Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA5cGMtMjk5cC12eGdw

yargs-parser Vulnerable to Prototype Pollution

Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --foo.__proto__.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.

Recommendation

Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.

Permalink: https://github.com/advisories/GHSA-p9pc-299p-vxgp
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA5cGMtMjk5cC12eGdw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: over 1 year ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Identifiers: GHSA-p9pc-299p-vxgp, CVE-2020-7608
References: Repository: https://github.com/yargs/yargs-parser
Blast Radius: 35.2

Affected Packages

npm:yargs-parser
Dependent packages: 3,976
Dependent repositories: 4,384,968
Downloads: 390,215,591 last month
Affected Version Ranges: >= 16.0.0, < 18.1.1, <= 5.0.0, >= 6.0.0, < 13.1.2, >= 14.0.0, < 15.0.1
Fixed in: 18.1.1, 5.0.1, 13.1.2, 15.0.1
All affected versions: 1.0.0, 1.1.0, 2.0.0, 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.4.0, 2.4.1, 3.1.0, 3.2.0, 4.0.0, 4.0.1, 4.0.2, 4.1.0, 4.2.0, 4.2.1, 5.0.0, 6.0.0, 6.0.1, 7.0.0, 8.0.0, 8.1.0, 9.0.0, 9.0.1, 9.0.2, 10.0.0, 10.1.0, 11.0.0, 11.1.0, 11.1.1, 12.0.0, 13.0.0, 13.1.0, 13.1.1, 14.0.0, 15.0.0, 16.0.0, 16.1.0, 17.0.0, 17.0.1, 17.1.0, 18.0.0, 18.1.0
All unaffected versions: 5.0.1, 13.1.2, 15.0.1, 15.0.2, 15.0.3, 18.1.1, 18.1.2, 18.1.3, 19.0.0, 19.0.1, 19.0.4, 20.0.0, 20.1.0, 20.2.0, 20.2.1, 20.2.2, 20.2.3, 20.2.4, 20.2.5, 20.2.6, 20.2.7, 20.2.9, 21.0.0, 21.0.1, 21.1.0, 21.1.1