SpotiByeAds icon indicating copy to clipboard operation
SpotiByeAds copied to clipboard

CVE-2020-7693 (Medium) detected in sockjs-0.3.19.tgz

Open mend-bolt-for-github[bot] opened this issue 4 years ago • 0 comments

CVE-2020-7693 - Medium Severity Vulnerability

Vulnerable Library - sockjs-0.3.19.tgz

SockJS-node is a server counterpart of SockJS-client a JavaScript library that provides a WebSocket-like object in the browser. SockJS gives you a coherent, cross-browser, Javascript API which creates a low latency, full duplex, cross-domain communication

Library home page: https://registry.npmjs.org/sockjs/-/sockjs-0.3.19.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/sockjs/package.json

Dependency Hierarchy:

  • build-angular-0.800.6.tgz (Root Library)
    • webpack-dev-server-3.3.1.tgz
      • :x: sockjs-0.3.19.tgz (Vulnerable Library)

Found in HEAD commit: 5ab87822afd91cf2c356b709e4d7762392cfc200

Found in base branch: master

Vulnerability Details

Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.

Publish Date: 2020-07-09

URL: CVE-2020-7693

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-07-14

Fix Resolution (sockjs): 0.3.20

Direct dependency fix Resolution (@angular-devkit/build-angular): 0.803.27


Step up your Open Source Security Game with Mend here