yael-lindman / jenkins

Jenkins automation server
https://www.jenkins.io
MIT License
1 stars 0 forks source link

CVE-2021-3777 (High) detected in tmpl-1.0.4.tgz #140

Open mend-bolt-for-github[bot] opened 7 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2021-3777 - High Severity Vulnerability

Vulnerable Library - tmpl-1.0.4.tgz

JavaScript micro templates.

Library home page: https://registry.npmjs.org/tmpl/-/tmpl-1.0.4.tgz

Path to dependency file: /war/package.json

Path to vulnerable library: /war/node_modules/tmpl/package.json

Dependency Hierarchy: - jest-26.0.1.tgz (Root Library) - core-26.5.2.tgz - jest-haste-map-26.5.2.tgz - walker-1.0.7.tgz - makeerror-1.0.11.tgz - :x: **tmpl-1.0.4.tgz** (Vulnerable Library)

Found in HEAD commit: 3abfb254ea347629c1aed893510d133a3831c30e

Found in base branch: master

Vulnerability Details

nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity

Publish Date: 2021-09-15

URL: CVE-2021-3777

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-09-15

Fix Resolution (tmpl): 1.0.5

Direct dependency fix Resolution (jest): 26.1.0


Step up your Open Source Security Game with Mend here