Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
WS-2020-0035 - High Severity Vulnerability
Vulnerable Libraries - hapi-16.7.0.tgz, hapi-14.2.0.tgz
hapi-16.7.0.tgz
HTTP Server framework
Library home page: https://registry.npmjs.org/hapi/-/hapi-16.7.0.tgz
Path to dependency file: /aws-python-auth0-custom-authorizers-api/package.json
Path to vulnerable library: /aws-python-auth0-custom-authorizers-api/node_modules/hapi/package.json,/aws-node-auth0-custom-authorizers-api/node_modules/hapi/package.json,/aws-node-vue-nuxt-ssr/node_modules/hapi/package.json,/aws-node-dynamic-image-resizer/node_modules/hapi/package.json
Dependency Hierarchy: - serverless-offline-4.10.6.tgz (Root Library) - :x: **hapi-16.7.0.tgz** (Vulnerable Library)
hapi-14.2.0.tgz
HTTP Server framework
Library home page: https://registry.npmjs.org/hapi/-/hapi-14.2.0.tgz
Path to dependency file: /aws-node-github-check/package.json
Path to vulnerable library: /aws-node-github-check/node_modules/hapi/package.json,/aws-node-oauth-dropbox-api/node_modules/hapi/package.json,/aws-node-signed-uploads/node_modules/hapi/package.json
Dependency Hierarchy: - serverless-offline-3.31.0.tgz (Root Library) - :x: **hapi-14.2.0.tgz** (Vulnerable Library)
Found in HEAD commit: dcbe4aefe4b3685f4b15493a01db0f19b118a0c4
Found in base branch: master
Vulnerability Details
All Versions of hapi are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
Publish Date: 2020-02-18
URL: WS-2020-0035
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/WS-2020-0035
Release Date: 2020-02-18
Fix Resolution (hapi): 18.0.0
Direct dependency fix Resolution (serverless-offline): 5.0.0
Fix Resolution (hapi): 18.0.0
Direct dependency fix Resolution (serverless-offline): 3.32.0
Step up your Open Source Security Game with Mend here