uniquelyparticular/sync-moltin-to-algolia

CVE-2021-23369 (High) detected in handlebars-4.1.2.tgz

Opened this issue · 0 comments

CVE-2021-23369 - High Severity Vulnerability

Vulnerable Library - handlebars-4.1.2.tgz

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz

Path to dependency file: sync-moltin-to-algolia/package.json

Path to vulnerable library: sync-moltin-to-algolia/node_modules/handlebars/package.json

Dependency Hierarchy:

  • semantic-release-15.13.14.tgz (Root Library)
    • release-notes-generator-7.1.4.tgz
      • conventional-changelog-writer-4.0.3.tgz
        • handlebars-4.1.2.tgz (Vulnerable Library)

Found in HEAD commit: e91a0d11056f0d5108310ecc49e35147ab22f024

Vulnerability Details

The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.

Publish Date: 2021-04-12

URL: CVE-2021-23369

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23369

Release Date: 2021-04-12

Fix Resolution: handlebars - 4.7.7


Step up your Open Source Security Game with WhiteSource here