You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
handlebars before 4.3.0 is vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
mend-bolt-for-githubbot
changed the title
WS-2019-0291 (High) detected in handlebars-4.0.11.js
WS-2019-0291 (High) detected in handlebars-4.0.11.js - autoclosed
May 23, 2022
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
WS-2019-0291 - High Severity Vulnerability
Vulnerable Library - handlebars-4.0.11.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.11/handlebars.js
Path to dependency file: /tmp/ws-scm/static.katio.net/node_modules/yaml-front-matter/docs/index.html
Path to vulnerable library: /static.katio.net/node_modules/yaml-front-matter/docs/js/handlebars.js
Dependency Hierarchy:
Found in HEAD commit: 300a86136076ce4dac47830a9d3686f72c18b97b
Vulnerability Details
handlebars before 4.3.0 is vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Publish Date: 2019-10-06
URL: WS-2019-0291
CVSS 2 Score Details (7.3)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1164
Release Date: 2019-10-06
Fix Resolution: 4.3.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: