Code Monkey home page Code Monkey logo

edu-102-typescript-code's People

Contributors

anthonywong555 avatar antmendoza avatar napcs avatar rgarcia avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

edu-102-typescript-code's Issues

activity-1.7.0.tgz: 1 vulnerabilities (highest severity is: 9.8) - autoclosed

Vulnerable Library - activity-1.7.0.tgz

Path to dependency file: /exercises/debug-activity/practice/package.json

Path to vulnerable library: /exercises/debug-activity/practice/node_modules/protobufjs/package.json,/samples/age-estimation/node_modules/protobufjs/package.json,/exercises/testing-code/solution/node_modules/protobufjs/package.json,/exercises/debug-activity/solution/node_modules/protobufjs/package.json,/exercises/durable-execution/solution/node_modules/protobufjs/package.json,/exercises/using-objects/practice/node_modules/protobufjs/package.json,/exercises/version-workflow/solution/node_modules/protobufjs/package.json,/exercises/durable-execution/practice/node_modules/protobufjs/package.json,/exercises/testing-code/practice/node_modules/protobufjs/package.json,/exercises/version-workflow/practice/node_modules/protobufjs/package.json,/exercises/using-objects/solution/node_modules/protobufjs/package.json

Found in HEAD commit: 8e2ea5f4783e9e4eccd6f7e85bc875f0a045a556

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (activity version) Remediation Available
CVE-2023-36665 Critical 9.8 protobufjs-7.2.3.tgz Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

Details

CVE-2023-36665

Vulnerable Library - protobufjs-7.2.3.tgz

Library home page: https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.3.tgz

Path to dependency file: /exercises/debug-activity/practice/package.json

Path to vulnerable library: /exercises/debug-activity/practice/node_modules/protobufjs/package.json,/samples/age-estimation/node_modules/protobufjs/package.json,/exercises/testing-code/solution/node_modules/protobufjs/package.json,/exercises/debug-activity/solution/node_modules/protobufjs/package.json,/exercises/durable-execution/solution/node_modules/protobufjs/package.json,/exercises/using-objects/practice/node_modules/protobufjs/package.json,/exercises/version-workflow/solution/node_modules/protobufjs/package.json,/exercises/durable-execution/practice/node_modules/protobufjs/package.json,/exercises/testing-code/practice/node_modules/protobufjs/package.json,/exercises/version-workflow/practice/node_modules/protobufjs/package.json,/exercises/using-objects/solution/node_modules/protobufjs/package.json

Dependency Hierarchy:

  • activity-1.7.0.tgz (Root Library)
    • common-1.7.0.tgz
      • protobufjs-7.2.3.tgz (Vulnerable Library)

Found in HEAD commit: 8e2ea5f4783e9e4eccd6f7e85bc875f0a045a556

Found in base branch: main

Vulnerability Details

protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype. = ...;" whereas CVE-2022-25878 was about "Object.proto. = ...;" instead.

Publish Date: 2023-07-05

URL: CVE-2023-36665

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665

Release Date: 2023-07-05

Fix Resolution: protobufjs - 7.2.4

activity-1.8.2.tgz: 1 vulnerabilities (highest severity is: 9.8)

Vulnerable Library - activity-1.8.2.tgz

Found in HEAD commit: 0a1411fb4be270603729e78bb5822e79460ab6eb

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (activity version) Remediation Possible**
CVE-2023-36665 Critical 9.8 protobufjs-7.2.3.tgz Transitive 1.8.3

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-36665

Vulnerable Library - protobufjs-7.2.3.tgz

Library home page: https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.3.tgz

Dependency Hierarchy:

  • activity-1.8.2.tgz (Root Library)
    • common-1.8.2.tgz
      • protobufjs-7.2.3.tgz (Vulnerable Library)

Found in HEAD commit: 0a1411fb4be270603729e78bb5822e79460ab6eb

Found in base branch: main

Vulnerability Details

protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype. = ...;" whereas CVE-2022-25878 was about "Object.proto. = ...;" instead.

Publish Date: 2023-07-05

URL: CVE-2023-36665

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665

Release Date: 2023-07-05

Fix Resolution (protobufjs): 7.2.4

Direct dependency fix Resolution (@temporalio/activity): 1.8.3

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.