This repository has been archived by the owner on Jan 27, 2023. It is now read-only.
CVE-2019-10747 (High) detected in set-value-2.0.0.tgz, set-value-0.4.3.tgz #13
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2019-10747 - High Severity Vulnerability
Vulnerable Libraries - set-value-2.0.0.tgz, set-value-0.4.3.tgz
set-value-2.0.0.tgz
Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.
Library home page: https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz
Path to dependency file: /tmp/ws-scm/jobful-api/package.json
Path to vulnerable library: /tmp/ws-scm/jobful-api/node_modules/set-value/package.json
Dependency Hierarchy:
set-value-0.4.3.tgz
Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.
Library home page: https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz
Path to dependency file: /tmp/ws-scm/jobful-api/package.json
Path to vulnerable library: /tmp/ws-scm/jobful-api/node_modules/union-value/node_modules/set-value/package.json
Dependency Hierarchy:
Found in HEAD commit: f07cb5e70bc564982e8b856e6afd13cb88c7ea97
Vulnerability Details
set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and proto payloads.
Publish Date: 2019-08-23
URL: CVE-2019-10747
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: jonschlinkert/set-value@95e9d99
Release Date: 2019-07-24
Fix Resolution: 2.0.1,3.0.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: