mubaidr / URL-Shortener-Microservice

URL-Shortener-Microservice Freecode camp exercise
https://url-shortener-mubaidr.herokuapp.com/
Apache License 2.0
0 stars 0 forks source link

CVE-2018-3774 High Severity Vulnerability detected by WhiteSource #13

Open mend-bolt-for-github[bot] opened 5 years ago

mend-bolt-for-github[bot] commented 5 years ago

CVE-2018-3774 - High Severity Vulnerability

Vulnerable Library - url-parse-1.1.9.tgz

Small footprint URL parser that works seamlessly across Node.js and browser environments

path: /tmp/git/URL-Shortener-Microservice/node_modules/url-parse/package.json

Library home page: https://registry.npmjs.org/url-parse/-/url-parse-1.1.9.tgz

Dependency Hierarchy: - reload-2.2.2.tgz (Root Library) - :x: **url-parse-1.1.9.tgz** (Vulnerable Library)

Vulnerability Details

Incorrect parsing in url-parse <1.4.3 returns wrong hostname which leads to multiple vulnerabilities such as SSRF, Open Redirect, Bypass Authentication Protocol.

Publish Date: 2018-08-12

URL: CVE-2018-3774

CVSS 3 Score Details (10.0)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a

Release Date: 2018-07-29

Fix Resolution: Replace or update the following files: index.js, test.js


Step up your Open Source Security Game with WhiteSource here