Closed mend-bolt-for-github[bot] closed 3 years ago
Issue-Label Bot is automatically applying the label bug
to this issue, with a confidence of 0.81. Please mark this comment with :thumbsup: or :thumbsdown: to give our bot feedback!
Links: app homepage, dashboard and code for this bot.
CVE-2020-7693 - Medium Severity Vulnerability
Vulnerable Library - sockjs-0.3.19.tgz
SockJS-node is a server counterpart of SockJS-client a JavaScript library that provides a WebSocket-like object in the browser. SockJS gives you a coherent, cross-browser, Javascript API which creates a low latency, full duplex, cross-domain communication
Library home page: https://registry.npmjs.org/sockjs/-/sockjs-0.3.19.tgz
Path to dependency file: /tmp/ws-scm/dhis2-period/package.json
Path to vulnerable library: /tmp/ws-scm/dhis2-period/node_modules/sockjs/package.json
Dependency Hierarchy: - webpack-dev-server-3.8.0.tgz (Root Library) - :x: **sockjs-0.3.19.tgz** (Vulnerable Library)
Found in HEAD commit: 4c2d2a0e9dfecc55cecd27c3a2b67ecaa677ab19
Vulnerability Details
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
Publish Date: 2020-07-09
URL: CVE-2020-7693
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/sockjs/sockjs-node/pull/265
Release Date: 2020-07-09
Fix Resolution: sockjs - 0.3.20
Step up your Open Source Security Game with WhiteSource here