Open mend-for-github-com[bot] opened 4 months ago
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/node_modules/trim/package.json
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Trim newlines from the start and/or end of a string
Library home page: https://registry.npmjs.org/trim-newlines/-/trim-newlines-3.0.0.tgz
Path to vulnerable library: /ui/node_modules/trim-newlines/package.json
Dependency Hierarchy: - stylelint-13.6.0.tgz (Root Library) - meow-7.1.1.tgz - :x: **trim-newlines-3.0.0.tgz** (Vulnerable Library)
Found in base branch: master
The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
Publish Date: 2021-05-28
URL: CVE-2021-33623
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623
Release Date: 2021-05-28
Fix Resolution (trim-newlines): 3.0.1
Direct dependency fix Resolution (stylelint): 13.6.1
Trim string whitespace
Library home page: https://registry.npmjs.org/trim/-/trim-0.0.1.tgz
Dependency Hierarchy: - stylelint-13.6.0.tgz (Root Library) - postcss-markdown-0.36.1.tgz - remark-12.0.1.tgz - remark-parse-8.0.3.tgz - :x: **trim-0.0.1.tgz** (Vulnerable Library)
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
Publish Date: 2020-10-27
URL: CVE-2020-7753
Release Date: 2020-10-27
Fix Resolution (trim): 0.0.3
:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.
Vulnerable Library - stylelint-13.6.0.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/node_modules/trim/package.json
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2021-33623
### Vulnerable Library - trim-newlines-3.0.0.tgzTrim newlines from the start and/or end of a string
Library home page: https://registry.npmjs.org/trim-newlines/-/trim-newlines-3.0.0.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/node_modules/trim-newlines/package.json
Dependency Hierarchy: - stylelint-13.6.0.tgz (Root Library) - meow-7.1.1.tgz - :x: **trim-newlines-3.0.0.tgz** (Vulnerable Library)
Found in base branch: master
### Vulnerability DetailsThe trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
Publish Date: 2021-05-28
URL: CVE-2021-33623
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623
Release Date: 2021-05-28
Fix Resolution (trim-newlines): 3.0.1
Direct dependency fix Resolution (stylelint): 13.6.1
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.CVE-2020-7753
### Vulnerable Library - trim-0.0.1.tgzTrim string whitespace
Library home page: https://registry.npmjs.org/trim/-/trim-0.0.1.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/node_modules/trim/package.json
Dependency Hierarchy: - stylelint-13.6.0.tgz (Root Library) - postcss-markdown-0.36.1.tgz - remark-12.0.1.tgz - remark-parse-8.0.3.tgz - :x: **trim-0.0.1.tgz** (Vulnerable Library)
Found in base branch: master
### Vulnerability DetailsAll versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
Publish Date: 2020-10-27
URL: CVE-2020-7753
### CVSS 3 Score Details (7.5)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Release Date: 2020-10-27
Fix Resolution (trim): 0.0.3
Direct dependency fix Resolution (stylelint): 13.6.1
:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.:rescue_worker_helmet:Automatic Remediation will be attempted for this issue.