TreyM-WSS / whitesource-demo-1

0 stars 0 forks source link

CVE-2021-23509 (High) detected in json-ptr-2.2.0.tgz - autoclosed #37

Closed mend-for-github-com[bot] closed 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2021-23509 - High Severity Vulnerability

Vulnerable Library - json-ptr-2.2.0.tgz

A complete implementation of JSON Pointer (RFC 6901) for nodejs and modern browsers.

Library home page: https://registry.npmjs.org/json-ptr/-/json-ptr-2.2.0.tgz

Dependency Hierarchy: - firebase-tools-9.0.0.tgz (Root Library) - exegesis-express-2.0.1.tgz - exegesis-2.5.7.tgz - :x: **json-ptr-2.2.0.tgz** (Vulnerable Library)

Found in HEAD commit: 2a1411ba78280c07796558559ccfca7738c05cf4

Vulnerability Details

This affects the package json-ptr before 3.0.0. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.

Publish Date: 2021-11-03

URL: CVE-2021-23509

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23509

Release Date: 2021-11-03

Fix Resolution: json-ptr -3.0.0

mend-for-github-com[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.