You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.
CVE-2019-16772 - Medium Severity Vulnerability
serialize objects to javascript
Library home page: https://registry.npmjs.org/serialize-to-js/-/serialize-to-js-1.2.2.tgz
Path to dependency file: /tmp/ws-scm/infinite/package.json
Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/serialize-to-js/package.json
Dependency Hierarchy:
Found in HEAD commit: f686a0f9119ce1b31715bd19e5a2f4705af80098
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.
Publish Date: 2019-12-07
URL: CVE-2019-16772
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16772
Release Date: 2019-12-07
Fix Resolution: v3.0.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: