tgz
Strips glob magic from a string to provide the parent directory path
Library home page: https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz
Path to dependency file: /components/discovery/yarn.lock
Path to vulnerable library: /components/discovery/yarn.lock,/docs/node_modules/webpack-dev-server/node_modules/glob-parent/package.json,/components/dashboard/node_modules/glob-parent/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
Publish Date: 2021-06-03
URL: CVE-2020-28469
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469
Release Date: 2021-06-03
Fix Resolution (glob-parent): 5.1.2
Direct dependency fix Resolution (@vue/cli-plugin-eslint): 5.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: