tapalif / localstack

💻 A fully functional local AWS cloud stack. Develop and test your cloud & Serverless apps offline!
https://localstack.cloud
Other
0 stars 0 forks source link

lambda_http-0.5.1.crate: 3 vulnerabilities (highest severity is: 7.5) #2

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago
Vulnerable Library - lambda_http-0.5.1.crate

Path to dependency file: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Path to vulnerable library: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (lambda_http version) Remediation Possible**
CVE-2023-26964 High 7.5 hyper-0.14.18.crate Transitive N/A*
CVE-2022-31394 High 7.5 hyper-0.14.18.crate Transitive N/A*
CVE-2020-26235 Medium 5.3 chrono-0.4.19.crate Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-26964 ### Vulnerable Library - hyper-0.14.18.crate

A fast and correct HTTP library.

Library home page: https://crates.io/api/v1/crates/hyper/0.14.18/download

Path to dependency file: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Path to vulnerable library: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Dependency Hierarchy: - lambda_http-0.5.1.crate (Root Library) - lambda_runtime-0.5.1.crate - lambda_runtime_api_client-0.5.0.crate - :x: **hyper-0.14.18.crate** (Vulnerable Library)

Found in base branch: master

### Vulnerability Details

An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS).

Publish Date: 2023-04-11

URL: CVE-2023-26964

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-f8vr-r385-rh5r

Release Date: 2023-04-11

Fix Resolution: h2 - 0.3.17

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2022-31394 ### Vulnerable Library - hyper-0.14.18.crate

A fast and correct HTTP library.

Library home page: https://crates.io/api/v1/crates/hyper/0.14.18/download

Path to dependency file: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Path to vulnerable library: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Dependency Hierarchy: - lambda_http-0.5.1.crate (Root Library) - lambda_runtime-0.5.1.crate - lambda_runtime_api_client-0.5.0.crate - :x: **hyper-0.14.18.crate** (Vulnerable Library)

Found in base branch: master

### Vulnerability Details

Hyperium Hyper before 0.14.19 does not allow for customization of the max_header_list_size method in the H2 third-party software, allowing attackers to perform HTTP2 attacks.

Publish Date: 2023-02-21

URL: CVE-2022-31394

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2023-02-21

Fix Resolution: hyper - v0.14.19

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
CVE-2020-26235 ### Vulnerable Library - chrono-0.4.19.crate

Date and time library for Rust

Library home page: https://crates.io/api/v1/crates/chrono/0.4.19/download

Path to dependency file: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Path to vulnerable library: /tests/integration/awslambda/functions/rust-lambda/Cargo.toml

Dependency Hierarchy: - lambda_http-0.5.1.crate (Root Library) - aws_lambda_events-0.6.2 - :x: **chrono-0.4.19.crate** (Vulnerable Library)

Found in base branch: master

### Vulnerability Details

In Rust time crate from version 0.2.7 and before version 0.2.23, unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires the user to set any environment variable in a different thread than the affected functions. The affected functions are time::UtcOffset::local_offset_at, time::UtcOffset::try_local_offset_at, time::UtcOffset::current_local_offset, time::UtcOffset::try_current_local_offset, time::OffsetDateTime::now_local and time::OffsetDateTime::try_now_local. Non-Unix targets are unaffected. This includes Windows and wasm. The issue was introduced in version 0.2.7 and fixed in version 0.2.23.

Publish Date: 2020-11-24

URL: CVE-2020-26235

### CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2020-0071.html

Release Date: 2020-11-24

Fix Resolution: chrono - 0.4.20,time - 0.2.23

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)