CVE-2020-7608

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-7608
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-7608.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-7608
Aliases
Related
Published
2020-03-16T20:15:12Z
Modified
2024-10-12T06:38:01.345777Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "proto" payload.

References

Affected packages

Debian:11 / node-yargs-parser

Package

Name
node-yargs-parser
Purl
pkg:deb/debian/node-yargs-parser?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
18.1.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / node-yargs-parser

Package

Name
node-yargs-parser
Purl
pkg:deb/debian/node-yargs-parser?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
18.1.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / node-yargs-parser

Package

Name
node-yargs-parser
Purl
pkg:deb/debian/node-yargs-parser?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
18.1.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/yargs/yargs-parser

Affected ranges

Type
GIT
Repo
https://github.com/yargs/yargs-parser
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.1
v1.1.0

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.1.2
v2.2.0
v2.3.0
v2.4.0
v2.4.1

v3.*

v3.0.0
v3.1.0
v3.2.0

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.1.0
v4.2.0
v4.2.1

v5.*

v5.0.0