opentok-rtc icon indicating copy to clipboard operation
opentok-rtc copied to clipboard

grunt-karma-4.0.0.tgz: 1 vulnerabilities (highest severity is: 9.8)

Open mend-for-github-com[bot] opened this issue 3 years ago • 0 comments

Vulnerable Library - grunt-karma-4.0.0.tgz

grunt plugin for karma test runner

Library home page: https://registry.npmjs.org/grunt-karma/-/grunt-karma-4.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/grunt-karma/package.json

Found in HEAD commit: 7c898c0839317ea7989d15935972aa4dc520b907

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (grunt-karma version) Remediation Possible** Reachability
CVE-2022-37602 Critical 9.8 Not Defined 0.3% grunt-karma-4.0.0.tgz Direct N/A

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2022-37602

Vulnerable Library - grunt-karma-4.0.0.tgz

grunt plugin for karma test runner

Library home page: https://registry.npmjs.org/grunt-karma/-/grunt-karma-4.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/grunt-karma/package.json

Dependency Hierarchy:

  • :x: grunt-karma-4.0.0.tgz (Vulnerable Library)

Found in HEAD commit: 7c898c0839317ea7989d15935972aa4dc520b907

Found in base branch: master

Vulnerability Details

Prototype pollution vulnerability in karma-runner grunt-karma 4.0.1 via the key variable in grunt-karma.js.

Publish Date: 2022-10-14

URL: CVE-2022-37602

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.3%

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.