Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

handlebars-4.0.6.min.js: 8 vulnerabilities (highest severity is: 9.8) #995

Open
mend-for-github-com bot opened this issue Aug 13, 2024 · 0 comments
Open

Comments

@mend-for-github-com
Copy link

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (handlebars version) Remediation Possible**
CVE-2021-23383 Critical 9.8 handlebars-4.0.6.min.js Direct handlebars - 4.7.7
CVE-2021-23369 Critical 9.8 handlebars-4.0.6.min.js Direct com.github.jknack:handlebars:4.2.0, handlebars - 4.7.7
CVE-2019-19919 Critical 9.8 handlebars-4.0.6.min.js Direct handlebars - 3.0.8,4.3.0
CVE-2019-20920 High 8.1 handlebars-4.0.6.min.js Direct handlebars - 4.5.3
WS-2020-0450 High 7.5 handlebars-4.0.6.min.js Direct handlebars - 4.6.0
CVE-2019-20922 High 7.5 handlebars-4.0.6.min.js Direct handlebars - 4.4.5
WS-2019-0064 High 7.3 handlebars-4.0.6.min.js Direct 3.0.7,4.0.14,4.1.2
WS-2019-0103 Medium 5.6 handlebars-4.0.6.min.js Direct 4.1.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2021-23383

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.

Publish Date: 2021-05-04

URL: CVE-2021-23383

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23383

Release Date: 2021-05-04

Fix Resolution: handlebars - 4.7.7

CVE-2021-23369

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.

Publish Date: 2021-04-12

URL: CVE-2021-23369

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-04-12

Fix Resolution: com.github.jknack:handlebars:4.2.0, handlebars - 4.7.7

CVE-2019-19919

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Mend Note: Converted from WS-2019-0368, on 2022-11-08.

Publish Date: 2019-12-20

URL: CVE-2019-19919

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-w457-6q6x-cgp9

Release Date: 2019-12-20

Fix Resolution: handlebars - 3.0.8,4.3.0

CVE-2019-20920

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).

Publish Date: 2020-09-30

URL: CVE-2019-20920

CVSS 3 Score Details (8.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1316

Release Date: 2020-09-30

Fix Resolution: handlebars - 4.5.3

WS-2020-0450

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Handlebars before 4.6.0 vulnerable to Prototype Pollution. Prototype access to the template engine allows for potential code execution, which may lead to Denial Of Service (DoS).

Publish Date: 2020-01-09

URL: WS-2020-0450

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-01-09

Fix Resolution: handlebars - 4.6.0

CVE-2019-20922

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
Mend Note: Converted from WS-2019-0491, on 2022-11-08.

Publish Date: 2020-09-30

URL: CVE-2019-20922

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1300

Release Date: 2020-09-30

Fix Resolution: handlebars - 4.4.5

WS-2019-0064

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.

Publish Date: 2019-01-30

URL: WS-2019-0064

CVSS 3 Score Details (7.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/755/

Release Date: 2019-01-30

Fix Resolution: 3.0.7,4.0.14,4.1.2

WS-2019-0103

Vulnerable Library - handlebars-4.0.6.min.js

Handlebars provides the power necessary to let you build semantic templates effectively with no frustration

Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.6/handlebars.min.js

Path to dependency file: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Path to vulnerable library: /tasks/terraform/examples/approval/forms/approvalForm/index.html

Dependency Hierarchy:

  • handlebars-4.0.6.min.js (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Handlebars.js before 4.1.0 has Remote Code Execution (RCE)

Publish Date: 2019-01-30

URL: WS-2019-0103

CVSS 3 Score Details (5.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2019-01-30

Fix Resolution: 4.1.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants