CVE-2022-29244 (High) detected in npm-6.11.3.tgz
Opened this issue · 0 comments
CVE-2022-29244 - High Severity Vulnerability
Vulnerable Library - npm-6.11.3.tgz
a package manager for JavaScript
Library home page: https://registry.npmjs.org/npm/-/npm-6.11.3.tgz
Path to dependency file: /FrontEnd/package.json
Path to vulnerable library: /FrontEnd/node_modules/npm/package.json
Dependency Hierarchy:
- ❌ npm-6.11.3.tgz (Vulnerable Library)
Found in HEAD commit: 0208d55039ab862164328381f352c7fb481024b0
Found in base branch: master
Vulnerability Details
npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. --workspaces
, --workspace=<name>
). Anyone who has run npm pack
or npm publish
inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.
Publish Date: 2022-06-13
URL: CVE-2022-29244
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-hj9c-8jmm-8c52
Release Date: 2022-06-13
Fix Resolution: 6.14.18
Step up your Open Source Security Game with Mend here