OSWeekends / batimagen

Un proyecto sobre metadatos del guild de ciberseguridad
GNU General Public License v3.0
12 stars 3 forks source link

CVE-2020-7699 (High) detected in express-fileupload-1.0.0.tgz #81

Open mend-bolt-for-github[bot] opened 4 years ago

mend-bolt-for-github[bot] commented 4 years ago

CVE-2020-7699 - High Severity Vulnerability

Vulnerable Library - express-fileupload-1.0.0.tgz

Simple express file upload middleware that wraps around Busboy

Library home page: https://registry.npmjs.org/express-fileupload/-/express-fileupload-1.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/express-fileupload/package.json

Dependency Hierarchy: - :x: **express-fileupload-1.0.0.tgz** (Vulnerable Library)

Found in HEAD commit: 002a5d2a7f8a8c7e9bf7c418545f1586e0729b0a

Vulnerability Details

This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.

Publish Date: 2020-07-30

URL: CVE-2020-7699

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/richardgirges/express-fileupload/issues/236

Release Date: 2020-07-30

Fix Resolution: 1.1.8


Step up your Open Source Security Game with WhiteSource here