yael-lindman / jenkins

Jenkins automation server
https://www.jenkins.io
MIT License
1 stars 0 forks source link

CVE-2020-7753 (High) detected in trim-0.0.1.tgz #136

Open mend-bolt-for-github[bot] opened 8 months ago

mend-bolt-for-github[bot] commented 8 months ago

CVE-2020-7753 - High Severity Vulnerability

Vulnerable Library - trim-0.0.1.tgz

Trim string whitespace

Library home page: https://registry.npmjs.org/trim/-/trim-0.0.1.tgz

Path to dependency file: /war/package.json

Path to vulnerable library: /war/node_modules/trim/package.json

Dependency Hierarchy: - stylelint-13.5.0.tgz (Root Library) - postcss-markdown-0.36.1.tgz - remark-12.0.1.tgz - remark-parse-8.0.3.tgz - :x: **trim-0.0.1.tgz** (Vulnerable Library)

Found in HEAD commit: c3e721338bf5bf4c0292ed374cab9fd4b7c77948

Found in base branch: master

Vulnerability Details

All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().

Publish Date: 2020-10-27

URL: CVE-2020-7753

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2020-10-27

Fix Resolution (trim): 0.0.3

Direct dependency fix Resolution (stylelint): 13.6.0


Step up your Open Source Security Game with Mend here