Sh2dowFi3nd / Test_2

0 stars 0 forks source link

WS-2014-0005 (Medium) detected in qs-0.4.2.tgz - autoclosed #14

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 5 years ago

WS-2014-0005 - Medium Severity Vulnerability

Vulnerable Library - qs-0.4.2.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.4.2.tgz

Path to dependency file: /Test_2/fs-agent-master/fs-agent-master/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/package.json

Path to vulnerable library: /tmp/git/Test_2/fs-agent-master/fs-agent-master/test_input/ksa/ksa-web-root/ksa-web/src/main/webapp/rs/bootstrap/node_modules/qs/package.json

Dependency Hierarchy: - connect-2.1.3.tgz (Root Library) - :x: **qs-0.4.2.tgz** (Vulnerable Library)

Found in HEAD commit: 8c78f0ad3bff36d357bf5d8430803512f2939b86

Vulnerability Details

Denial-of-Service Extended Event Loop Blocking.The qs module does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time

Publish Date: 2014-08-06

URL: WS-2014-0005

CVSS 2 Score Details (6.5)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://nodesecurity.io/advisories/qs_dos_extended_event_loop_blocking

Release Date: 2014-08-06

Fix Resolution: Update qs to version 1.0.0 or greater


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 3 years ago

:information_source: This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #21