raindigi / site-landing

Equithon 2019's landing page.
https://equithon.org
MIT License
0 stars 0 forks source link

CVE-2020-8175 (Medium) detected in jpeg-js-0.2.0.tgz #301

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2020-8175 - Medium Severity Vulnerability

Vulnerable Library - jpeg-js-0.2.0.tgz

A pure javascript JPEG encoder and decoder

Library home page: https://registry.npmjs.org/jpeg-js/-/jpeg-js-0.2.0.tgz

Path to dependency file: /site-landing/package.json

Path to vulnerable library: /node_modules/jpeg-js/package.json

Dependency Hierarchy: - gatsby-plugin-sharp-2.0.32.tgz (Root Library) - potrace-2.1.1.tgz - jimp-0.2.28.tgz - :x: **jpeg-js-0.2.0.tgz** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.

Publish Date: 2020-07-24

URL: CVE-2020-8175

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8175

Release Date: 2020-07-27

Fix Resolution (jpeg-js): 0.4.0

Direct dependency fix Resolution (gatsby-plugin-sharp): 2.0.33


Step up your Open Source Security Game with Mend here