org.webjars.npm:highcharts@4.1.10 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:highcharts package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser.

As a workaround, implementers who are not able to upgrade may apply DOMPurify recursively to the options structure to filter out malicious markup.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for org.webjars.npm:highcharts.

[0,)
  • M
Prototype Pollution

org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

Affected versions of this package are vulnerable to Prototype Pollution via the merge function. The function recursively merges the target object with the source object (or in case of just one object the function is equivalent to a deep copy). However, it does not properly check the keys being set, leading to prototype pollution.

The impact depends on the application. In some cases, it is possible to achieve Denial of service (DoS), Remote Code Execution (or XSS) or Property Injection.

How to fix Prototype Pollution?

There is no fixed version for org.webjars.npm:highcharts.

[0,)
  • H
Cross-site Scripting (XSS)

org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The <a> tag for text formats is translated into a tspan with onclick, allowing for script injection.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for org.webjars.npm:highcharts.

[0,)
  • H
Regular Expression Denial of Service (ReDoS)

org.webjars.npm:highcharts is a JavaScript charting library based on SVG, with fallbacks to VML and canvas for old browsers.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). This can cause an impact of about 10 seconds matching time for data 200K characters long.

How to fix Regular Expression Denial of Service (ReDoS)?

There is no fixed version for org.webjars.npm:highcharts.

[0,)