You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Mend Note: Converted from WS-2019-0368, on 2022-11-08.
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
Mend Note: Converted from WS-2019-0491, on 2022-11-08.
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Handlebars before 4.6.0 vulnerable to Prototype Pollution. Prototype access to the template engine allows for potential code execution, which may lead to Denial Of Service (DoS).
mend-for-github-combot
changed the title
handlebars-4.1.2.min.js: 2 vulnerabilities (highest severity is: 9.8)
handlebars-4.1.2.min.js: 3 vulnerabilities (highest severity is: 9.8)
Mar 14, 2023
mend-for-github-combot
changed the title
handlebars-4.1.2.min.js: 3 vulnerabilities (highest severity is: 9.8)
handlebars-4.1.2.min.js: 6 vulnerabilities (highest severity is: 9.8)
Mar 15, 2023
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Vulnerabilities
Details
CVE-2021-23369
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Dependency Hierarchy:
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Found in base branch: master
Vulnerability Details
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
Publish Date: 2021-04-12
URL: CVE-2021-23369
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-04-12
Fix Resolution: com.github.jknack:handlebars:4.2.0, handlebars - 4.7.7
CVE-2019-19919
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Dependency Hierarchy:
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Found in base branch: master
Vulnerability Details
Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's proto and defineGetter properties, which may allow an attacker to execute arbitrary code through crafted payloads.
Mend Note: Converted from WS-2019-0368, on 2022-11-08.
Publish Date: 2019-12-20
URL: CVE-2019-19919
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919
Release Date: 2019-12-20
Fix Resolution: handlebars - 4.3.0
CVE-2021-23383
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Dependency Hierarchy:
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Found in base branch: master
Vulnerability Details
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
Publish Date: 2021-05-04
URL: CVE-2021-23383
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23383
Release Date: 2021-05-04
Fix Resolution: handlebars - 4.7.7
CVE-2019-20920
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Dependency Hierarchy:
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Found in base branch: master
Vulnerability Details
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
Publish Date: 2020-09-30
URL: CVE-2019-20920
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1316
Release Date: 2020-10-15
Fix Resolution: handlebars - 4.5.3
CVE-2019-20922
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Dependency Hierarchy:
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Found in base branch: master
Vulnerability Details
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
Mend Note: Converted from WS-2019-0491, on 2022-11-08.
Publish Date: 2020-09-30
URL: CVE-2019-20922
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1300
Release Date: 2020-09-30
Fix Resolution: handlebars - 4.4.5
WS-2020-0450
Vulnerable Library - handlebars-4.1.2.min.js
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
Library home page: https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.1.2/handlebars.min.js
Path to dependency file: /examples/custom_form/forms/myForm/index.html
Path to vulnerable library: /examples/custom_form/forms/myForm/index.html,/examples/form_l10n/forms/myOtherForm/index.html,/examples/forms_wizard/forms/userWarning/index.html,/examples/forms_wizard/forms/userData/index.html,/examples/dynamic_form_values/forms/myForm/index.html
Dependency Hierarchy:
Found in HEAD commit: 97d18a56dfc9d482e0ac2ae24230edd85457b90b
Found in base branch: master
Vulnerability Details
Handlebars before 4.6.0 vulnerable to Prototype Pollution. Prototype access to the template engine allows for potential code execution, which may lead to Denial Of Service (DoS).
Publish Date: 2020-01-09
URL: WS-2020-0450
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2020-01-09
Fix Resolution: handlebars - 4.6.0
The text was updated successfully, but these errors were encountered: