vzakharchenko / keycloak-radius-plugin

Make the radius server as part of keycloak SSO
Apache License 2.0
188 stars 46 forks source link

CVE-2021-35065 (Medium) detected in glob-parent-5.1.2.tgz #477

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2021-35065 - Medium Severity Vulnerability

Vulnerable Library - glob-parent-5.1.2.tgz

Extract the non-magic parent path from a glob string.

Library home page: https://registry.npmjs.org/glob-parent/-/glob-parent-5.1.2.tgz

Path to dependency file: /Examples/RadiusServiceAccountJSExample/package.json

Path to vulnerable library: /Examples/RadiusServiceAccountJSExample/node_modules/glob-parent/package.json,/Examples/WebAuthnJSExample/node_modules/glob-parent/package.json,/Examples/OneTimePasswordJSExample/node_modules/glob-parent/package.json

Dependency Hierarchy: - keycloak-connect-16.1.0.tgz (Root Library) - chromedriver-96.0.0.tgz - del-6.0.0.tgz - globby-11.0.4.tgz - fast-glob-3.2.7.tgz - :x: **glob-parent-5.1.2.tgz** (Vulnerable Library)

Found in HEAD commit: 7b55223b123b87ca05baee2f1273af7fdbffd30b

Found in base branch: master

Vulnerability Details

The package glob-parent before 6.0.1 are vulnerable to Regular Expression Denial of Service (ReDoS)

Publish Date: 2021-06-22

URL: CVE-2021-35065

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/gulpjs/glob-parent/pull/49

Release Date: 2021-06-22

Fix Resolution: glob-parent - 6.0.1


Step up your Open Source Security Game with WhiteSource here

vzakharchenko commented 2 years ago

The issue inside examples