handlebars@4.0.4 vulnerabilities
Handlebars provides the power necessary to let you build semantic templates effectively with no frustration
-
latest version
4.7.8
-
latest non vulnerable version
-
first published
13 years ago
-
latest version published
a year ago
-
licenses detected
- >=1.2.0
Direct Vulnerabilities
Known vulnerabilities in the handlebars package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source. POC
How to fix Prototype Pollution? Upgrade |
<4.7.7
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source. POC
How to fix Remote Code Execution (RCE)? Upgrade |
<4.7.7
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Prototype Pollution. Prototype access to the template engine allows for potential code execution. How to fix Prototype Pollution? Upgrade |
<4.6.0
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Prototype Pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions. How to fix Prototype Pollution? Upgrade |
<3.0.8
>=4.0.0 <4.5.3
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Arbitrary Code Execution. The package's lookup helper doesn't validate templates correctly, allowing attackers to submit templates that execute arbitrary JavaScript in the system. How to fix Arbitrary Code Execution? Upgrade |
<3.0.8
>=4.0.0 <4.5.3
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Denial of Service (DoS). The package's parser may be forced into an endless loop while processing specially-crafted templates, which may allow attackers to exhaust system resources leading to Denial of Service. How to fix Denial of Service (DoS)? Upgrade |
>=4.0.0 <4.4.5
|
handlebars is a extension to the Mustache templating language. Affected versions of this package are vulnerable to Prototype Pollution.
Templates may alter an Object's How to fix Prototype Pollution? Upgrade |
>=4.0.0 <4.3.0
<3.0.8
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Prototype Pollution. A Prototype Pollution allowing Remote Code Execution can be exploited using the constructor, via the 'lookup' helper.
This vulnerability is due to an incomplete fix for: How to fix Prototype Pollution? Upgrade |
>=3.0.0 <3.0.7
>=4.1.0 <4.1.2
>=4.0.0 <4.0.14
|
handlebars is an extension to the Mustache templating language. Affected versions of this package are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. How to fix Prototype Pollution? Upgrade |
<3.0.7
>=4.0.0 <4.0.13
>=4.1.0 <4.1.2
|