CVE-2019-18413
Vulnerable Library - class-validator-0.13.1.tgz
Decorator-based property validation for classes.
Library home page: https://registry.npmjs.org/class-validator/-/class-validator-0.13.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/class-validator/package.json
Dependency Hierarchy:
- โ class-validator-0.13.1.tgz (Vulnerable Library)
Found in HEAD commit: ea1e16f3c638bffb5b7c0c62c4b47f4354b5e41f
Found in base branch: main
Vulnerability Details
In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
Publish Date: 2019-10-24
URL: CVE-2019-18413
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2019-18413
Release Date: 2019-10-24
Fix Resolution: 0.13.2
Step up your Open Source Security Game with Mend here