axios icon indicating copy to clipboard operation
axios copied to clipboard

CVE-2024-21536 (High) detected in http-proxy-middleware-0.17.4.tgz

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 0 comments

CVE-2024-21536 - High Severity Vulnerability

Vulnerable Library - http-proxy-middleware-0.17.4.tgz

The one-liner node.js proxy middleware for connect, express and browser-sync

Library home page: https://registry.npmjs.org/http-proxy-middleware/-/http-proxy-middleware-0.17.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/http-proxy-middleware/package.json

Dependency Hierarchy:

  • webpack-dev-server-1.16.5.tgz (Root Library)
    • :x: http-proxy-middleware-0.17.4.tgz (Vulnerable Library)

Found in HEAD commit: 91ceb6046aaa22e9934ed13ea5acba9c988c490c

Found in base branch: master

Vulnerability Details

Versions of the package http-proxy-middleware before 2.0.7, from 3.0.0 and before 3.0.3 are vulnerable to Denial of Service (DoS) due to an UnhandledPromiseRejection error thrown by micromatch. An attacker could kill the Node.js process and crash the server by making requests to certain paths.

Publish Date: 2024-10-19

URL: CVE-2024-21536

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-21536

Release Date: 2024-10-19

Fix Resolution: http-proxy-middleware - 2.0.7,3.0.3


Step up your Open Source Security Game with Mend here