ghc-automation-staging-parallel-4-p1 / 7970115_83

0 stars 0 forks source link

CVE-2017-16138 (High) detected in mime-1.3.4.tgz #6

Open staging-whitesource-for-github-com[bot] opened 5 hours ago

staging-whitesource-for-github-com[bot] commented 5 hours ago

CVE-2017-16138 - High Severity Vulnerability

Vulnerable Library - mime-1.3.4.tgz

A comprehensive library for mime-type mapping

Library home page: https://registry.npmjs.org/mime/-/mime-1.3.4.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/mime/package.json

Dependency Hierarchy: - express-4.15.5.tgz (Root Library) - send-0.15.6.tgz - :x: **mime-1.3.4.tgz** (Vulnerable Library)

Found in HEAD commit: 079275f6196d60b82384c9379b713d20cdb55a3b

Found in base branch: main

Vulnerability Details

The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. Mend Note: Converted from WS-2017-0330, on 2022-11-08.

Publish Date: 2018-04-26

URL: CVE-2017-16138

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138

Release Date: 2018-04-26

Fix Resolution (mime): 1.4.1

Direct dependency fix Resolution (express): 4.16.0


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.