Serverless Examples – A collection of boilerplates and examples of serverless architectures built with the Serverless Framework on AWS Lambda, Microsoft Azure, Google Cloud Functions, and more.
Path to dependency file: /azure-node-typescript-servicebus-trigger-endpoint/package.json
Path to vulnerable library: /azure-node-typescript-servicebus-trigger-endpoint/node_modules/zip-folder/node_modules/bl/package.json,/azure-node-line-bot/node_modules/zip-folder/node_modules/bl/package.json,/azure-node-telegram-bot/node_modules/zip-folder/node_modules/bl/package.json
bl before version 0.9.5 and version 1.0.1 are vulnerable to memory exposure. "bl.append(number)" in the affected bl versions passes a number to buffer constructor, appending a chunk of uninitialized memory
WS-2018-0074 - Medium Severity Vulnerability
Vulnerable Library - bl-0.9.5.tgz
Buffer List: collect buffers and access with a standard readable Buffer interface, streamable too!
Library home page: https://registry.npmjs.org/bl/-/bl-0.9.5.tgz
Path to dependency file: /azure-node-typescript-servicebus-trigger-endpoint/package.json
Path to vulnerable library: /azure-node-typescript-servicebus-trigger-endpoint/node_modules/zip-folder/node_modules/bl/package.json,/azure-node-line-bot/node_modules/zip-folder/node_modules/bl/package.json,/azure-node-telegram-bot/node_modules/zip-folder/node_modules/bl/package.json
Dependency Hierarchy: - serverless-azure-functions-2.1.3.tgz (Root Library) - zip-folder-1.0.0.tgz - archiver-0.11.0.tgz - tar-stream-0.4.7.tgz - :x: **bl-0.9.5.tgz** (Vulnerable Library)
Found in HEAD commit: dcbe4aefe4b3685f4b15493a01db0f19b118a0c4
Found in base branch: master
Vulnerability Details
bl before version 0.9.5 and version 1.0.1 are vulnerable to memory exposure. "bl.append(number)" in the affected bl versions passes a number to buffer constructor, appending a chunk of uninitialized memory
Publish Date: 2018-04-25
URL: WS-2018-0074
CVSS 3 Score Details (6.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2018-01-27
Fix Resolution: 0.9.5,1.0.1
Step up your Open Source Security Game with Mend here