Open mend-for-github-com[bot] opened 4 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
:information_source: This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.
WS-2019-0032 - Medium Severity Vulnerability
Vulnerable Library - js-yaml2.0.5
JavaScript YAML parser and dumper. Very fast.
Library home page: https://github.com/nodeca/js-yaml.git
Found in HEAD commit: c92f0918f68b35842a2bf5ae212e5d75e70546e5
Found in base branch: gh-pages
Vulnerable Source Files (1)
Vulnerability Details
Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
Publish Date: 2019-03-20
URL: WS-2019-0032
CVSS 2 Score Details (5.0)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/788/versions
Release Date: 2019-03-20
Fix Resolution: js-yaml - 3.13.0