CVE-2015-8857: Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js
(updated )
The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript.
References
- www.openwall.com/lists/oss-security/2016/04/20/11
- github.com/advisories/GHSA-34r7-q49f-h37c
- github.com/lautis/uglifier/commit/4677bfe38142937ff952f95605bcec4618892c3e
- github.com/mishoo/UglifyJS2/issues/751
- github.com/rubysec/ruby-advisory-db/blob/master/gems/uglifier/CVE-2015-8857.yml
- nvd.nist.gov/vuln/detail/CVE-2015-8857
- web.archive.org/web/20200227190830/http://www.securityfocus.com/bid/96410
- zyan.scripts.mit.edu/blog/backdooring-js/
Detect and mitigate CVE-2015-8857 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →