CVE-2023-26486 (Medium) detected in vega-5.22.1.tgz, vega-functions-5.13.0.tgz #3526
Description
CVE-2023-26486 - Medium Severity Vulnerability
Vulnerable Libraries - vega-5.22.1.tgz, vega-functions-5.13.0.tgz
vega-5.22.1.tgz
The Vega visualization grammar.
Library home page: https://registry.npmjs.org/vega/-/vega-5.22.1.tgz
Dependency Hierarchy:
- ❌ vega-5.22.1.tgz (Vulnerable Library)
vega-functions-5.13.0.tgz
Custom functions for the Vega expression language.
Library home page: https://registry.npmjs.org/vega-functions/-/vega-functions-5.13.0.tgz
Dependency Hierarchy:
- vega-5.22.1.tgz (Root Library)
- ❌ vega-functions-5.13.0.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. The Vega scale
expression function has the ability to call arbitrary functions with a single controlled argument. The scale expression function passes a user supplied argument group to getScale, which is then used as if it were an internal context. The context.scales[name].value is accessed from group and called as a function back in scale. This can be exploited to escape the Vega expression sandbox in order to execute arbitrary JavaScript. This issue has been fixed in version 5.13.1.
Publish Date: 2023-03-04
URL: CVE-2023-26486
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-4vq7-882g-wcg4
Release Date: 2023-03-03
Fix Resolution: vega - 5.23.0, vega-functions - 5.13.1