shaimael / keycloak

Open Source Identity and Access Management For Modern Applications and Services
https://www.keycloak.org
Apache License 2.0
0 stars 0 forks source link

CVE-2022-25844 (High) detected in angular-1.8.0.tgz #1389

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2022-25844 - High Severity Vulnerability

Vulnerable Library - angular-1.8.0.tgz

HTML enhanced for web apps

Library home page: https://registry.npmjs.org/angular/-/angular-1.8.0.tgz

Path to dependency file: /common/resources/package.json

Path to vulnerable library: /common/resources/node_modules/angular/package.json

Dependency Hierarchy: - :x: **angular-1.8.0.tgz** (Vulnerable Library)

Found in HEAD commit: 9686933e579cc74ebc1592f893a47c601bcf4403

Found in base branch: master

Vulnerability Details

The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher.

Publish Date: 2022-05-01

URL: CVE-2022-25844

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-25844

Release Date: 2022-05-01

Fix Resolution: no_fix


:rescue_worker_helmet: Automatic Remediation is available for this issue