swagger-codegen icon indicating copy to clipboard operation
swagger-codegen copied to clipboard

CVE-2018-16492 (High) detected in extend-3.0.0.tgz, extend-3.0.1.tgz

Open mend-for-github-com[bot] opened this issue 3 years ago • 0 comments

CVE-2018-16492 - High Severity Vulnerability

Vulnerable Libraries - extend-3.0.0.tgz, extend-3.0.1.tgz

extend-3.0.0.tgz

Port of jQuery.extend for node.js and the browser

Library home page: https://registry.npmjs.org/extend/-/extend-3.0.0.tgz

Path to dependency file: /samples/server/petstore/nodejs-google-cloud-functions/package.json

Path to vulnerable library: /samples/server/petstore/nodejs-google-cloud-functions/node_modules/extend/package.json,/samples/server/petstore/nodejs/node_modules/superagent/node_modules/extend/package.json

Dependency Hierarchy:

  • swagger-tools-0.10.1.tgz (Root Library)
    • superagent-1.8.5.tgz
      • :x: extend-3.0.0.tgz (Vulnerable Library)
extend-3.0.1.tgz

Port of jQuery.extend for node.js and the browser

Library home page: https://registry.npmjs.org/extend/-/extend-3.0.1.tgz

Path to dependency file: /samples/client/petstore/typescript-node/npm/package.json

Path to vulnerable library: /samples/client/petstore/typescript-node/npm/node_modules/extend/package.json

Dependency Hierarchy:

  • request-2.85.0.tgz (Root Library)
    • :x: extend-3.0.1.tgz (Vulnerable Library)

Found in HEAD commit: 4b7a8d7d7384aa6a27d6309c35ade0916edae7ed

Found in base branch: master

Vulnerability Details

A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.

Publish Date: 2019-02-01

URL: CVE-2018-16492

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://hackerone.com/reports/381185

Release Date: 2019-02-01

Fix Resolution (extend): 3.0.2

Direct dependency fix Resolution (swagger-tools): 0.10.2

Fix Resolution (extend): 3.0.2

Direct dependency fix Resolution (request): 2.86.0


  • [ ] Check this box to open an automated fix PR