JeffResc / TinyURL-Node.js

TinyURL Shortener Node.js Module

Home Page:https://www.npmjs.com/package/tinyurl/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2018-16487 (Medium) detected in multiple libraries

mend-bolt-for-github opened this issue · comments

CVE-2018-16487 - Medium Severity Vulnerability

Vulnerable Libraries - lodash-1.0.2.tgz, lodash-3.10.1.tgz, lodash-2.4.2.tgz

lodash-1.0.2.tgz

A utility library delivering consistency, customization, performance, and extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-1.0.2.tgz

Path to dependency file: TinyURL-Node.js/package.json

Path to vulnerable library: TinyURL-Node.js/node_modules/lodash/package.json

Dependency Hierarchy:

  • gulp-3.8.11.tgz (Root Library)
    • vinyl-fs-0.3.14.tgz
      • glob-watcher-0.0.6.tgz
        • gaze-0.5.2.tgz
          • globule-0.1.0.tgz
            • lodash-1.0.2.tgz (Vulnerable Library)
lodash-3.10.1.tgz

The modern build of lodash modular utilities.

Library home page: https://registry.npmjs.org/lodash/-/lodash-3.10.1.tgz

Path to dependency file: TinyURL-Node.js/package.json

Path to vulnerable library: TinyURL-Node.js/node_modules/gulp-jshint/node_modules/lodash/package.json

Dependency Hierarchy:

  • gulp-jshint-1.10.0.tgz (Root Library)
    • lodash-3.10.1.tgz (Vulnerable Library)
lodash-2.4.2.tgz

A utility library delivering consistency, customization, performance, & extras.

Library home page: https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz

Path to dependency file: TinyURL-Node.js/package.json

Path to vulnerable library: TinyURL-Node.js/node_modules/rcloader/node_modules/lodash/package.json

Dependency Hierarchy:

  • gulp-jshint-1.10.0.tgz (Root Library)
    • rcloader-0.1.2.tgz
      • lodash-2.4.2.tgz (Vulnerable Library)

Found in HEAD commit: 246f78657477824a6b5a35dcd0706571d25a6eb7

Found in base branch: master

Vulnerability Details

A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.

Publish Date: 2019-02-01

URL: CVE-2018-16487

CVSS 3 Score Details (5.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16487

Release Date: 2019-02-01

Fix Resolution: 4.17.11


Step up your Open Source Security Game with WhiteSource here