CVE-2020-28479:Denial of Service vulnerability in JointJS before version 3.3.0 via the unsetByPath function.

splash
Back

Description Preview

JointJS versions prior to 3.3.0 contain a vulnerability that allows attackers to cause a Denial of Service (DoS) condition through the unsetByPath function. This vulnerability could potentially be exploited to disrupt application functionality or cause system crashes when processing specially crafted input.

Overview

JointJS is a JavaScript diagramming library that is used for creating interactive diagrams and visualizations. The vulnerability exists in the unsetByPath function which can be exploited to cause a denial of service condition. When processing certain inputs, the function may enter an infinite loop or consume excessive resources, leading to application unresponsiveness or crashes. This affects all versions of JointJS prior to 3.3.0, including packages distributed through npm and bower repositories.

Remediation

Users should upgrade to JointJS version 3.3.0 or later which contains a fix for this vulnerability. If upgrading is not immediately possible, consider implementing input validation before passing data to the unsetByPath function to ensure that only expected and safe inputs are processed. Additionally, implementing resource usage monitoring and limits can help mitigate the impact of attempted exploits.

For Java projects using the affected package through WebJars:

  • Update org.webjars.bower:jointjs to version 3.3.0 or later
  • Update org.webjars.npm:jointjs to version 3.3.0 or later

For JavaScript projects:

  • Update jointjs to version 3.3.0 or later using npm or yarn

References

  1. JointJS v3.3.0 Release Notes: https://github.com/clientIO/joint/releases/tag/v3.3.0
  2. Snyk Advisory for JavaScript: https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038
  3. Snyk Advisory for Java (WebJars Bower): https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040
  4. Snyk Advisory for Java (WebJars NPM): https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  5. Construction
    Construction
  6. Educational Services
    Educational Services
  7. Finance and Insurance
    Finance and Insurance
  8. Health Care & Social Assistance
    Health Care & Social Assistance
  9. Information
    Information
  10. Management of Companies & Enterprises
    Management of Companies & Enterprises
  11. Manufacturing
    Manufacturing
  12. Mining
    Mining
  13. Other Services (except Public Administration)
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  15. Public Administration
    Public Administration
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database