{
  "threat_severity" : "Moderate",
  "public_date" : "2020-05-04T00:00:00Z",
  "bugzilla" : {
    "description" : "npm-serialize-javascript: XSS via unsafe characters in serialized regular expressions",
    "id" : "1848092",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1848092"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-79",
  "details" : [ "The serialize-javascript npm package before version 2.1.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.", "A XSS flaw was found in npm-serialize-javascript. It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.toString() backslash-escapes all forward slashes in regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability." ],
  "statement" : "In both OpenShift Container Platform (OCP) and OpenShift ServiceMesh (OSSM), the grafana and prometheus containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable serialize-javascript library to authenticated users only, therefore the impact is low.",
  "affected_release" : [ {
    "product_name" : "OpenShift Service Mesh 1.1",
    "release_date" : "2020-07-01T00:00:00Z",
    "advisory" : "RHSA-2020:2796",
    "cpe" : "cpe:/a:redhat:service_mesh:1.1::el8",
    "package" : "servicemesh-grafana-0:6.4.3-11.el8",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.6",
    "release_date" : "2020-10-27T00:00:00Z",
    "advisory" : "RHSA-2020:4298",
    "cpe" : "cpe:/a:redhat:openshift:4.6::el8",
    "package" : "openshift4/ose-grafana:v4.6.0-202010061132.p0",
    "impact" : "low"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Fix deferred",
    "package_name" : "openshift4/ose-prometheus",
    "cpe" : "cpe:/a:redhat:openshift:4",
    "impact" : "low"
  }, {
    "product_name" : "Red Hat OpenShift Virtualization 1",
    "fix_state" : "Will not fix",
    "package_name" : "kubevirt-web-ui-container",
    "cpe" : "cpe:/a:redhat:container_native_virtualization:1"
  }, {
    "product_name" : "Red Hat Quay 3",
    "fix_state" : "Will not fix",
    "package_name" : "nodejs-serialize-javascript",
    "cpe" : "cpe:/a:redhat:quay:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2019-16769\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-16769" ],
  "name" : "CVE-2019-16769",
  "csaw" : false
}