Skip to content
This repository has been archived by the owner on Apr 8, 2024. It is now read-only.

CVE-2021-23440 (Critical) detected in set-value-0.4.3.tgz, set-value-2.0.0.tgz #243

Open
mend-bolt-for-github bot opened this issue Jul 7, 2022 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

mend-bolt-for-github bot commented Jul 7, 2022

CVE-2021-23440 - Critical Severity Vulnerability

Vulnerable Libraries - set-value-0.4.3.tgz, set-value-2.0.0.tgz

set-value-0.4.3.tgz

Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.

Library home page: https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz

Path to dependency file: /generic-oauth/package.json

Path to vulnerable library: /tmp/git/generic-oauth/node_modules/union-value/node_modules/set-value/package.json

Dependency Hierarchy:

  • lint-staged-8.2.0.tgz (Root Library)
    • micromatch-3.1.10.tgz
      • snapdragon-0.8.2.tgz
        • base-0.11.2.tgz
          • cache-base-1.0.1.tgz
            • union-value-1.0.0.tgz
              • set-value-0.4.3.tgz (Vulnerable Library)
set-value-2.0.0.tgz

Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.

Library home page: https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz

Path to dependency file: /generic-oauth/package.json

Path to vulnerable library: /tmp/git/generic-oauth/node_modules/set-value/package.json

Dependency Hierarchy:

  • lint-staged-8.2.0.tgz (Root Library)
    • micromatch-3.1.10.tgz
      • snapdragon-0.8.2.tgz
        • base-0.11.2.tgz
          • cache-base-1.0.1.tgz
            • set-value-2.0.0.tgz (Vulnerable Library)

Found in HEAD commit: fb424c23584c31665ca91d557b2fbd20eca56cc5

Found in base branch: master

Vulnerability Details

Mend Note: After conducting further research, Mend has determined that all versions of set-value before versions 2.0.1, 4.0.1 are vulnerable to CVE-2021-23440.

Publish Date: 2021-09-12

URL: CVE-2021-23440

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/

Release Date: 2021-09-12

Fix Resolution (set-value): 2.0.1

Direct dependency fix Resolution (lint-staged): 8.2.1

Fix Resolution (set-value): 2.0.1

Direct dependency fix Resolution (lint-staged): 8.2.1


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Jul 7, 2022
@mend-bolt-for-github mend-bolt-for-github bot changed the title CVE-2021-23440 (High) detected in set-value-0.4.3.tgz, set-value-2.0.0.tgz CVE-2021-23440 (Critical) detected in set-value-0.4.3.tgz, set-value-2.0.0.tgz Dec 12, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants