This repository has been archived by the owner on Jul 23, 2022. It is now read-only.
CVE-2022-25878 (High) detected in protobufjs-5.0.3.tgz, protobufjs-6.8.8.tgz #118
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2022-25878 - High Severity Vulnerability
Vulnerable Libraries - protobufjs-5.0.3.tgz, protobufjs-6.8.8.tgz
protobufjs-5.0.3.tgz
Protocol Buffers for JavaScript. Finally.
Library home page: https://registry.npmjs.org/protobufjs/-/protobufjs-5.0.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/protobufjs/package.json
Dependency Hierarchy:
protobufjs-6.8.8.tgz
Protocol Buffers for JavaScript (& TypeScript).
Library home page: https://registry.npmjs.org/protobufjs/-/protobufjs-6.8.8.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/protobufjs/package.json
Dependency Hierarchy:
Found in HEAD commit: bd51b1f8b9a3c21e299c3eabc04e1478a88c2a66
Found in base branch: main
Vulnerability Details
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
Publish Date: 2022-05-27
URL: CVE-2022-25878
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25878
Release Date: 2022-05-27
Fix Resolution: protobufjs - 6.10.3,6.11.3
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: