Open mend-bolt-for-github[bot] opened 5 years ago
Reference implementation of Joyent's HTTP Signature scheme.
Library home page: https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz
Path to dependency file: /PrestaShop/tests/Selenium/package.json
Path to vulnerable library: /tests/Selenium/package.json
Dependency Hierarchy: - webdriverio-3.4.0.tgz (Root Library) - request-2.49.0.tgz - :x: **http-signature-0.10.1.tgz** (Vulnerable Library)
Found in HEAD commit: bb7465065dfeed9f49bb99b6901ab933563af739
Found in base branch: develop
http-signature before version 1.0.0 are vulnerable to timing attack, which may lead to information disclosure.
Publish Date: 2015-01-22
URL: WS-2017-0266
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
Type: Upgrade version
Release Date: 2015-01-22
Fix Resolution (http-signature): 1.0.0
Direct dependency fix Resolution (webdriverio): 4.2.0
Step up your Open Source Security Game with Mend here
WS-2017-0266 - Low Severity Vulnerability
Vulnerable Library - http-signature-0.10.1.tgz
Reference implementation of Joyent's HTTP Signature scheme.
Library home page: https://registry.npmjs.org/http-signature/-/http-signature-0.10.1.tgz
Path to dependency file: /PrestaShop/tests/Selenium/package.json
Path to vulnerable library: /tests/Selenium/package.json
Dependency Hierarchy: - webdriverio-3.4.0.tgz (Root Library) - request-2.49.0.tgz - :x: **http-signature-0.10.1.tgz** (Vulnerable Library)
Found in HEAD commit: bb7465065dfeed9f49bb99b6901ab933563af739
Found in base branch: develop
Vulnerability Details
http-signature before version 1.0.0 are vulnerable to timing attack, which may lead to information disclosure.
Publish Date: 2015-01-22
URL: WS-2017-0266
CVSS 3 Score Details (3.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2015-01-22
Fix Resolution (http-signature): 1.0.0
Direct dependency fix Resolution (webdriverio): 4.2.0
Step up your Open Source Security Game with Mend here