Severity: low

Prototype Pollution

yargs-parser

Overview

Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument --foo.__proto__.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.

Remediation

Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.

Resources

Have content suggestions? Visit npmjs.com/support.

Advisory timeline

  1. published

    Advisory Published
    May 1st, 2020
  2. reported

    Reported by Snyk Security Team
    Mar 26th, 2020