uriel-naor / ISSUES

0 stars 0 forks source link

dustjs-linkedin-2.5.0.tgz: 1 vulnerabilities (highest severity is: 7.5) - autoclosed #23

Closed uriel-mend-app[bot] closed 1 year ago

uriel-mend-app[bot] commented 1 year ago
Vulnerable Library - dustjs-linkedin-2.5.0.tgz

Library home page: https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.5.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/dustjs-linkedin/package.json

Found in HEAD commit: 94f729510068f5d8203d19d5a1c9c50f8f631e8d

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (dustjs-linkedin version) Fix PR available
WS-2016-0058 High 7.5 dustjs-linkedin-2.5.0.tgz Direct 2.6.0

Details

WS-2016-0058 ### Vulnerable Library - dustjs-linkedin-2.5.0.tgz

Library home page: https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.5.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/dustjs-linkedin/package.json

Dependency Hierarchy: - :x: **dustjs-linkedin-2.5.0.tgz** (Vulnerable Library)

Found in HEAD commit: 94f729510068f5d8203d19d5a1c9c50f8f631e8d

Found in base branch: main

### Vulnerability Details

Code injection vulnerability in Dustjs-linkedin through 2.5.1 allows array variables to be applied without escaping dangerous characters.

Publish Date: 2014-04-01

URL: WS-2016-0058

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Release Date: 2014-04-01

Fix Resolution (dustjs-linkedin): 2.6.0

Direct dependency fix Resolution (dustjs-linkedin): 2.6.0

:rescue_worker_helmet: Automatic Remediation is available for this issue

:rescue_worker_helmet: Automatic Remediation is available for this issue.

uriel-mend-app[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.