turkdevops / node

Node.js JavaScript runtime :sparkles::turtle::rocket::sparkles:
https://nodejs.org/
Other
0 stars 0 forks source link

CVE-2020-8267 (Medium) detected in llhttprelease/v2.0.4 #252

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2020-8267 - Medium Severity Vulnerability

Vulnerable Library - llhttprelease/v2.0.4

Port of http_parser to llparse

Library home page: https://github.com/nodejs/llhttp.git

Found in HEAD commit: 816eb239406f6f1ea0705d8f7029bf859bdd56ae

Found in base branch: master

Vulnerable Source Files (2)

/deps/llhttp/src/llhttp.c /deps/llhttp/src/llhttp.c

Vulnerability Details

A security issue was found in UniFi Protect controller v1.14.10 and earlier.The authentication in the UniFi Protect controller API was using “x-token” improperly, allowing attackers to use the API to send authenticated messages without a valid token.This vulnerability was fixed in UniFi Protect v1.14.11 and newer.This issue does not impact UniFi Cloud Key Gen 2 plus.This issue does not impact UDM-Pro customers with UniFi Protect stopped.Affected Products:UDM-Pro firmware 1.7.2 and earlier.UNVR firmware 1.3.12 and earlier.Mitigation:Update UniFi Protect to v1.14.11 or newer version; the UniFi Protect controller can be updated through your UniFi OS settings.Alternatively, you can update UNVR and UDM-Pro to:- UNVR firmware to 1.3.15 or newer.- UDM-Pro firmware to 1.8.0 or newer.

Publish Date: 2020-11-05

URL: CVE-2020-8267

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8267

Release Date: 2020-11-05

Fix Resolution: v10.23.1, v12.20.1, v14.15.4, v15.5.1


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

mend-bolt-for-github[bot] commented 1 year ago

:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.