ghc-automation-staging-parallel-11-p3 / 11653742_426

0 stars 0 forks source link

CVE-2017-16138 (High) detected in mime-1.3.4.tgz - autoclosed #10

Closed staging-whitesource-for-github-com[bot] closed 3 hours ago

staging-whitesource-for-github-com[bot] commented 3 hours ago

CVE-2017-16138 - High Severity Vulnerability

Vulnerable Library - mime-1.3.4.tgz

A comprehensive library for mime-type mapping

Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/mime/package.json

Dependency Hierarchy: - express-4.13.4.tgz (Root Library) - serve-static-1.10.3.tgz - send-0.13.2.tgz - :x: **mime-1.3.4.tgz** (Vulnerable Library)

Found in HEAD commit: f42bdb0461a03549b3cc808f59351c7977fd1699

Found in base branch: main

Vulnerability Details

The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. Mend Note: Converted from WS-2017-0330, on 2022-11-08.

Publish Date: 2018-04-26

URL: CVE-2017-16138

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138

Release Date: 2018-04-26

Fix Resolution (mime): 1.4.1

Direct dependency fix Resolution (express): 4.16.0


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

staging-whitesource-for-github-com[bot] commented 3 hours ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.