Name | CVE-2020-7608 |
Description | yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
node-yargs-parser (PTS) | bullseye | 18.1.3+~15.0.0-1 | fixed |
| trixie, sid, bookworm | 21.1.1+~21.0.0-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - node-yargs-parser <ignored> (Nodejs in stretch not covered by security support)
https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381
https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2
https://gist.github.com/Kirill89/dcd8100d010896157a36624119439832