Lawlez / Lawlez.github.io

MIT License
0 stars 0 forks source link

[DepShield] (CVSS 7.5) Vulnerability due to usage of axios:0.19.0 #344

Open sonatype-depshield[bot] opened 1 year ago

sonatype-depshield[bot] commented 1 year ago

Depshield will be deprecated soon

Please install our new product, Sonatype Lift with advanced features


Vulnerabilities

DepShield reports that this application's usage of axios:0.19.0 results in the following vulnerability(s):


Occurrences

axios:0.19.0 is a transitive dependency introduced by the following direct dependency(s):

browser-sync:2.26.13         └─ localtunnel:2.0.0               └─ axios:0.19.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

secure-code-warrior-for-github[bot] commented 1 year ago

Micro-Learning Topic: Server-Side Request Forgery (SSRF) (CWE 918)

Matched on "CWE-918"

What is this? (2min video)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Inefficient regular expression (Detected by phrase)

Matched on "Inefficient Regular Expression"

What is this? (2min video)

A regular expression that requires exponential time to match certain inputs can be a performance bottleneck, and may be vulnerable to denial-of-service attacks.

Try a challenge in Secure Code Warrior

Micro-Learning Topic: Server-side request forgery (Detected by phrase)

Matched on "Server-Side Request Forgery"

What is this? (2min video)

Server-Side Request Forgery (SSRF) vulnerabilities are caused when an attacker can supply or modify a URL that reads or sends data to the server. The attacker can create a malicious request with a manipulated URL, when this request reaches the server, the server-side code executes the exploit URL causing the attacker to be able to read data from services that shouldn't be exposed.

Try a challenge in Secure Code Warrior