CVE-2020-7608
Published Mar 16, 2020
Last updated 2 years ago
Overview
- Description
- yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
- Source
- report@snyk.io
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 3.4
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-1321
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:yargs:yargs-parser:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "63B6B264-EBB0-4B92-94AB-9BBFA0BC722A", "versionEndExcluding": "5.0.1" }, { "criteria": "cpe:2.3:a:yargs:yargs-parser:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "A702209A-7B6A-42E9-BDC3-C4F822509ABA", "versionEndExcluding": "13.1.2", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:yargs:yargs-parser:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "1DF881DA-B1DF-4EE6-8141-AD77BD7B84C1", "versionEndExcluding": "15.0.1", "versionStartIncluding": "14.0.0" }, { "criteria": "cpe:2.3:a:yargs:yargs-parser:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "491D24EB-1D85-4676-8EF3-B0C358E8A584", "versionEndExcluding": "18.1.1", "versionStartIncluding": "16.0.0" } ], "operator": "OR" } ] } ]