OpenSearch-Dashboards
OpenSearch-Dashboards copied to clipboard
CVE-2021-33623 (High) detected in trim-newlines-1.0.0.tgz
CVE-2021-33623 - High Severity Vulnerability
Vulnerable Library - trim-newlines-1.0.0.tgz
Trim newlines from the start and/or end of a string
Library home page: https://registry.npmjs.org/trim-newlines/-/trim-newlines-1.0.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- @osd/storybook-1.0.0.tgz (Root Library)
- core-6.5.16.tgz
- core-server-6.5.16.tgz
- x-default-browser-0.4.0.tgz
- default-browser-id-1.0.4.tgz
- meow-3.7.0.tgz
- :x: trim-newlines-1.0.0.tgz (Vulnerable Library)
- meow-3.7.0.tgz
- default-browser-id-1.0.4.tgz
- x-default-browser-0.4.0.tgz
- core-server-6.5.16.tgz
- core-6.5.16.tgz
Found in HEAD commit: 4fd064970b66ce555f48c22dfab6ed965d0e260a
Found in base branch: main
Vulnerability Details
The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
Publish Date: 2021-05-28
URL: CVE-2021-33623
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623
Release Date: 2021-05-28
Fix Resolution: trim-newlines - 3.0.1, 4.0.1