The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can bypass restrictions via Prototype Pollution of Node.js set-value, in order to escalate his privileges.
Vulnerable products: Fedora, Nodejs Modules ~ not comprehensive, RHEL.
Severity of this weakness: 2/4.
Creation date: 10/02/2020.
Références of this bulletin: CVE-2019-10747, FEDORA-2020-1f1c94907b, FEDORA-2020-582515fa8a, RHSA-2021:0485-01, RHSA-2021:0549-01, VIGILANCE-VUL-31566.
Description of the vulnerability 
An attacker can bypass restrictions via Prototype Pollution of Node.js set-value, in order to escalate his privileges. Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This security alert impacts software or systems such as Fedora, Nodejs Modules ~ not comprehensive, RHEL.
Our Vigil@nce team determined that the severity of this security weakness is medium.
The trust level is of type confirmed by the editor, with an origin of document.
An attacker with a expert ability can exploit this security announce.
Solutions for this threat 
Node.js set-value: versions 2.0.1 and 3.0.1.
Versions 2.0.1 and 3.0.1 are fixed:
https://snyk.io/vuln/npm:set-value
Fedora: new nodejs-set-value packages.
New packages are available:
Fedora 30: nodejs-set-value 2.0.1-1.fc30
Fedora 31: nodejs-set-value 2.0.1-1.fc31
RHEL 7: new rh-nodejs12-nodejs packages.
New packages are available:
RHEL 7.0-7.9: rh-nodejs12-nodejs 12.20.1-1.el7
RHEL 8: new nodejs-12 module.
The following module is updated:
RHEL 8 Module: nodejs:12
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides an application vulnerability alert. The technology watch team tracks security threats targeting the computer system.
|