Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2023-26487
March 03, 2023
Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs."lassoAppend' function accepts 3 arguments and internally invokes "push"function on the 1st argument specifying array consisting of 2nd and 3rd arguments as"push"call argument. The type of the 1st argument is supposed to be an array, but it's not enforced. This makes it possible to specify any object with a"push"function as the 1st argument,"push"function can be set to any function that can be access via"event.view"(no all such functions can be exploited due to invalid context or signature, but some can, e.g."console.log"). The issue is that"lassoAppend"doesn't enforce proper types of its arguments. This issue opens various XSS vectors, but exact impact and severity depends on the environment (e.g. Core JS"setImmediate"polyfill basically allows"eval`-like functionality). This issue was patched in 5.23.0.
Affected Packages
vega (CDN_JS):
Affected version(s) >=1.0.0 <5.23.0
Fix Suggestion:
Update to version 5.23.0
vega (NPM):
Affected version(s) >=1.0.0 <5.23.0
Fix Suggestion:
Update to version 5.23.0
vega-functions (NPM):
Affected version(s) >=5.0.0 <5.13.1
Fix Suggestion:
Update to version 5.13.1
Additional Notes
The description of this vulnerability differs from MITRE.
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
EPSS
Base Score:
0.2