AlexRogalskiy / AlexRogalskiy

๐ŸŒž Profile of ๐˜ผ๐™ก๐™š๐™ญ๐™–๐™ฃ๐™™๐™š๐™ง ๐™๐™ค๐™œ๐™–๐™ก๐™จ๐™ ๐™ž๐™ฎ
https://github.com/AlexRogalskiy/
GNU General Public License v3.0
3 stars 4 forks source link

CVE-2019-25009 (High) detected in http-0.1.21.crate #137

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2019-25009 - High Severity Vulnerability

Vulnerable Library - http-0.1.21.crate

A set of types for representing HTTP requests and responses.

Library home page: https://crates.io/api/v1/crates/http/0.1.21/download

Dependency Hierarchy: - rss-1.9.0.crate (Root Library) - reqwest-0.9.24.crate - hyper-0.12.35.crate - http-body-0.1.0.crate - :x: **http-0.1.21.crate** (Vulnerable Library)

Found in HEAD commit: 6eea9c70c3b13e8b476bcc2d221874aa7ef9c1c1

Found in base branch: master

Vulnerability Details

An issue was discovered in the http crate before 0.1.20 for Rust. The HeaderMap::Drain API can use a raw pointer, defeating soundness.

Publish Date: 2020-12-31

URL: CVE-2019-25009

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/hyperium/http/releases/tag/v0.1.21

Release Date: 2020-12-31

Fix Resolution: v0.1.21


Step up your Open Source Security Game with WhiteSource here

github-actions[bot] commented 3 years ago

๐Ÿ‘‹ Thanks for reporting!