Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2022-3517 - High Severity Vulnerability
Vulnerable Libraries - minimatch-3.0.4.tgz, minimatch-3.0.3.tgz
minimatch-3.0.4.tgz
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz
Path to dependency file: /tools/clang-format/package.json
Path to vulnerable library: /tools/clang-format/node_modules/minimatch/package.json,/deps/npm/docs/package.json,/deps/acorn-plugins/acorn-static-class-features/node_modules/acorn-private-class-elements/node_modules/minimatch/package.json,/deps/acorn-plugins/acorn-private-methods/node_modules/acorn-private-class-elements/node_modules/minimatch/package.json,/deps/npm/node_modules/minimatch/package.json,/tools/node-lint-md-cli-rollup/node_modules/minimatch/package.json,/deps/acorn-plugins/acorn-class-fields/node_modules/acorn-private-class-elements/node_modules/minimatch/package.json
Dependency Hierarchy: - clang-format-1.2.3.tgz (Root Library) - glob-7.1.2.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library)
minimatch-3.0.3.tgz
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-3.0.3.tgz
Path to dependency file: /deps/npm/package.json
Path to vulnerable library: /deps/npm/node_modules/tacks/node_modules/minimatch/package.json,/deps/npm/docs/package.json
Dependency Hierarchy: - gatsby-2.23.20.tgz (Root Library) - react-dev-utils-4.2.3.tgz - recursive-readdir-2.2.1.tgz - :x: **minimatch-3.0.3.tgz** (Vulnerable Library)
Found in HEAD commit: 816eb239406f6f1ea0705d8f7029bf859bdd56ae
Found in base branch: master
Vulnerability Details
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
Publish Date: 2022-10-17
URL: CVE-2022-3517
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2022-10-17
Fix Resolution: minimatch - 3.0.5
Step up your Open Source Security Game with Mend here