inmar / twine.js

A pipeline-based, extendable, fluent request library.
MIT License
1 stars 0 forks source link

WS-2019-0424 (Medium) detected in elliptic-6.4.1.tgz - autoclosed #79

Closed mend-bolt-for-github[bot] closed 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

WS-2019-0424 - Medium Severity Vulnerability

Vulnerable Library - elliptic-6.4.1.tgz

EC cryptography

Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.4.1.tgz

Path to dependency file: twine.js/packages/twine-browser/package.json

Path to vulnerable library: twine.js/packages/twine-browser/node_modules/elliptic/package.json

Dependency Hierarchy: - rollup-plugin-size-snapshot-0.10.0.tgz (Root Library) - webpack-4.32.2.tgz - node-libs-browser-2.2.0.tgz - crypto-browserify-3.12.0.tgz - browserify-sign-4.0.4.tgz - :x: **elliptic-6.4.1.tgz** (Vulnerable Library)

Found in HEAD commit: fd7dc082fc728a62fc1459d0d1ba2fb8410cdfc6

Found in base branch: master

Vulnerability Details

all versions of elliptic are vulnerable to Timing Attack through side-channels.

Publish Date: 2019-11-13

URL: WS-2019-0424

CVSS 3 Score Details (5.9)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with WhiteSource here

mend-bolt-for-github[bot] commented 3 years ago

:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.