Open mend-bolt-for-github[bot] opened 5 years ago
Encode and decode streams into string streams
Library home page: https://registry.npmjs.org/stringstream/-/stringstream-0.0.5.tgz
Path to dependency file: /PrestaShop/tests/E2E/package.json
Path to vulnerable library: /tests/E2E/package.json,/tests/Selenium/package.json
Dependency Hierarchy: - request-2.83.0.tgz (Root Library) - :x: **stringstream-0.0.5.tgz** (Vulnerable Library)
Found in HEAD commit: bb7465065dfeed9f49bb99b6901ab933563af739
Found in base branch: develop
All versions of stringstream are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.
Publish Date: 2018-05-16
URL: WS-2018-0103
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: Low
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/664
Release Date: 2018-01-27
Fix Resolution (stringstream): 0.0.6
Direct dependency fix Resolution (request): 2.84.0
Step up your Open Source Security Game with Mend here
WS-2018-0103 - Medium Severity Vulnerability
Vulnerable Library - stringstream-0.0.5.tgz
Encode and decode streams into string streams
Library home page: https://registry.npmjs.org/stringstream/-/stringstream-0.0.5.tgz
Path to dependency file: /PrestaShop/tests/E2E/package.json
Path to vulnerable library: /tests/E2E/package.json,/tests/Selenium/package.json
Dependency Hierarchy: - request-2.83.0.tgz (Root Library) - :x: **stringstream-0.0.5.tgz** (Vulnerable Library)
Found in HEAD commit: bb7465065dfeed9f49bb99b6901ab933563af739
Found in base branch: develop
Vulnerability Details
All versions of stringstream are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.
Publish Date: 2018-05-16
URL: WS-2018-0103
CVSS 3 Score Details (4.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/664
Release Date: 2018-01-27
Fix Resolution (stringstream): 0.0.6
Direct dependency fix Resolution (request): 2.84.0
Step up your Open Source Security Game with Mend here