Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability on pug-filters #3204

Closed
kerimkaan opened this issue Jan 9, 2020 · 1 comment
Closed

Vulnerability on pug-filters #3204

kerimkaan opened this issue Jan 9, 2020 · 1 comment

Comments

@kerimkaan
Copy link

Pug Version: 2.0.4

Node Version: 10.16.3

Dependency Hierarchy:

pug-2.0.4.tgz (Root Library)
...pug-filters-3.1.1.tgz
.......uglify-js-2.8.29.tgz
............yargs-3.10.0.tgz
.................cliui-2.1.0.tgz
........................center-align-0.1.3.tgz
..............................align-text-0.1.4.tgz
................................... kind-of-3.2.2.tgz (Vulnerable Library)

ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.

Source: https://nvd.nist.gov/vuln/detail/CVE-2019-20149

Publish Date: 2019-12-30

Additional Comments

Check out jonschlinkert/kind-of#31

@kerimkaan kerimkaan changed the title Vulnerability on Vulnerability on pug-filters Jan 10, 2020
@31453
Copy link

31453 commented Apr 3, 2020

Any updates on fixing this vulnerability? Updating uglify-js in the pug-filters repo might solve this issue (but I have not confirmed that this is the case).

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants