vid-to-speech-api-json icon indicating copy to clipboard operation
vid-to-speech-api-json copied to clipboard

CVE-2019-13173 (High) detected in fstream-1.0.11.tgz

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 0 comments

CVE-2019-13173 - High Severity Vulnerability

Vulnerable Library - fstream-1.0.11.tgz

Advanced file system stream things

Library home page: https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/grpc/node_modules/fstream/package.json

Dependency Hierarchy:

  • speech-1.1.0.tgz (Root Library)
    • google-gax-0.14.5.tgz
      • grpc-1.7.3.tgz
        • node-pre-gyp-0.6.39.tgz
          • tar-2.2.1.tgz
            • :x: fstream-1.0.11.tgz (Vulnerable Library)

Found in HEAD commit: f982a2ac7e2b2fffce4b4bc02af9d8eebfaf953b

Vulnerability Details

fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.

Publish Date: 2019-07-02

URL: CVE-2019-13173

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173

Release Date: 2019-07-02

Fix Resolution (fstream): 1.0.12

Direct dependency fix Resolution (@google-cloud/speech): 1.2.0


Step up your Open Source Security Game with Mend here