ZSBRybnik / backend

MIT License
2 stars 0 forks source link

preset-classic-2.2.0.tgz: 1 vulnerabilities (highest severity is: 7.5) - autoclosed #810

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 1 year ago
Vulnerable Library - preset-classic-2.2.0.tgz

Found in HEAD commit: d6f11282ee9f4af0baad5df06570b6a9700994af

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (preset-classic version) Remediation Available
CVE-2022-25927 High 7.5 ua-parser-js-0.7.32.tgz Transitive 2.3.0

Details

CVE-2022-25927 ### Vulnerable Library - ua-parser-js-0.7.32.tgz

Detect Browser, Engine, OS, CPU, and Device type/model from User-Agent data. Supports browser & node.js environment

Library home page: https://registry.npmjs.org/ua-parser-js/-/ua-parser-js-0.7.32.tgz

Dependency Hierarchy: - preset-classic-2.2.0.tgz (Root Library) - plugin-debug-2.2.0.tgz - react-json-view-1.21.3.tgz - flux-4.0.3.tgz - fbjs-3.0.4.tgz - :x: **ua-parser-js-0.7.32.tgz** (Vulnerable Library)

Found in HEAD commit: d6f11282ee9f4af0baad5df06570b6a9700994af

Found in base branch: master

### Vulnerability Details

Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, from 0.8.1 and before 1.0.33 are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim() function.

Publish Date: 2023-01-26

URL: CVE-2022-25927

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2023-01-26

Fix Resolution (ua-parser-js): 1.0.33

Direct dependency fix Resolution (@docusaurus/preset-classic): 2.3.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.