CVE-2022-0436
Published: 12 April 2022
Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2.
Priority
Status
Package | Release | Status |
---|---|---|
grunt Launchpad, Ubuntu, Debian |
bionic |
Released
(1.0.1-8ubuntu0.1+esm1)
|
focal |
Released
(1.0.4-2ubuntu0.1~esm1)
|
|
impish |
Ignored
(reached end-of-life)
|
|
jammy |
Released
(1.4.1-2ubuntu0.1~esm1)
|
|
kinetic |
Not vulnerable
(1.5.3-1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.5.2)
|
|
xenial |
Does not exist
|
|
Patches: upstream: https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665 upstream: https://github.com/gruntjs/grunt/commit/04b960e27151869312dd7e5686a7d39baa85ed0d upstream: https://github.com/gruntjs/grunt/commit/2e9161caa25c430fa8423cc14f5b67733c402bcd upstream: https://github.com/gruntjs/grunt/commit/47d32de552e9d8445f2b50f2dcf764510e84d24b upstream: https://github.com/gruntjs/grunt/commit/0652305f1b79dfdc85a9bd0f2e78ca1e9ae795f5 upstream: https://github.com/gruntjs/grunt/commit/433f91b78df99d83daa6f56a5505ead743627c30 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0436
- https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665 (v1.5.0)
- https://github.com/gruntjs/grunt/pull/1740
- https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b
- https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665
- https://ubuntu.com/security/notices/USN-5847-1
- NVD
- Launchpad
- Debian