documentation icon indicating copy to clipboard operation
documentation copied to clipboard

core-2.0.1.tgz: 3 vulnerabilities (highest severity is: 7.5)

Open mend-for-github-com[bot] opened this issue 3 years ago • 0 comments

Vulnerable Library - core-2.0.1.tgz

Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
CVE-2022-25858 High 7.5 terser-5.13.1.tgz Transitive N/A
CVE-2020-7753 High 7.5 trim-0.0.1.tgz Transitive N/A
CVE-2022-33987 Medium 5.3 got-9.6.0.tgz Transitive N/A

Details

CVE-2022-25858

Vulnerable Library - terser-5.13.1.tgz

JavaScript parser, mangler/compressor and beautifier toolkit for ES6+

Library home page: https://registry.npmjs.org/terser/-/terser-5.13.1.tgz

Dependency Hierarchy:

  • core-2.0.1.tgz (Root Library)
    • html-minifier-terser-6.1.0.tgz
      • :x: terser-5.13.1.tgz (Vulnerable Library)

Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c

Found in base branch: master

Vulnerability Details

The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.

Publish Date: 2022-07-15

URL: CVE-2022-25858

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858

Release Date: 2022-07-15

Fix Resolution: terser - 4.8.1,5.14.2

CVE-2020-7753

Vulnerable Library - trim-0.0.1.tgz

Trim string whitespace

Library home page: https://registry.npmjs.org/trim/-/trim-0.0.1.tgz

Dependency Hierarchy:

  • core-2.0.1.tgz (Root Library)
    • mdx-loader-2.0.1.tgz
      • mdx-1.6.22.tgz
        • remark-parse-8.0.3.tgz
          • :x: trim-0.0.1.tgz (Vulnerable Library)

Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c

Found in base branch: master

Vulnerability Details

All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().

Publish Date: 2020-10-27

URL: CVE-2020-7753

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-10-27

Fix Resolution: trim - 0.0.3

CVE-2022-33987

Vulnerable Library - got-9.6.0.tgz

Simplified HTTP requests

Library home page: https://registry.npmjs.org/got/-/got-9.6.0.tgz

Dependency Hierarchy:

  • core-2.0.1.tgz (Root Library)
    • update-notifier-5.1.0.tgz
      • latest-version-5.1.0.tgz
        • package-json-6.5.0.tgz
          • :x: got-9.6.0.tgz (Vulnerable Library)

Found in HEAD commit: eb5c6b3850490c8aa859d6f9414b6feb25c3be1c

Found in base branch: master

Vulnerability Details

The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.

Publish Date: 2022-06-18

URL: CVE-2022-33987

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987

Release Date: 2022-06-18

Fix Resolution: got - 11.8.5,12.1.0