forked from optimizely/javascript-sdk
-
Notifications
You must be signed in to change notification settings - Fork 0
Closed
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
CVE-2020-28499 - High Severity Vulnerability
Vulnerable Library - merge-1.2.1.tgz
Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.
Library home page: https://registry.npmjs.org/merge/-/merge-1.2.1.tgz
Path to dependency file: /packages/logging/package.json
Path to vulnerable library: /packages/logging/node_modules/merge/package.json,/packages/utils/node_modules/merge/package.json,/packages/event-processor/node_modules/merge/package.json
Dependency Hierarchy:
- jest-23.6.0.tgz (Root Library)
- jest-cli-23.6.0.tgz
- jest-haste-map-23.6.0.tgz
- sane-2.5.2.tgz
- exec-sh-0.2.2.tgz
- ❌ merge-1.2.1.tgz (Vulnerable Library)
- exec-sh-0.2.2.tgz
- sane-2.5.2.tgz
- jest-haste-map-23.6.0.tgz
- jest-cli-23.6.0.tgz
Found in HEAD commit: 540c99a1154755210d6564a50420589ebbf7f97c
Found in base branch: master
Vulnerability Details
All versions of package merge are vulnerable to Prototype Pollution via _recursiveMerge .
Publish Date: 2021-02-18
URL: CVE-2020-28499
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Metadata
Metadata
Assignees
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource