Open mend-bolt-for-github[bot] opened 4 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2015-8855 - High Severity Vulnerability
Vulnerable Library - semver-1.0.14.tgz
The semantic version parser used by npm.
Library home page: https://registry.npmjs.org/semver/-/semver-1.0.14.tgz
Path to dependency file: /html_site_template_customer/fashi/Source/OwlCarousel2-2.3.4/OwlCarousel2-2.3.4/package.json
Path to vulnerable library: /html_site_template_customer/fashi/Source/OwlCarousel2-2.3.4/OwlCarousel2-2.3.4/node_modules/semver/package.json
Dependency Hierarchy: - grunt-blanket-qunit-0.2.0.tgz (Root Library) - grunt-contrib-qunit-0.2.2.tgz - grunt-lib-phantomjs-0.3.1.tgz - :x: **semver-1.0.14.tgz** (Vulnerable Library)
Found in HEAD commit: 08ba0922f3668b139df2a365e01b4d3e57faef86
Found in base branch: master
Vulnerability Details
The semver package before 4.3.2 for Node.js allows attackers to cause a denial of service (CPU consumption) via a long version string, aka a "regular expression denial of service (ReDoS)."
Publish Date: 2017-01-23
URL: CVE-2015-8855
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-8855
Release Date: 2017-01-23
Fix Resolution: semver (Npm package) - 4.3.2;Npm (NuGet package) - 2.14.14
Step up your Open Source Security Game with Mend here