org.webjars.npm:yargs-parser@4.2.1 vulnerabilities

  • latest version

    21.1.1

  • latest non vulnerable version

  • first published

    8 years ago

  • latest version published

    2 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:yargs-parser package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Prototype Pollution

    org.webjars.npm:yargs-parser is a mighty option parser used by yargs.

    Affected versions of this package are vulnerable to Prototype Pollution. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.

    Our research team checked several attack vectors to verify this vulnerability:

    1. It could be used for privilege escalation.
    2. The library could be used to parse user input received from different sources:
      • terminal emulators
      • system calls from other code bases
      • CLI RPC servers

    How to fix Prototype Pollution?

    Upgrade org.webjars.npm:yargs-parser to version 5.0.1, 13.1.2, 15.0.1, 18.1.3 or higher.

    [0,5.0.1)[7.0.0,13.1.2)[15.0.0,15.0.1)[16.1.0,18.1.3)