CVE-2020-7608

NameCVE-2020-7608
Descriptionyargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-yargs-parser (PTS)stretch4.1.0-1vulnerable
buster11.1.1-1vulnerable
bullseye, sid18.1.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-yargs-parsersource(unstable)18.1.1-1

Notes

[buster] - node-yargs-parser <no-dsa> (Minor issue; can be fixed via point release)
[stretch] - node-yargs-parser <ignored> (Nodejs in stretch not covered by security support)
https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381
https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2
https://gist.github.com/Kirill89/dcd8100d010896157a36624119439832

Search for package or bug name: Reporting problems