comms-router icon indicating copy to clipboard operation
comms-router copied to clipboard

vue-2.5.16.tgz: 2 vulnerabilities (highest severity is: 6.1) reachable

Open mend-for-github-com[bot] opened this issue 3 years ago • 2 comments

Vulnerable Library - vue-2.5.16.tgz

Reactive, component-oriented view layer for modern web interfaces.

Library home page: https://registry.npmjs.org/vue/-/vue-2.5.16.tgz

Path to dependency file: /applications/gui/package.json

Path to vulnerable library: /applications/gui/node_modules/vue/package.json

Found in HEAD commit: 4e5656db54be4b22481fe3774c2caeba51bac190

Vulnerabilities

Vulnerability Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (vue version) Remediation Possible** Reachability
CVE-2024-9506 Low 3.7 Not Defined 0.1% vue-2.5.16.tgz Direct 3.0.0

Reachable

WS-2018-0162 Medium 6.1 Not Defined vue-2.5.16.tgz Direct 2.5.17

Unreachable

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-9506

Vulnerable Library - vue-2.5.16.tgz

Reactive, component-oriented view layer for modern web interfaces.

Library home page: https://registry.npmjs.org/vue/-/vue-2.5.16.tgz

Path to dependency file: /applications/gui/package.json

Path to vulnerable library: /applications/gui/node_modules/vue/package.json

Dependency Hierarchy:

  • :x: vue-2.5.16.tgz (Vulnerable Library)

Found in HEAD commit: 4e5656db54be4b22481fe3774c2caeba51bac190

Found in base branch: main

Reachability Analysis

This vulnerability is potentially reachable

comms_router_gui-1.0.0/client/app.js (Application)
  -> ❌ vue-2.5.16/dist/vue.runtime.common.js (Vulnerable Component)

Vulnerability Details

Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.

Publish Date: 2024-10-15

URL: CVE-2024-9506

Threat Assessment

Exploit Maturity: Not Defined

EPSS: 0.1%

CVSS 3 Score Details (3.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-5j4c-8p2g-v4jx

Release Date: 2024-10-15

Fix Resolution: 3.0.0

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

WS-2018-0162

Vulnerable Library - vue-2.5.16.tgz

Reactive, component-oriented view layer for modern web interfaces.

Library home page: https://registry.npmjs.org/vue/-/vue-2.5.16.tgz

Path to dependency file: /applications/gui/package.json

Path to vulnerable library: /applications/gui/node_modules/vue/package.json

Dependency Hierarchy:

  • :x: vue-2.5.16.tgz (Vulnerable Library)

Found in HEAD commit: 4e5656db54be4b22481fe3774c2caeba51bac190

Found in base branch: main

Reachability Analysis

The vulnerable code is unreachable

Vulnerability Details

Vue.js before 2.5.17 vesion in vue poject have potential xss in ssr when using v-bind.

Publish Date: 2018-08-01

URL: WS-2018-0162

Threat Assessment

Exploit Maturity: Not Defined

EPSS:

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2018-08-01

Fix Resolution: 2.5.17

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.


:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.