yurikrupnik / mussia5-next

mussia5-next.yurikrupnik.vercel.app
1 stars 2 forks source link

[DepShield] (CVSS 4.3) Vulnerability due to usage of bl:4.1.0 #84

Open sonatype-depshield[bot] opened 3 years ago

sonatype-depshield[bot] commented 3 years ago

Vulnerabilities

DepShield reports that this application's usage of bl:4.1.0 results in the following vulnerability(s):


Occurrences

bl:4.1.0 is a transitive dependency introduced by the following direct dependency(s):

next:10.0.7         └─ sharp:0.26.3               └─ tar-fs:2.1.1                     └─ tar-stream:2.2.0                           └─ bl:4.1.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

secure-code-warrior-for-github[bot] commented 3 years ago

Micro-Learning Topic: Information Exposure (CWE 200)

An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information.

Try this challenge in Secure Code Warrior

Micro-Learning Topic: Information disclosure (Detected by phrase)

Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try this challenge in Secure Code Warrior