Open mend-bolt-for-github[bot] opened 3 years ago
Reference implementation of Joyent's HTTP Signature scheme.
Library home page: https://registry.npmjs.org/http-signature/-/http-signature-0.11.0.tgz
Path to dependency file: /todoapp/nodejs_api/package.json
Path to vulnerable library: /todoapp/nodejs_api/node_modules/http-signature/package.json,/todoapp/nodejs/node_modules/http-signature/package.json
Dependency Hierarchy: - restify-4.0.3.tgz (Root Library) - :x: **http-signature-0.11.0.tgz** (Vulnerable Library)
Found in base branch: master
http-signature before version 1.0.0 are vulnerable to timing attack, which may lead to information disclosure.
Publish Date: 2015-01-22
URL: WS-2017-0266
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
Type: Upgrade version
Release Date: 2015-01-22
Fix Resolution (http-signature): 1.0.0
Direct dependency fix Resolution (restify): 5.0.1
Step up your Open Source Security Game with Mend here
WS-2017-0266 - Low Severity Vulnerability
Vulnerable Library - http-signature-0.11.0.tgz
Reference implementation of Joyent's HTTP Signature scheme.
Library home page: https://registry.npmjs.org/http-signature/-/http-signature-0.11.0.tgz
Path to dependency file: /todoapp/nodejs_api/package.json
Path to vulnerable library: /todoapp/nodejs_api/node_modules/http-signature/package.json,/todoapp/nodejs/node_modules/http-signature/package.json
Dependency Hierarchy: - restify-4.0.3.tgz (Root Library) - :x: **http-signature-0.11.0.tgz** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
http-signature before version 1.0.0 are vulnerable to timing attack, which may lead to information disclosure.
Publish Date: 2015-01-22
URL: WS-2017-0266
CVSS 3 Score Details (3.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2015-01-22
Fix Resolution (http-signature): 1.0.0
Direct dependency fix Resolution (restify): 5.0.1
Step up your Open Source Security Game with Mend here