Open mend-for-github-com[bot] opened 3 weeks ago
A comprehensive library for mime-type mapping
Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz
Path to dependency file: /hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/package.json
Path to vulnerable library: /hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/node_modules/mime/package.json
Dependency Hierarchy: - em-table-0.12.0.tgz (Root Library) - ember-cli-less-1.5.4.tgz - broccoli-less-single-0.6.4.tgz - less-2.7.2.tgz - :x: **mime-1.3.4.tgz** (Vulnerable Library)
Found in HEAD commit: 6dcd8400219941dcbd7fb0f6b980cc2c6a2a6b0a
Found in base branch: trunk
The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. Mend Note: Converted from WS-2017-0330, on 2022-11-08.
Publish Date: 2018-06-07
URL: CVE-2017-16138
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138
Release Date: 2018-04-26
Fix Resolution (mime): 1.4.1
Direct dependency fix Resolution (em-table): 0.12.1
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
CVE-2017-16138 - High Severity Vulnerability
Vulnerable Library - mime-1.3.4.tgz
A comprehensive library for mime-type mapping
Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz
Path to dependency file: /hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/package.json
Path to vulnerable library: /hadoop-yarn-project/hadoop-yarn/hadoop-yarn-ui/src/main/webapp/node_modules/mime/package.json
Dependency Hierarchy: - em-table-0.12.0.tgz (Root Library) - ember-cli-less-1.5.4.tgz - broccoli-less-single-0.6.4.tgz - less-2.7.2.tgz - :x: **mime-1.3.4.tgz** (Vulnerable Library)
Found in HEAD commit: 6dcd8400219941dcbd7fb0f6b980cc2c6a2a6b0a
Found in base branch: trunk
Vulnerability Details
The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. Mend Note: Converted from WS-2017-0330, on 2022-11-08.
Publish Date: 2018-06-07
URL: CVE-2017-16138
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138
Release Date: 2018-04-26
Fix Resolution (mime): 1.4.1
Direct dependency fix Resolution (em-table): 0.12.1
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.