You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Path to dependency file: /dependencies/package.json
Path to vulnerable library: /dependencies/package.json
Dependency Hierarchy:
@stoplight/spectral-cli-6.11.1.tgz (Root Library)
spectral-core-1.18.3.tgz
nimma-0.2.2.tgz
❌ jsonpath-plus-6.0.1.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. Note: There were several attempts to fix it in versions 10.0.0-10.1.0 but it could still be exploited using different payloads.
Path to dependency file: /dependencies/package.json
Path to vulnerable library: /dependencies/package.json
Dependency Hierarchy:
@stoplight/spectral-cli-6.11.1.tgz (Root Library)
spectral-ruleset-bundler-1.5.2.tgz
❌ rollup-2.79.1.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 and 4.22.4 are susceptible to a DOM Clobbering vulnerability when bundling scripts with properties from import.meta (e.g., import.meta.url) in cjs/umd/iife format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present. Versions 3.29.5 and 4.22.4 contain a patch for the vulnerability.
mend-for-github-combot
changed the title
@stoplight/spectral-cli-6.11.1.tgz: 1 vulnerabilities (highest severity is: 6.1)
@stoplight/spectral-cli-6.11.1.tgz: 2 vulnerabilities (highest severity is: 9.8)
Oct 29, 2024
Vulnerable Library - @stoplight/spectral-cli-6.11.1.tgz
Path to dependency file: /dependencies/package.json
Path to vulnerable library: /dependencies/package.json
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-21534
Vulnerable Libraries - jsonpath-plus-7.1.0.tgz, jsonpath-plus-6.0.1.tgz
jsonpath-plus-7.1.0.tgz
A JS implementation of JSONPath with some additional operators
Library home page: https://registry.npmjs.org/jsonpath-plus/-/jsonpath-plus-7.1.0.tgz
Path to dependency file: /dependencies/package.json
Path to vulnerable library: /dependencies/package.json
Dependency Hierarchy:
jsonpath-plus-6.0.1.tgz
A JS implementation of JSONPath with some additional operators
Library home page: https://registry.npmjs.org/jsonpath-plus/-/jsonpath-plus-6.0.1.tgz
Path to dependency file: /dependencies/package.json
Path to vulnerable library: /dependencies/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node. Note: There were several attempts to fix it in versions 10.0.0-10.1.0 but it could still be exploited using different payloads.
Publish Date: 2024-10-11
URL: CVE-2024-21534
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-21534
Release Date: 2024-10-11
Fix Resolution: jsonpath-plus - 10.2.0
CVE-2024-47068
Vulnerable Library - rollup-2.79.1.tgz
Next-generation ES module bundler
Library home page: https://registry.npmjs.org/rollup/-/rollup-2.79.1.tgz
Path to dependency file: /dependencies/package.json
Path to vulnerable library: /dependencies/package.json
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 and 4.22.4 are susceptible to a DOM Clobbering vulnerability when bundling scripts with properties from
import.meta
(e.g.,import.meta.url
) incjs
/umd
/iife
format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., animg
tag with an unsanitizedname
attribute) are present. Versions 3.29.5 and 4.22.4 contain a patch for the vulnerability.Publish Date: 2024-09-23
URL: CVE-2024-47068
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-gcx4-mw62-g8wm
Release Date: 2024-09-23
Fix Resolution: rollup - 3.29.5,4.22.4
The text was updated successfully, but these errors were encountered: