InReach
InReach copied to clipboard
@weareinreach/crowdin-0.100.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
Vulnerable Library - @weareinreach/crowdin-0.100.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/.pnpm/[email protected]/node_modules/axios/package.json
Found in HEAD commit: d4411ce199ea74731eb3ad9e60e341584bdf214d
Vulnerabilities
CVE | Severity | ![]() |
Dependency | Type | Fixed in (@weareinreach/crowdin version) | Remediation Possible** |
---|---|---|---|---|---|---|
CVE-2024-39338 | ![]() |
7.5 | axios-1.7.2.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-39338
Vulnerable Library - axios-1.7.2.tgz
Library home page: https://registry.npmjs.org/axios/-/axios-1.7.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/.pnpm/[email protected]/node_modules/axios/package.json
Dependency Hierarchy:
- @weareinreach/crowdin-0.100.0.tgz (Root Library)
- crowdin-api-client-1.35.0.tgz
- :x: axios-1.7.2.tgz (Vulnerable Library)
- crowdin-api-client-1.35.0.tgz
Found in HEAD commit: d4411ce199ea74731eb3ad9e60e341584bdf214d
Found in base branch: dev
Vulnerability Details
axios 1.3.2 to 1.7.3 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative URLs.
Publish Date: 2024-08-09
URL: CVE-2024-39338
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Step up your Open Source Security Game with Mend here