vega-interpreter@2.1.0 vulnerabilities

CSP-compliant interpreter for Vega expressions.

  • latest version

    2.2.1

  • latest non vulnerable version

  • first published

    5 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the vega-interpreter package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Cross-site Scripting (XSS)

    vega-interpreter is a CSP-compliant interpreter for Vega expressions.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the toString function in environments where the VEGA_DEBUG global variable is present. An attacker can execute arbitrary JavaScript code by supplying crafted Vega JSON definitions that abuse expression evaluation.

    Note:

    This is only exploitable if the application attaches the library and a View instance to the global window object and allows user-defined JSON definitions.

    How to fix Cross-site Scripting (XSS)?

    Upgrade vega-interpreter to version 1.2.1, 2.2.1 or higher.

    <1.2.1>=2.0.0 <2.2.1