Skip to content

grunt-mochify-0.3.0.tgz: 3 vulnerabilities (highest severity is: 7.5) #96

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - grunt-mochify-0.3.0.tgz

Path to dependency file: /justapis-javascript-sdk/package.json

Path to vulnerable library: /node_modules/https-proxy-agent/package.json

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (grunt-mochify version) Remediation Available
WS-2019-0310 High 7.5 https-proxy-agent-2.2.1.tgz Transitive N/A*
WS-2020-0042 High 7.5 acorn-5.7.3.tgz Transitive N/A*
CVE-2021-3377 Medium 6.1 ansi_up-1.3.0.tgz Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

Details

WS-2019-0310

Vulnerable Library - https-proxy-agent-2.2.1.tgz

An HTTP(s) proxy `http.Agent` implementation for HTTPS

Library home page: https://registry.npmjs.org/https-proxy-agent/-/https-proxy-agent-2.2.1.tgz

Path to dependency file: /justapis-javascript-sdk/package.json

Path to vulnerable library: /node_modules/https-proxy-agent/package.json

Dependency Hierarchy:

  • grunt-mochify-0.3.0.tgz (Root Library)
    • mochify-2.19.0.tgz
      • min-wd-2.12.0.tgz
        • saucelabs-1.5.0.tgz
          • https-proxy-agent-2.2.1.tgz (Vulnerable Library)

Vulnerability Details

"in 'https-proxy-agent', before v2.2.3, there is a failure of TLS enforcement on the socket. Attacker may intercept unencrypted communications.

Publish Date: 2019-10-07

URL: WS-2019-0310

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1184

Release Date: 2019-10-07

Fix Resolution: https-proxy-agent - 2.2.3

WS-2020-0042

Vulnerable Library - acorn-5.7.3.tgz

ECMAScript parser

Library home page: https://registry.npmjs.org/acorn/-/acorn-5.7.3.tgz

Path to dependency file: /justapis-javascript-sdk/package.json

Path to vulnerable library: /node_modules/falafel/node_modules/acorn/package.json

Dependency Hierarchy:

  • grunt-mochify-0.3.0.tgz (Root Library)
    • mochify-2.19.0.tgz
      • coverify-1.5.1.tgz
        • falafel-2.1.0.tgz
          • acorn-5.7.3.tgz (Vulnerable Library)

Vulnerability Details

acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser.

Publish Date: 2020-03-01

URL: WS-2020-0042

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-6chw-6frg-f759

Release Date: 2020-03-01

Fix Resolution: acorn - 5.7.4,6.4.1,7.1.1

CVE-2021-3377

Vulnerable Library - ansi_up-1.3.0.tgz

Convert ansi sequences in strings to colorful HTML

Library home page: https://registry.npmjs.org/ansi_up/-/ansi_up-1.3.0.tgz

Path to dependency file: /justapis-javascript-sdk/package.json

Path to vulnerable library: /node_modules/ansi_up/package.json

Dependency Hierarchy:

  • grunt-mochify-0.3.0.tgz (Root Library)
    • mochify-2.19.0.tgz
      • consolify-2.2.0.tgz
        • ansi_up-1.3.0.tgz (Vulnerable Library)

Vulnerability Details

The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.

Publish Date: 2021-03-05

URL: CVE-2021-3377

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2021-03-05

Fix Resolution: v5.0.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions