Path to dependency file: /tmp/ws-scm/spruce/vendor/github.com/smartystreets/goconvey/web/client/index.html
Path to vulnerable library: /spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/moment.js,/spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/moment.js
WS-2016-0075 - Medium Severity Vulnerability
Vulnerable Library - moment-2.10.2.js
Parse, validate, manipulate, and display dates
Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.2/moment.js
Path to dependency file: /tmp/ws-scm/spruce/vendor/github.com/smartystreets/goconvey/web/client/index.html
Path to vulnerable library: /spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/moment.js,/spruce/vendor/github.com/smartystreets/goconvey/web/client/resources/js/lib/moment.js
Dependency Hierarchy: - :x: **moment-2.10.2.js** (Vulnerable Library)
Found in HEAD commit: 66c58daa21fb1d7c8b0ff833ad4544035c070300
Vulnerability Details
Regular expression denial of service vulnerability in the moment package, by using a specific 40 characters long string in the "format" method.
Publish Date: 2016-10-24
URL: WS-2016-0075
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Change files
Origin: https://github.com/moment/moment/commit/663f33e333212b3800b63592cd8e237ac8fabdb9
Release Date: 2016-10-24
Fix Resolution: Replace or update the following files: month.js, lt.js
Step up your Open Source Security Game with WhiteSource here