handlebars-source 1.3.0

3 security vulnerabilities found in version 1.3.0

Prototype Pollution in handlebars

critical severity CVE-2021-23383
critical severity CVE-2021-23383
Patched versions: >= 4.7.7

The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source. This vulnerability has been assigned the CVE identifier CVE-2021-23383.

Remote code execution in handlebars when compiling templates

critical severity CVE-2021-23369
critical severity CVE-2021-23369
Patched versions: >= 4.7.7

The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source. This vulnerability has been assigned the CVE identifier CVE-2021-23369.

handlebars.js - quoteless attributes in templates can lead to XSS

high severity OSVDB-131671
high severity OSVDB-131671
Patched versions: >= 4.0.0

The upstream 'handlebars' node.js module was found to not properly escape equals (=) signs, leading to possible content injection via attributes in templates.

Example:

  • Template:
  • Input: { 'foo' : 'test.com onload=alert(1)'}
  • Rendered result:

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.