First published: Sat Jul 04 2020(Updated: )
A flaw was found in nodejs-ajv. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/automation-hub | <0:4.2.2-1.el7 | 0:4.2.2-1.el7 |
redhat/python3-django | <0:2.2.18-1.el7 | 0:2.2.18-1.el7 |
redhat/python-bleach | <0:3.3.0-1.el7 | 0:3.3.0-1.el7 |
redhat/python-bleach-allowlist | <0:1.0.3-1.el7 | 0:1.0.3-1.el7 |
redhat/python-galaxy-importer | <0:0.2.15-1.el7 | 0:0.2.15-1.el7 |
redhat/python-galaxy-ng | <0:4.2.2-1.el7 | 0:4.2.2-1.el7 |
redhat/python-pulp-ansible | <1:0.5.6-1.el7 | 1:0.5.6-1.el7 |
redhat/automation-hub | <0:4.2.2-1.el8 | 0:4.2.2-1.el8 |
redhat/python3-django | <0:2.2.18-1.el8 | 0:2.2.18-1.el8 |
redhat/python-bleach | <0:3.3.0-1.el8 | 0:3.3.0-1.el8 |
redhat/python-bleach-allowlist | <0:1.0.3-1.el8 | 0:1.0.3-1.el8 |
redhat/python-galaxy-importer | <0:0.2.15-1.el8 | 0:0.2.15-1.el8 |
redhat/python-galaxy-ng | <0:4.2.2-1.el8 | 0:4.2.2-1.el8 |
redhat/python-pulp-ansible | <1:0.5.6-1.el8 | 1:0.5.6-1.el8 |
redhat/rh-nodejs12-nodejs | <0:12.19.1-2.el7 | 0:12.19.1-2.el7 |
redhat/rh-nodejs14-nodejs | <0:14.15.4-2.el7 | 0:14.15.4-2.el7 |
redhat/rh-nodejs10-nodejs | <0:10.23.1-2.el7 | 0:10.23.1-2.el7 |
redhat/nodejs-ajv | <6.12.3 | 6.12.3 |
Ajv.js Ajv | =6.12.2 | |
npm/ajv | <6.12.3 | 6.12.3 |
IBM Cloud Pak for Security (CP4S) | <=1.6.0.1 | |
IBM Cloud Pak for Security (CP4S) | <=1.6.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.1 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2020-15366.
The severity of CVE-2020-15366 is medium, with a severity value of 5.6.
The affected software for CVE-2020-15366 includes nodejs-ajv versions up to 6.12.3.
To fix the vulnerability in nodejs-ajv, upgrade to version 6.12.3.
You can find more information about CVE-2020-15366 in the following references: [Link 1](https://github.com/ajv-validator/ajv/releases/tag/v6.12.3), [Link 2](https://hackerone.com/bugs?subject=user&report_id=894259), [Link 3](https://github.com/ajv-validator/ajv/commit/988982d3fde08e3ea074e8942442834e78c45587).