The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can bypass restrictions via Prototype Pollution of Node.js mixin-deep, in order to escalate his privileges.
Impacted systems: Fedora, Nodejs Modules ~ not comprehensive, RHEL.
Severity of this alert: 2/4.
Creation date: 10/02/2020.
Références of this alert: CVE-2019-10746, FEDORA-2020-4a8f110332, FEDORA-2020-f80e5c0d65, RHSA-2021:0485-01, RHSA-2021:0549-01, VIGILANCE-VUL-31565.
Description of the vulnerability 
An attacker can bypass restrictions via Prototype Pollution of Node.js mixin-deep, in order to escalate his privileges. Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This vulnerability note impacts software or systems such as Fedora, Nodejs Modules ~ not comprehensive, RHEL.
Our Vigil@nce team determined that the severity of this cybersecurity vulnerability is medium.
The trust level is of type confirmed by the editor, with an origin of document.
An attacker with a expert ability can exploit this computer threat note.
Solutions for this threat 
Node.js mixin-deep: versions 1.3.2 and 2.0.1.
Versions 1.3.2 and 2.0.1 are fixed:
https://www.npmjs.com/package/mixin-deep
Fedora: new nodejs-mixin-deep packages.
New packages are available:
Fedora 30: nodejs-mixin-deep 1.3.2-1.fc30
Fedora 31: nodejs-mixin-deep 1.3.2-1.fc31
RHEL 7: new rh-nodejs12-nodejs packages.
New packages are available:
RHEL 7.0-7.9: rh-nodejs12-nodejs 12.20.1-1.el7
RHEL 8: new nodejs-12 module.
The following module is updated:
RHEL 8 Module: nodejs:12
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides systems vulnerabilities alerts. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.
|