You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
handlebars before 4.3.0 is vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
WS-2019-0291 - High Severity Vulnerability
Vulnerable Library - handlebars-4.0.11.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.11/handlebars.js
Path to dependency file: /tmp/ws-scm/blog.katio.net/node_modules/yaml-front-matter/docs/index.html
Path to vulnerable library: /blog.katio.net/node_modules/yaml-front-matter/docs/js/handlebars.js
Dependency Hierarchy:
Found in HEAD commit: fd58ea8e91b776da188df47930fc9a240c664d3d
Vulnerability Details
handlebars before 4.3.0 is vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Publish Date: 2019-10-06
URL: WS-2019-0291
CVSS 2 Score Details (7.3)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1164
Release Date: 2019-10-06
Fix Resolution: 4.3.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: