Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-5484
Modified
More InfoOfficial Page
Source-support@hackerone.com
View Known Exploited Vulnerability (KEV) details
Published At-13 Sep, 2019 | 18:15
Updated At-07 Nov, 2023 | 03:11

Bower before 1.8.8 has a path traversal vulnerability permitting file write in arbitrary locations via install command, which allows attackers to write arbitrary files when a malicious package is extracted.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

bower
bower
>>bower>>Versions before 1.8.8(exclusive)
cpe:2.3:a:bower:bower:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE-22Secondarysupport@hackerone.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3support@hackerone.com
Patch
https://hackerone.com/reports/473811support@hackerone.com
Exploit
Patch
Third Party Advisory
https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3%40%3Ccommits.netbeans.apache.org%3Esupport@hackerone.com
N/A
https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63%40%3Cnotifications.netbeans.apache.org%3Esupport@hackerone.com
N/A
https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extractionsupport@hackerone.com
Exploit
Third Party Advisory
Change History
0Changes found

Details not found