Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

同学,您这个项目引入了1068个开源组件,存在39个漏洞,辛苦升级一下 #52

Open
ghost opened this issue Mar 11, 2022 · 1 comment

Comments

@ghost
Copy link

ghost commented Mar 11, 2022

检测到 tonytonyjan/TJDict 一共引入了1068个开源组件,存在39个漏洞

漏洞标题:serialize-javascript 代码问题漏洞
缺陷组件:[email protected]
漏洞编号:CVE-2020-7660
漏洞描述:Verizon serialize-javascript是美国威瑞森电信(Verizon)公司的一款支持将JavaScript序列化为 JSON超集的软件包。
serialize-javascript 3.1.0之前版本中存在代码问题漏洞。远程攻击者可借助index.js文件中的‘deleteFunctions’函数利用该漏洞注入任意代码。
国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2020-53801
影响范围:(∞, 3.1.0)
最小修复版本:3.1.0
缺陷组件引入路径:@->@storybook/[email protected]>[email protected]>[email protected]>[email protected]
@->@storybook/[email protected]>@storybook/[email protected]>[email protected]>[email protected]>[email protected]
@->@storybook/[email protected]>@storybook/[email protected]>[email protected]>[email protected]
@->[email protected]>[email protected]

另外还有39个漏洞,详细报告:https://mofeisec.com/jr?p=ic6a8a

@kwaicssec
Copy link

@tonytonyjan,同学,您好,上面的漏洞报告是我IDE运行时,安全插件提示您这个项目存在的几个漏洞的报告,辛苦您修复一下哈,担心其他人也会用到你这个项目,从而引入这些漏洞。:)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants
@kwaicssec and others