-
Notifications
You must be signed in to change notification settings - Fork 2
Closed
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
CVE-2021-3377 - Medium Severity Vulnerability
Vulnerable Library - ansi_up-1.3.0.tgz
Convert ansi sequences in strings to colorful HTML
Library home page: https://registry.npmjs.org/ansi_up/-/ansi_up-1.3.0.tgz
Path to dependency file: /justapis-javascript-sdk/package.json
Path to vulnerable library: /node_modules/ansi_up/package.json
Dependency Hierarchy:
- grunt-mochify-0.3.0.tgz (Root Library)
- mochify-2.19.0.tgz
- consolify-2.2.0.tgz
- ❌ ansi_up-1.3.0.tgz (Vulnerable Library)
- consolify-2.2.0.tgz
- mochify-2.19.0.tgz
Vulnerability Details
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
Publish Date: 2021-03-05
URL: CVE-2021-3377
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/drudru/ansi_up/releases/tag/v5.0.0
Release Date: 2021-03-05
Fix Resolution: v5.0.0
Metadata
Metadata
Assignees
Labels
Mend: dependency security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource