stryker-net icon indicating copy to clipboard operation
stryker-net copied to clipboard

xunit.runner.visualstudio.2.4.1.nupkg: 2 vulnerabilities (highest severity is: 7.5)

Open mend-bolt-for-github[bot] opened this issue 3 years ago • 2 comments

Vulnerable Library - xunit.runner.visualstudio.2.4.1.nupkg

Path to dependency file: /integrationtest/TargetProjects/TestProjectFiles/TestProject.XUnit.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg,/tmp/ws-ua_20220928070811_PCCKYJ/dotnet_OGOAUS/20220928070811/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg

Found in HEAD commit: 92570ac5551c7bca5e4b3d84e62243fd156d745b

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
CVE-2019-0820 High 7.5 system.text.regularexpressions.4.1.0.nupkg Transitive N/A
WS-2022-0161 High 7.5 newtonsoft.json.9.0.1.nupkg Transitive N/A

Details

CVE-2019-0820

Vulnerable Library - system.text.regularexpressions.4.1.0.nupkg

Provides the System.Text.RegularExpressions.Regex class, an implementation of a regular expression e...

Library home page: https://api.nuget.org/packages/system.text.regularexpressions.4.1.0.nupkg

Path to dependency file: /src/Stryker.Core/Stryker.Core.UnitTest/Stryker.Core.UnitTest.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.text.regularexpressions/4.1.0/system.text.regularexpressions.4.1.0.nupkg,/tmp/ws-ua_20220928070811_PCCKYJ/dotnet_OGOAUS/20220928070811/system.text.regularexpressions/4.1.0/system.text.regularexpressions.4.1.0.nupkg

Dependency Hierarchy:

  • xunit.runner.visualstudio.2.4.1.nupkg (Root Library)
    • microsoft.net.test.sdk.16.0.1.nupkg
      • microsoft.testplatform.testhost.16.0.1.nupkg
        • microsoft.testplatform.objectmodel.16.0.1.nupkg
          • system.xml.xpath.xmldocument.4.0.1.nupkg
            • system.xml.xmldocument.4.0.1.nupkg
              • system.xml.readerwriter.4.0.11.nupkg
                • :x: system.text.regularexpressions.4.1.0.nupkg (Vulnerable Library)

Found in HEAD commit: 92570ac5551c7bca5e4b3d84e62243fd156d745b

Found in base branch: master

Vulnerability Details

A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981. Mend Note: After conducting further research, Mend has determined that CVE-2019-0820 only affects environments with versions 4.3.0 and 4.3.1 only on netcore50 environment of system.text.regularexpressions.nupkg.

Publish Date: 2019-05-16

URL: CVE-2019-0820

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-cmhx-cq75-c4mj

Release Date: 2019-05-16

Fix Resolution: System.Text.RegularExpressions - 4.3.1

Step up your Open Source Security Game with Mend here

WS-2022-0161

Vulnerable Library - newtonsoft.json.9.0.1.nupkg

Json.NET is a popular high-performance JSON framework for .NET

Library home page: https://api.nuget.org/packages/newtonsoft.json.9.0.1.nupkg

Path to dependency file: /src/Stryker.Core/Stryker.Core.UnitTest/Stryker.Core.UnitTest.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg,/tmp/ws-ua_20220928070811_PCCKYJ/dotnet_OGOAUS/20220928070811/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg

Dependency Hierarchy:

  • xunit.runner.visualstudio.2.4.1.nupkg (Root Library)
    • microsoft.net.test.sdk.16.0.1.nupkg
      • microsoft.testplatform.testhost.16.0.1.nupkg
        • :x: newtonsoft.json.9.0.1.nupkg (Vulnerable Library)

Found in HEAD commit: 92570ac5551c7bca5e4b3d84e62243fd156d745b

Found in base branch: master

Vulnerability Details

Improper Handling of Exceptional Conditions in Newtonsoft.Json. Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of StackOverFlow exception (SOE) whenever nested expressions are being processed. Exploiting this vulnerability results in Denial Of Service (DoS), and it is exploitable when an attacker sends 5 requests that cause SOE in time frame of 5 minutes. This vulnerability affects Internet Information Services (IIS) Applications.

Publish Date: 2022-06-22

URL: WS-2022-0161

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2022-06-22

Fix Resolution: Newtonsoft.Json - 13.0.1;Microsoft.Extensions.ApiDescription.Server - 6.0.0

Step up your Open Source Security Game with Mend here

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.