First published: Mon Mar 16 2020(Updated: )
A vulnerability was found in nodesjs-yargs-parser, where it can be tricked into adding or modifying properties of the Object.prototype using a "__proto__" payload. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-nodejs12-nodejs | <0:12.19.1-2.el7 | 0:12.19.1-2.el7 |
redhat/rh-nodejs10-nodejs | <0:10.23.1-2.el7 | 0:10.23.1-2.el7 |
redhat/yargs-parser | <13.1.2 | 13.1.2 |
redhat/yargs-parser | <15.0.1 | 15.0.1 |
redhat/yargs-parser | <18.1.1 | 18.1.1 |
redhat/node | <10.23.0 | 10.23.0 |
redhat/node | <12.19.0 | 12.19.0 |
redhat/node | <14.9.0 | 14.9.0 |
Yargs Yargs-parser | <5.0.1 | |
Yargs Yargs-parser | >=6.0.0<13.1.2 | |
Yargs Yargs-parser | >=14.0.0<15.0.1 | |
Yargs Yargs-parser | >=16.0.0<18.1.1 | |
IBM Security Guardium Insights | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this vulnerability is CVE-2020-7608.
The severity of CVE-2020-7608 is critical with a score of 9.8.
The affected software for CVE-2020-7608 includes yargs-parser module versions up to 13.1.2, 15.0.1, and 18.1.1. Additionally, Node.js versions up to 10.23.0, 12.19.0, and 14.9.0 are also affected.
To fix CVE-2020-7608, upgrade the yargs-parser module to version 13.1.2, 15.0.1, or 18.1.1. Additionally, upgrade Node.js to version 10.23.0, 12.19.0, or 14.9.0.
The references for CVE-2020-7608 are: [1] https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381, [2] https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1840005, [3] https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2