Path to dependency file: /Examples/RadiusServiceAccountJSExample/package.json
Path to vulnerable library: /Examples/RadiusServiceAccountJSExample/node_modules/glob-parent/package.json,/Examples/WebAuthnJSExample/node_modules/glob-parent/package.json,/Examples/OneTimePasswordJSExample/node_modules/glob-parent/package.json
CVE-2021-35065 - Medium Severity Vulnerability
Vulnerable Library - glob-parent-5.1.2.tgz
Extract the non-magic parent path from a glob string.
Library home page: https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz
Path to dependency file: /Examples/RadiusServiceAccountJSExample/package.json
Path to vulnerable library: /Examples/RadiusServiceAccountJSExample/node_modules/glob-parent/package.json,/Examples/WebAuthnJSExample/node_modules/glob-parent/package.json,/Examples/OneTimePasswordJSExample/node_modules/glob-parent/package.json
Dependency Hierarchy: - keycloak-connect-16.1.0.tgz (Root Library) - chromedriver-96.0.0.tgz - del-6.0.0.tgz - globby-11.0.4.tgz - fast-glob-3.2.7.tgz - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)
Found in HEAD commit: 7b55223b123b87ca05baee2f1273af7fdbffd30b
Found in base branch: master
Vulnerability Details
The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)
Publish Date: 2021-06-22
URL: CVE-2021-35065
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://github.com/gulpjs/glob-parent/pull/49
Release Date: 2021-06-22
Fix Resolution: glob-parent - 6.0.1
Step up your Open Source Security Game with WhiteSource here