-
Notifications
You must be signed in to change notification settings - Fork 2
Description
Vulnerable Library - grunt-mochify-0.3.0.tgz
Path to dependency file: /justapis-javascript-sdk/package.json
Path to vulnerable library: /node_modules/https-proxy-agent/package.json
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (grunt-mochify version) | Remediation Available | |
|---|---|---|---|---|---|---|
| WS-2019-0310 | 7.5 | https-proxy-agent-2.2.1.tgz | Transitive | N/A* | ❌ | |
| WS-2020-0042 | 7.5 | acorn-5.7.3.tgz | Transitive | N/A* | ❌ | |
| CVE-2021-3377 | 6.1 | ansi_up-1.3.0.tgz | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
WS-2019-0310
Vulnerable Library - https-proxy-agent-2.2.1.tgz
An HTTP(s) proxy `http.Agent` implementation for HTTPS
Library home page: https://registry.npmjs.org/https-proxy-agent/-/https-proxy-agent-2.2.1.tgz
Path to dependency file: /justapis-javascript-sdk/package.json
Path to vulnerable library: /node_modules/https-proxy-agent/package.json
Dependency Hierarchy:
- grunt-mochify-0.3.0.tgz (Root Library)
- mochify-2.19.0.tgz
- min-wd-2.12.0.tgz
- saucelabs-1.5.0.tgz
- ❌ https-proxy-agent-2.2.1.tgz (Vulnerable Library)
- saucelabs-1.5.0.tgz
- min-wd-2.12.0.tgz
- mochify-2.19.0.tgz
Vulnerability Details
"in 'https-proxy-agent', before v2.2.3, there is a failure of TLS enforcement on the socket. Attacker may intercept unencrypted communications.
Publish Date: 2019-10-07
URL: WS-2019-0310
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1184
Release Date: 2019-10-07
Fix Resolution: https-proxy-agent - 2.2.3
WS-2020-0042
Vulnerable Library - acorn-5.7.3.tgz
ECMAScript parser
Library home page: https://registry.npmjs.org/acorn/-/acorn-5.7.3.tgz
Path to dependency file: /justapis-javascript-sdk/package.json
Path to vulnerable library: /node_modules/falafel/node_modules/acorn/package.json
Dependency Hierarchy:
- grunt-mochify-0.3.0.tgz (Root Library)
- mochify-2.19.0.tgz
- coverify-1.5.1.tgz
- falafel-2.1.0.tgz
- ❌ acorn-5.7.3.tgz (Vulnerable Library)
- falafel-2.1.0.tgz
- coverify-1.5.1.tgz
- mochify-2.19.0.tgz
Vulnerability Details
acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser.
Publish Date: 2020-03-01
URL: WS-2020-0042
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-6chw-6frg-f759
Release Date: 2020-03-01
Fix Resolution: acorn - 5.7.4,6.4.1,7.1.1
CVE-2021-3377
Vulnerable Library - ansi_up-1.3.0.tgz
Convert ansi sequences in strings to colorful HTML
Library home page: https://registry.npmjs.org/ansi_up/-/ansi_up-1.3.0.tgz
Path to dependency file: /justapis-javascript-sdk/package.json
Path to vulnerable library: /node_modules/ansi_up/package.json
Dependency Hierarchy:
- grunt-mochify-0.3.0.tgz (Root Library)
- mochify-2.19.0.tgz
- consolify-2.2.0.tgz
- ❌ ansi_up-1.3.0.tgz (Vulnerable Library)
- consolify-2.2.0.tgz
- mochify-2.19.0.tgz
Vulnerability Details
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
Publish Date: 2021-03-05
URL: CVE-2021-3377
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2021-03-05
Fix Resolution: v5.0.0