{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2020-15366","title":"Title"},{"category":"description","text":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2020-15366","url":"https://www.suse.com/security/cve/CVE-2020-15366"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"title":"SUSE CVE CVE-2020-15366","tracking":{"current_release_date":"2025-04-25T05:26:42Z","generator":{"date":"2023-10-31T02:29:30Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2020-15366","initial_release_date":"2023-10-31T02:29:30Z","revision_history":[{"date":"2023-10-31T02:29:30Z","number":"2","summary":"Current version"},{"date":"2025-01-01T05:28:39Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:07:46Z","number":"4","summary":"Current version"},{"date":"2025-02-17T06:28:31Z","number":"5","summary":"Current version"},{"date":"2025-03-15T09:51:22Z","number":"6","summary":"Current version"},{"date":"2025-04-25T05:26:42Z","number":"7","summary":"Current version"}],"status":"interim","version":"7"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Liberty Linux 8","product":{"name":"SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8","product_identification_helper":{"cpe":"cpe:/o:suse:sll:8"}}},{"category":"product_version","name":"nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","product":{"name":"nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_id":"nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_identification_helper":{"cpe":"cpe:2.3:a:nodejs:node.js:14.15.4:*:*:*:-:*:*:*","purl":"pkg:rpm/suse/nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381@"}}},{"category":"product_version","name":"nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","product":{"name":"nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_id":"nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381@"}}},{"category":"product_version","name":"nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","product":{"name":"nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_id":"nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381@"}}},{"category":"product_version","name":"nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","product":{"name":"nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_id":"nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381@"}}},{"category":"product_version","name":"nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","product":{"name":"nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","product_id":"nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83@"}}},{"category":"product_version","name":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","product":{"name":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","product_id":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","product_identification_helper":{"purl":"pkg:rpm/suse/nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83@"}}},{"category":"product_version","name":"npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381","product":{"name":"npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381","product_id":"npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381","product_identification_helper":{"purl":"pkg:rpm/suse/npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381@"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381"},"product_reference":"nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381"},"product_reference":"nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381"},"product_reference":"nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381"},"product_reference":"nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83"},"product_reference":"nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83"},"product_reference":"nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","relates_to_product_reference":"SUSE Liberty Linux 8"},{"category":"default_component_of","full_product_name":{"name":"npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 as component of SUSE Liberty Linux 8","product_id":"SUSE Liberty Linux 8:npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381"},"product_reference":"npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381","relates_to_product_reference":"SUSE Liberty Linux 8"}]},"vulnerabilities":[{"cve":"CVE-2020-15366","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2020-15366"}],"notes":[{"category":"general","text":"An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)","title":"CVE description"}],"product_status":{"recommended":["SUSE Liberty Linux 8:nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381"]},"references":[{"category":"external","summary":"CVE-2020-15366","url":"https://www.suse.com/security/cve/CVE-2020-15366"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Liberty Linux 8:nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381"]}],"scores":[{"cvss_v3":{"baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"products":["SUSE Liberty Linux 8:nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381","SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83","SUSE Liberty Linux 8:npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381"]}],"threats":[{"category":"impact","date":"2020-07-16T03:32:49Z","details":"moderate"}],"title":"CVE-2020-15366"}]}