axios icon indicating copy to clipboard operation
axios copied to clipboard

CVE-2017-16113 (High) detected in parsejson-0.0.3.tgz

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 4 comments

CVE-2017-16113 - High Severity Vulnerability

Vulnerable Library - parsejson-0.0.3.tgz

Method that parses a JSON string and returns a JSON object

Library home page: https://registry.npmjs.org/parsejson/-/parsejson-0.0.3.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/parsejson/package.json

Dependency Hierarchy:

  • karma-0.13.22.tgz (Root Library)
    • socket.io-1.7.4.tgz
      • socket.io-client-1.7.4.tgz
        • engine.io-client-1.8.6.tgz
          • :x: parsejson-0.0.3.tgz (Vulnerable Library)

Found in HEAD commit: 91ceb6046aaa22e9934ed13ea5acba9c988c490c

Found in base branch: master

Vulnerability Details

The parsejson module is vulnerable to regular expression denial of service when untrusted user input is passed into it to be parsed.

Publish Date: 2018-06-07

URL: CVE-2017-16113

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.