0

White-source has reported high security issue with following libraries for yargs-parser for my repo:

1. build-angular-0.13.8.tgz (Root Library)
       node-sass-4.11.0.tgz
           sass-graph-2.2.4.tgz
               yargs-7.1.0.tgz
                   yargs-parser-5.0.0.tgz (Vulnerable Library)



 2. build-angular-0.13.8.tgz (Root Library)
        webpack-dev-server-3.1.14.tgz
            yargs-12.0.2.tgz
                yargs-parser-10.1.0.tgz (Vulnerable Library)


 3. protractor-6.0.0.tgz (Root Library)
        webdriver-manager-13.0.0.tgz
            yargs-12.0.5.tgz
                yargs-parser-11.1.1.tgz (Vulnerable Library)

 4. compiler-cli-7.2.14.tgz (Root Library)
        yargs-9.0.1.tgz
            yargs-parser-7.0.0.tgz (Vulnerable Library)

Affected versions of yargs-parser are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of Object, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument --foo.proto.bar baz' adds a bar property with value baz to all objects. This is only exploitable if attackers have control over the arguments being passed to yargs-parser.

Whitesource has suggested this fix: yargs-parser/v/18.1.2 , yargs-parser/v/15.0.1

Need suggestion to resolve this issue. I mean which yargs-parser I should use and how?

4

0 回答 0