Sh2dowFi3nd / Test_2

0 stars 0 forks source link

CVE-2014-7191 (Medium) detected in qs-0.4.2.tgz - autoclosed #13

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 5 years ago

CVE-2014-7191 - Medium Severity Vulnerability

Vulnerable Library - qs-0.4.2.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.4.2.tgz

Path to dependency file: /Test_2/fs-agent-master/fs-agent-master/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json

Path to vulnerable library: /tmp/git/Test_2/fs-agent-master/fs-agent-master/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/qs/package.json

Dependency Hierarchy: - connect-2.1.3.tgz (Root Library) - :x: **qs-0.4.2.tgz** (Vulnerable Library)

Found in HEAD commit: 8c78f0ad3bff36d357bf5d8430803512f2939b86

Vulnerability Details

The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.

Publish Date: 2014-10-19

URL: CVE-2014-7191

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-7191

Release Date: 2014-10-19

Fix Resolution: 1.0.0


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 3 years ago

:information_source: This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #19