Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j438-45hc-vjhm

Опубликовано: 16 апр. 2020
Источник: github
Github: Прошло ревью
CVSS3: 4.8

Описание

CSRF and DNS Rebinding in Oasis

Impact

What kind of vulnerability is it? Who is impacted?

If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use DNS rebinding and CSRF attacks to read/write to vulnerable applications.

There is no evidence that suggests that this has been used in the wild.

Patches

Has the problem been patched? What versions should users upgrade to?

Yes, 2.15.0.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

No.

References

Are there any links users can visit to find out more?

No.

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

@fraction/oasis

npm
Затронутые версииВерсия исправления

< 2.15.0

2.15.0

EPSS

Процентиль: 34%
0.00138
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 4.8
nvd
почти 6 лет назад

Oasis before version 2.15.0 has a potential DNS rebinding or CSRF vulnerability. If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use DNS rebinding and CSRF attacks to read/write to vulnerable applications. This has been patched in 2.15.0.

EPSS

Процентиль: 34%
0.00138
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-352