Open mend-bolt-for-github[bot] opened 2 years ago
Client-side form validation made easy
Library home page: https://registry.npmjs.org/jquery-validation/-/jquery-validation-1.19.3.tgz
Path to dependency file: /PrivateWebSite/src/BikeSharing_Private_Web_Site/package.json
Path to vulnerable library: /PrivateWebSite/src/BikeSharing_Private_Web_Site/node_modules/jquery-validation/package.json
Dependency Hierarchy: - :x: **jquery-validation-1.19.3.tgz** (Vulnerable Library)
Found in HEAD commit: bc963f1400932ce23ff4b5d63778a2e8b695f9a6
Found in base branch: master
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method
Publish Date: 2022-06-02
URL: CVE-2021-43306
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/
Release Date: 2022-06-02
Fix Resolution: 1.19.4
Step up your Open Source Security Game with Mend here
CVE-2021-43306 - High Severity Vulnerability
Vulnerable Library - jquery-validation-1.19.3.tgz
Client-side form validation made easy
Library home page: https://registry.npmjs.org/jquery-validation/-/jquery-validation-1.19.3.tgz
Path to dependency file: /PrivateWebSite/src/BikeSharing_Private_Web_Site/package.json
Path to vulnerable library: /PrivateWebSite/src/BikeSharing_Private_Web_Site/node_modules/jquery-validation/package.json
Dependency Hierarchy: - :x: **jquery-validation-1.19.3.tgz** (Vulnerable Library)
Found in HEAD commit: bc963f1400932ce23ff4b5d63778a2e8b695f9a6
Found in base branch: master
Vulnerability Details
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method
Publish Date: 2022-06-02
URL: CVE-2021-43306
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/
Release Date: 2022-06-02
Fix Resolution: 1.19.4
Step up your Open Source Security Game with Mend here