zc_plugin_dm
zc_plugin_dm copied to clipboard
CVE-2024-43799 (Medium) detected in send-0.17.1.tgz
CVE-2024-43799 - Medium Severity Vulnerability
Vulnerable Library - send-0.17.1.tgz
Better streaming static file server with Range and conditional-GET support
Library home page: https://registry.npmjs.org/send/-/send-0.17.1.tgz
Path to dependency file: /dmreactplugin/package.json
Path to vulnerable library: /dmreactplugin/package.json
Dependency Hierarchy:
- react-scripts-4.0.3.tgz (Root Library)
- webpack-dev-server-3.11.1.tgz
- express-4.17.1.tgz
- :x: send-0.17.1.tgz (Vulnerable Library)
- express-4.17.1.tgz
- webpack-dev-server-3.11.1.tgz
Found in HEAD commit: 41f949b863ead7c74b72a01845dbe0d88c24a364
Found in base branch: main
Vulnerability Details
Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.
Publish Date: 2024-09-10
URL: CVE-2024-43799
CVSS 3 Score Details (5.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://github.com/pillarjs/send/security/advisories/GHSA-m6fv-jmcg-4jfg
Release Date: 2024-09-10
Fix Resolution (send): 0.19.0
Direct dependency fix Resolution (react-scripts): 5.0.0
Step up your Open Source Security Game with Mend here