artkamote / examples

Serverless Examples – A collection of boilerplates and examples of serverless architectures built with the Serverless Framework on AWS Lambda, Microsoft Azure, Google Cloud Functions, and more.
https://www.serverless.com/examples/
Other
0 stars 0 forks source link

CVE-2024-42460 (Medium) detected in multiple libraries - autoclosed #393

Closed mend-bolt-for-github[bot] closed 2 weeks ago

mend-bolt-for-github[bot] commented 3 months ago

CVE-2024-42460 - Medium Severity Vulnerability

Vulnerable Libraries - elliptic-6.5.4.tgz, elliptic-6.5.3.tgz, elliptic-6.4.1.tgz, elliptic-6.5.1.tgz, elliptic-6.4.0.tgz

elliptic-6.5.4.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz

Path to dependency file: /aws-node-vue-nuxt-ssr/package.json

Path to vulnerable library: /aws-node-vue-nuxt-ssr/node_modules/elliptic/package.json,/azure-node-telegram-bot/node_modules/elliptic/package.json,/aws-node-signed-uploads/node_modules/elliptic/package.json,/aws-node-auth0-cognito-custom-authorizers-api/node_modules/elliptic/package.json,/aws-node-dynamic-image-resizer/node_modules/elliptic/package.json,/azure-node-line-bot/node_modules/elliptic/package.json

Dependency Hierarchy: - nuxt-2.15.8.tgz (Root Library) - webpack-2.15.8.tgz - webpack-4.46.0.tgz - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.4.tgz - :x: **elliptic-6.5.4.tgz** (Vulnerable Library)

elliptic-6.5.3.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.3.tgz

Path to dependency file: /azure-node-typescript-servicebus-trigger-endpoint/package.json

Path to vulnerable library: /azure-node-typescript-servicebus-trigger-endpoint/node_modules/elliptic/package.json

Dependency Hierarchy: - webpack-4.44.2.tgz (Root Library) - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.4.tgz - :x: **elliptic-6.5.3.tgz** (Vulnerable Library)

elliptic-6.4.1.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz

Path to dependency file: /aws-node-typescript-nest/package.json

Path to vulnerable library: /aws-node-typescript-nest/node_modules/elliptic/package.json,/aws-node-github-check/node_modules/elliptic/package.json,/aws-node-fullstack/frontend/node_modules/elliptic/package.json

Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - webpack-4.28.3.tgz - node-libs-browser-2.2.0.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.4.1.tgz** (Vulnerable Library)

elliptic-6.5.1.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.1.tgz

Path to dependency file: /aws-node-typescript-sqs-standard/package.json

Path to vulnerable library: /aws-node-typescript-sqs-standard/node_modules/elliptic/package.json,/aws-node-typescript-kinesis/node_modules/elliptic/package.json

Dependency Hierarchy: - webpack-4.41.2.tgz (Root Library) - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.5.1.tgz** (Vulnerable Library)

elliptic-6.4.0.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.4.0.tgz

Path to dependency file: /aws-node-oauth-dropbox-api/package.json

Path to vulnerable library: /aws-node-oauth-dropbox-api/node_modules/elliptic/package.json

Dependency Hierarchy: - serverless-plugin-optimize-3.0.3-rc.1.tgz (Root Library) - browserify-14.5.0.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.4.0.tgz** (Vulnerable Library)

Found in HEAD commit: dcbe4aefe4b3685f4b15493a01db0f19b118a0c4

Found in base branch: master

Vulnerability Details

In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.

Publish Date: 2024-08-02

URL: CVE-2024-42460

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 2 weeks ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.