uniquelyparticular/sync-stripe-to-moltin

WS-2019-0493 (High) detected in handlebars-4.1.2.tgz

mend-bolt-for-github opened this issue · 0 comments

WS-2019-0493 - High Severity Vulnerability

Vulnerable Library - handlebars-4.1.2.tgz

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://registry.npmjs.org/handlebars/-/handlebars-4.1.2.tgz

Path to dependency file: sync-stripe-to-moltin/package.json

Path to vulnerable library: sync-stripe-to-moltin/node_modules/handlebars/package.json

Dependency Hierarchy:

  • semantic-release-15.13.14.tgz (Root Library)
    • release-notes-generator-7.1.4.tgz
      • conventional-changelog-writer-4.0.3.tgz
        • handlebars-4.1.2.tgz (Vulnerable Library)

Found in HEAD commit: e7d83a8cbcc721d8bc1d6fc953a099c00207f30b

Vulnerability Details

handlebars before 3.0.8 and 4.x before 4.5.2 is vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system.

Publish Date: 2019-11-14

URL: WS-2019-0493

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1316

Release Date: 2019-11-14

Fix Resolution: handlebars - 3.0.8,4.5.2


Step up your Open Source Security Game with WhiteSource here