Open mend-bolt-for-github[bot] opened 5 years ago
querystringify-0.0.4.tgz
Querystringify - Small, simple but powerful query string parser.
Library home page: https://registry.npmjs.org/querystringify/-/querystringify-0.0.4.tgz
Path to dependency file: /Turismo-Torrevieja/package.json
Path to vulnerable library: /tmp/git/Turismo-Torrevieja/node_modules/querystringify/package.json
Dependency Hierarchy: - cli-1.6.1.tgz (Root Library) - webpack-dev-server-2.9.7.tgz - sockjs-client-1.1.4.tgz - eventsource-0.1.6.tgz - original-1.0.0.tgz - url-parse-1.0.5.tgz - :x: **querystringify-0.0.4.tgz** (Vulnerable Library)
Library home page: https://registry.npmjs.org/querystringify/-/querystringify-1.0.0.tgz
Path to vulnerable library: /tmp/git/Turismo-Torrevieja/node_modules/url-parse/node_modules/querystringify/package.json
Dependency Hierarchy: - cli-1.6.1.tgz (Root Library) - webpack-dev-server-2.9.7.tgz - sockjs-client-1.1.4.tgz - url-parse-1.2.0.tgz - :x: **querystringify-1.0.0.tgz** (Vulnerable Library)
Found in HEAD commit: 5fe809a2e7cf19f24da932e71d58c622ec363c70
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
Publish Date: 2019-06-04
URL: WS-2018-0588
Base Score Metrics not available
Type: Upgrade version
Origin: https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080
Release Date: 2019-06-04
Fix Resolution: 2.0.0
Step up your Open Source Security Game with WhiteSource here
WS-2018-0588 - High Severity Vulnerability
Vulnerable Libraries - querystringify-0.0.4.tgz, querystringify-1.0.0.tgz
querystringify-0.0.4.tgz
Querystringify - Small, simple but powerful query string parser.
Library home page: https://registry.npmjs.org/querystringify/-/querystringify-0.0.4.tgz
Path to dependency file: /Turismo-Torrevieja/package.json
Path to vulnerable library: /tmp/git/Turismo-Torrevieja/node_modules/querystringify/package.json
Dependency Hierarchy: - cli-1.6.1.tgz (Root Library) - webpack-dev-server-2.9.7.tgz - sockjs-client-1.1.4.tgz - eventsource-0.1.6.tgz - original-1.0.0.tgz - url-parse-1.0.5.tgz - :x: **querystringify-0.0.4.tgz** (Vulnerable Library)
querystringify-1.0.0.tgz
Querystringify - Small, simple but powerful query string parser.
Library home page: https://registry.npmjs.org/querystringify/-/querystringify-1.0.0.tgz
Path to dependency file: /Turismo-Torrevieja/package.json
Path to vulnerable library: /tmp/git/Turismo-Torrevieja/node_modules/url-parse/node_modules/querystringify/package.json
Dependency Hierarchy: - cli-1.6.1.tgz (Root Library) - webpack-dev-server-2.9.7.tgz - sockjs-client-1.1.4.tgz - url-parse-1.2.0.tgz - :x: **querystringify-1.0.0.tgz** (Vulnerable Library)
Found in HEAD commit: 5fe809a2e7cf19f24da932e71d58c622ec363c70
Vulnerability Details
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
Publish Date: 2019-06-04
URL: WS-2018-0588
CVSS 2 Score Details (7.6)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080
Release Date: 2019-06-04
Fix Resolution: 2.0.0
Step up your Open Source Security Game with WhiteSource here