uniquelyparticular / stripe-distinct-usage-tracking

This Particular example demonstrates how you can track unique Usage Records for Metered Pricing Subscriptions in Stripe.
https://uniquelyparticular.com
MIT License
1 stars 1 forks source link

WS-2020-0219 (High) detected in date-and-time-0.6.3.tgz #98

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

WS-2020-0219 - High Severity Vulnerability

Vulnerable Library - date-and-time-0.6.3.tgz

A Minimalist DateTime utility for Node.js and the browser

Library home page: https://registry.npmjs.org/date-and-time/-/date-and-time-0.6.3.tgz

Path to dependency file: stripe-distinct-usage-tracking/package.json

Path to vulnerable library: stripe-distinct-usage-tracking/node_modules/date-and-time

Dependency Hierarchy: - firebase-admin-8.2.0.tgz (Root Library) - storage-2.5.0.tgz - :x: **date-and-time-0.6.3.tgz** (Vulnerable Library)

Found in HEAD commit: 088cfbb378c9f4f5930c82bb93fd189389834cfb

Vulnerability Details

Due to an overly permissive regular expression, the parsing of certain date strings may lead to a denial of service.

Publish Date: 2020-12-25

URL: WS-2020-0219

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/knowledgecode/date-and-time/releases/tag/v0.14.2

Release Date: 2020-12-25

Fix Resolution: v0.14.2


Step up your Open Source Security Game with WhiteSource here