You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g proto, toString, etc) results in a returned object with a modified prototype instance.
mend-bolt-for-githubbot
changed the title
CVE-2021-23413 (Medium) detected in jszip-3.4.0.tgz
CVE-2021-23413 (Medium) detected in jszip-3.2.2.tgz
Jan 11, 2022
mend-bolt-for-githubbot
changed the title
CVE-2021-23413 (Medium) detected in jszip-3.2.2.tgz
CVE-2021-23413 (Medium) detected in jszip-3.4.0.tgz
Apr 12, 2022
CVE-2021-23413 - Medium Severity Vulnerability
Vulnerable Library - jszip-3.4.0.tgz
Create, read and edit .zip files with JavaScript http://stuartk.com/jszip
Library home page: https://registry.npmjs.org/jszip/-/jszip-3.4.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/snyk-nuget-plugin/node_modules/jszip/package.json
Dependency Hierarchy:
Found in HEAD commit: cc6642863c12d257efa94c89956c645a0a7c3805
Vulnerability Details
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g proto, toString, etc) results in a returned object with a modified prototype instance.
Publish Date: 2021-07-25
URL: CVE-2021-23413
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23413
Release Date: 2021-07-25
Fix Resolution: jszip - 3.7.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: