Closed mend-bolt-for-github[bot] closed 2 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
WS-2015-0015 - Medium Severity Vulnerability
Vulnerable Library - ms-0.6.2.tgz
Tiny ms conversion utility
Library home page: https://registry.npmjs.org/ms/-/ms-0.6.2.tgz
Path to dependency file: /E-voting-using-blockchain/evoting app/src/bower_components/morris.js/package.json
Path to vulnerable library: /tmp/git/E-voting-using-blockchain/evoting app/src/bower_components/morris.js/node_modules/ms/package.json
Dependency Hierarchy: - grunt-mocha-0.4.15.tgz (Root Library) - mocha-1.21.5.tgz - debug-2.0.0.tgz - :x: **ms-0.6.2.tgz** (Vulnerable Library)
Found in HEAD commit: 3c02898f89d78283ce791eb1b53b2b5a667681ad
Vulnerability Details
Ms is vulnerable to regular expression denial of service (ReDoS) when extremely long version strings are parsed.
Publish Date: 2015-10-24
URL: WS-2015-0015
CVSS 2 Score Details (5.3)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/46
Release Date: 2015-10-24
Fix Resolution: Update to version 0.7.1 or greater. An alternative would be to limit the input length of the user input before passing it into ms.
Step up your Open Source Security Game with WhiteSource here