Skip to content

CVE-2021-3377 (Medium) detected in ansi_up-1.3.0.tgz - autoclosed #83

@mend-for-github-com

Description

@mend-for-github-com

CVE-2021-3377 - Medium Severity Vulnerability

Vulnerable Library - ansi_up-1.3.0.tgz

Convert ansi sequences in strings to colorful HTML

Library home page: https://registry.npmjs.org/ansi_up/-/ansi_up-1.3.0.tgz

Path to dependency file: /justapis-javascript-sdk/package.json

Path to vulnerable library: /node_modules/ansi_up/package.json

Dependency Hierarchy:

  • grunt-mochify-0.3.0.tgz (Root Library)
    • mochify-2.19.0.tgz
      • consolify-2.2.0.tgz
        • ansi_up-1.3.0.tgz (Vulnerable Library)

Vulnerability Details

The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.

Publish Date: 2021-03-05

URL: CVE-2021-3377

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/drudru/ansi_up/releases/tag/v5.0.0

Release Date: 2021-03-05

Fix Resolution: v5.0.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions