-
Notifications
You must be signed in to change notification settings - Fork 1
Description
Vulnerable Library - esm-3.0.80.tgz
Tomorrow's ECMAScript modules today!
Library home page: https://registry.npmjs.org/esm/-/esm-3.0.80.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/esm/package.json
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (esm version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|
| WS-2018-0591 | 6.5 | esm-3.0.80.tgz | Direct | 3.1.0 | ✅ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2018-0591
Vulnerable Library - esm-3.0.80.tgz
Tomorrow's ECMAScript modules today!
Library home page: https://registry.npmjs.org/esm/-/esm-3.0.80.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/esm/package.json
Dependency Hierarchy:
- ❌ esm-3.0.80.tgz (Vulnerable Library)
Found in base branch: master
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
Publish Date: 2018-12-24
URL: WS-2018-0591
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2018-12-24
Fix Resolution: 3.1.0
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.