<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2020-15366</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2020-15366</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>4</Number>
        <Date>2025-02-17T01:23:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-10-31T00:35:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-17T01:23:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2020-15366</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Liberty Linux 8">
      <Branch Type="Product Name" Name="SUSE Liberty Linux 8">
        <FullProductName ProductID="SUSE Liberty Linux 8" CPE="cpe:/o:suse:sll:8">SUSE Liberty Linux 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381">
      <FullProductName ProductID="nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381" CPE="cpe:2.3:a:nodejs:node.js:14.15.4:*:*:*:-:*:*:*">nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381">
      <FullProductName ProductID="nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381">
      <FullProductName ProductID="nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381">
      <FullProductName ProductID="nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83">
      <FullProductName ProductID="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83">nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83">
      <FullProductName ProductID="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83">nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381">
      <FullProductName ProductID="npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381">npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381">nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83">nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83">nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381" RelationType="Default Component Of" RelatesToProductReference="SUSE Liberty Linux 8">
      <FullProductName ProductID="SUSE Liberty Linux 8:npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381">npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381 as a component of SUSE Liberty Linux 8</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)</Note>
    </Notes>
    <CVE>CVE-2020-15366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Liberty Linux 8:nodejs-14.15.4-2.module+el8.3.0+9635+ffdf8381</ProductID>
        <ProductID>SUSE Liberty Linux 8:nodejs-devel-14.15.4-2.module+el8.3.0+9635+ffdf8381</ProductID>
        <ProductID>SUSE Liberty Linux 8:nodejs-docs-14.15.4-2.module+el8.3.0+9635+ffdf8381</ProductID>
        <ProductID>SUSE Liberty Linux 8:nodejs-full-i18n-14.15.4-2.module+el8.3.0+9635+ffdf8381</ProductID>
        <ProductID>SUSE Liberty Linux 8:nodejs-nodemon-2.0.3-1.module+el8.3.0+6519+9f98ed83</ProductID>
        <ProductID>SUSE Liberty Linux 8:nodejs-packaging-23-3.module+el8.3.0+6519+9f98ed83</ProductID>
        <ProductID>SUSE Liberty Linux 8:npm-6.14.10-1.14.15.4.2.module+el8.3.0+9635+ffdf8381</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.8</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.6</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
