CVE-2020-7720 (High) detected in node-forge-0.7.1.tgz #187
Description
CVE-2020-7720 - High Severity Vulnerability
Vulnerable Library - node-forge-0.7.1.tgz
JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.
Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.7.1.tgz
Path to dependency file: recursos.osweekends.com/client/package.json
Path to vulnerable library: recursos.osweekends.com/client/node_modules/node-forge/package.json
Dependency Hierarchy:
- webpack-dev-server-2.11.2.tgz (Root Library)
- selfsigned-1.10.2.tgz
- ❌ node-forge-0.7.1.tgz (Vulnerable Library)
- selfsigned-1.10.2.tgz
Found in HEAD commit: 8f99dc5c0d778ab0a5875472c7b7c4361cac4e39
Vulnerability Details
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
Publish Date: 2020-09-01
URL: CVE-2020-7720
CVSS 3 Score Details (7.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md
Release Date: 2020-09-13
Fix Resolution: node-forge - 0.10.0
Step up your Open Source Security Game with WhiteSource here