berviantoleo / telegram-bot-ai

Telegram bot AI
MIT License
3 stars 1 forks source link

microsoft.testplatform.testhost.17.3.0.nupkg: 1 vulnerabilities (highest severity is: 7.5) #27

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 1 year ago
Vulnerable Library - microsoft.testplatform.testhost.17.3.0.nupkg

Path to dependency file: /TelegramBot.Test/TelegramBot.Test.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg

Found in HEAD commit: c1fbef3a63fc6f15b8e854f4f74f4af3f5867f86

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
WS-2022-0161 High 7.5 newtonsoft.json.9.0.1.nupkg Transitive N/A

Details

WS-2022-0161 ### Vulnerable Library - newtonsoft.json.9.0.1.nupkg

Json.NET is a popular high-performance JSON framework for .NET

Library home page: https://api.nuget.org/packages/newtonsoft.json.9.0.1.nupkg

Path to dependency file: /TelegramBot.Test/TelegramBot.Test.csproj

Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg

Dependency Hierarchy: - microsoft.testplatform.testhost.17.3.0.nupkg (Root Library) - :x: **newtonsoft.json.9.0.1.nupkg** (Vulnerable Library)

Found in HEAD commit: c1fbef3a63fc6f15b8e854f4f74f4af3f5867f86

Found in base branch: main

### Vulnerability Details

Improper Handling of Exceptional Conditions in Newtonsoft.Json. Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of StackOverFlow exception (SOE) whenever nested expressions are being processed. Exploiting this vulnerability results in Denial Of Service (DoS), and it is exploitable when an attacker sends 5 requests that cause SOE in time frame of 5 minutes. This vulnerability affects Internet Information Services (IIS) Applications.

Publish Date: 2022-06-22

URL: WS-2022-0161

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-5crp-9r3c-p9vr

Release Date: 2022-06-22

Fix Resolution: Newtonsoft.Json - 13.0.1;Microsoft.Extensions.ApiDescription.Server - 6.0.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)