Alcumus / react-doc-viewer

Apache License 2.0
207 stars 101 forks source link

react-pdf-5.0.0.tgz: 2 vulnerabilities (highest severity is: 8.8) - autoclosed #138

Closed mend-for-github-com[bot] closed 1 month ago

mend-for-github-com[bot] commented 1 month ago
Vulnerable Library - react-pdf-5.0.0.tgz

Display PDFs in your React app as easily as if they were images.

Library home page: https://registry.npmjs.org/react-pdf/-/react-pdf-5.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/react-pdf/package.json

Found in HEAD commit: 76f7fe7c63b333ebe6937542bade08d541d2debd

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (react-pdf version) Remediation Possible**
CVE-2024-4367 High 8.8 pdfjs-dist-2.4.456.tgz Transitive N/A*
CVE-2024-34342 High 7.1 react-pdf-5.0.0.tgz Direct 8.0.2

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-4367 ### Vulnerable Library - pdfjs-dist-2.4.456.tgz

Generic build of Mozilla's PDF.js library.

Library home page: https://registry.npmjs.org/pdfjs-dist/-/pdfjs-dist-2.4.456.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/react-pdf/node_modules/pdfjs-dist/package.json

Dependency Hierarchy: - react-pdf-5.0.0.tgz (Root Library) - :x: **pdfjs-dist-2.4.456.tgz** (Vulnerable Library)

Found in HEAD commit: 76f7fe7c63b333ebe6937542bade08d541d2debd

Found in base branch: master

### Vulnerability Details

In pdf.js before 4.2.67, if used to load a malicious PDF, and PDF.js is configured with isEvalSupported set to true (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain.

Publish Date: 2024-05-01

URL: CVE-2024-4367

### CVSS 3 Score Details (8.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/mozilla/pdf.js/security/advisories/GHSA-wgrm-67xf-hhpq

Release Date: 2024-05-01

Fix Resolution: pdfjs-dist - 4.2.67

CVE-2024-34342 ### Vulnerable Library - react-pdf-5.0.0.tgz

Display PDFs in your React app as easily as if they were images.

Library home page: https://registry.npmjs.org/react-pdf/-/react-pdf-5.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/react-pdf/package.json

Dependency Hierarchy: - :x: **react-pdf-5.0.0.tgz** (Vulnerable Library)

Found in HEAD commit: 76f7fe7c63b333ebe6937542bade08d541d2debd

Found in base branch: master

### Vulnerability Details

react-pdf displays PDFs in React apps. If PDF.js is used to load a malicious PDF, and PDF.js is configured with `isEvalSupported` set to `true` (which is the default value), unrestricted attacker-controlled JavaScript will be executed in the context of the hosting domain. This vulnerability is fixed in 7.7.3 and 8.0.2.

Publish Date: 2024-05-07

URL: CVE-2024-34342

### CVSS 3 Score Details (7.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/wojtekmaj/react-pdf/security/advisories/GHSA-87hq-q4gp-9wr4

Release Date: 2024-05-07

Fix Resolution: 8.0.2

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.

mend-for-github-com[bot] commented 1 month ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.