-
Couldn't load subscription status.
- Fork 0
Description
CVE-2021-23807 - High Severity Vulnerability
Vulnerable Library - jsonpointer-4.1.0.tgz
Simple JSON Addressing.
Library home page: https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.1.0.tgz
Path to dependency file: /security-admin/src/main/webapp/libs/other/jquery-cookie/js/package.json
Path to vulnerable library: /security-admin/src/main/webapp/libs/other/jquery-cookie/js/node_modules/jsonpointer/package.json
Dependency Hierarchy:
- grunt-contrib-qunit-0.2.2.tgz (Root Library)
- grunt-lib-phantomjs-0.3.1.tgz
- phantomjs-1.9.20.tgz
- request-2.67.0.tgz
- har-validator-2.0.6.tgz
- is-my-json-valid-2.20.5.tgz
- ❌ jsonpointer-4.1.0.tgz (Vulnerable Library)
- is-my-json-valid-2.20.5.tgz
- har-validator-2.0.6.tgz
- request-2.67.0.tgz
- phantomjs-1.9.20.tgz
- grunt-lib-phantomjs-0.3.1.tgz
Found in base branch: master
Vulnerability Details
This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.
Publish Date: 2021-11-03
URL: CVE-2021-23807
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807
Release Date: 2021-11-03
Fix Resolution (jsonpointer): 5.0.0
Direct dependency fix Resolution (grunt-contrib-qunit): 0.3.0
⛑️ Automatic Remediation is available for this issue