Path to vulnerable library: /home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar,/home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar,/home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar,/home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
CVE-2022-24785 - High Severity Vulnerability
WebJar for moment
Path to dependency file: /hapi-fhir-docs/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar,/home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar,/home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar,/home/wss-scanner/.m2/repository/org/webjars/bower/moment/2.27.0/moment-2.27.0.jar
Dependency Hierarchy: - :x: **moment-2.27.0.jar** (Vulnerable Library)
Found in HEAD commit: b59f2d05a7d0fd10c7b03bb6f0ebf97757172a71
Found in base branch: master
Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
Publish Date: 2022-04-04
URL: CVE-2022-24785
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
Release Date: 2022-04-04
Fix Resolution: 2.29.3
Step up your Open Source Security Game with Mend here