snowdensb / nifi

Apache NiFi
https://nifi.apache.org/
Apache License 2.0
0 stars 0 forks source link

karma-coverage-istanbul-reporter-2.0.5.tgz: 2 vulnerabilities (highest severity is: 7.8) - autoclosed #533

Closed mend-for-github-com[bot] closed 1 month ago

mend-for-github-com[bot] commented 5 months ago
Vulnerable Library - karma-coverage-istanbul-reporter-2.0.5.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (karma-coverage-istanbul-reporter version) Remediation Possible** Reachability
CVE-2021-43138 High 7.8 async-2.6.3.tgz Transitive 2.0.6
CVE-2022-25883 Medium 5.3 semver-6.3.0.tgz Transitive 3.0.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2021-43138 ### Vulnerable Library - async-2.6.3.tgz

Higher-order functions and common patterns for asynchronous code

Library home page: https://registry.npmjs.org/async/-/async-2.6.3.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy: - karma-coverage-istanbul-reporter-2.0.5.tgz (Root Library) - istanbul-api-2.1.7.tgz - :x: **async-2.6.3.tgz** (Vulnerable Library)

Found in base branch: main

### Vulnerability Details

In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.

Publish Date: 2022-04-06

URL: CVE-2021-43138

### CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-43138

Release Date: 2022-04-06

Fix Resolution (async): 2.6.4

Direct dependency fix Resolution (karma-coverage-istanbul-reporter): 2.0.6

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.
CVE-2022-25883 ### Vulnerable Library - semver-6.3.0.tgz

The semantic version parser used by npm.

Library home page: https://registry.npmjs.org/semver/-/semver-6.3.0.tgz

Path to dependency file: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Path to vulnerable library: /nifi-registry/nifi-registry-core/nifi-registry-web-ui/src/main/package.json

Dependency Hierarchy: - karma-coverage-istanbul-reporter-2.0.5.tgz (Root Library) - istanbul-api-2.1.7.tgz - istanbul-lib-instrument-3.3.0.tgz - :x: **semver-6.3.0.tgz** (Vulnerable Library)

Found in base branch: main

### Vulnerability Details

Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

Publish Date: 2023-06-21

URL: CVE-2022-25883

### CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-c2qf-rxjj-qqgw

Release Date: 2023-06-21

Fix Resolution (semver): 6.3.1

Direct dependency fix Resolution (karma-coverage-istanbul-reporter): 3.0.0

:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.

:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.

mend-for-github-com[bot] commented 1 month ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.