kapseliboi / crowdfunding-frontend

A battle proven crowdfunding front end with Stripe, PayPal and PostFinance integration. And lots of features around it.
Other
0 stars 0 forks source link

CVE-2017-16028 (Medium) detected in randomatic-1.1.7.tgz #90

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2017-16028 - Medium Severity Vulnerability

Vulnerable Library - randomatic-1.1.7.tgz

Generate randomized strings of a specified length, fast. Only the length is necessary, but you can optionally generate patterns using any combination of numeric, alpha-numeric, alphabetical, special or custom characters.

Library home page: https://registry.npmjs.org/randomatic/-/randomatic-1.1.7.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/randomatic/package.json

Dependency Hierarchy: - nodemon-1.11.0.tgz (Root Library) - chokidar-1.7.0.tgz - anymatch-1.3.2.tgz - micromatch-2.3.11.tgz - braces-1.8.5.tgz - expand-range-1.8.2.tgz - fill-range-2.2.3.tgz - :x: **randomatic-1.1.7.tgz** (Vulnerable Library)

Found in HEAD commit: 3c5fb7d3f2932ae2023353faafd51bf99b953a5f

Found in base branch: master

Vulnerability Details

react-native-meteor-oauth is a library for Oauth2 login to a Meteor server in React Native. The oauth Random Token is generated using a non-cryptographically strong RNG (Math.random()).

Publish Date: 2018-06-04

URL: CVE-2017-16028

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/157/versions

Release Date: 2018-06-04

Fix Resolution (randomatic): 3.0.0

Direct dependency fix Resolution (nodemon): 1.11.1


Step up your Open Source Security Game with Mend here