Skip to content
This repository has been archived by the owner on Nov 29, 2020. It is now read-only.

CVE-2018-19838 (Medium) detected in opennms-opennms-source-22.0.1-1 #91

Closed
mend-bolt-for-github bot opened this issue Jun 3, 2020 · 1 comment
Labels
bug security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

CVE-2018-19838 - Medium Severity Vulnerability

Vulnerable Library - opennmsopennms-source-22.0.1-1

A Java based fault and performance management system

Library home page: https://sourceforge.net/projects/opennms/

Found in HEAD commit: 1440518eabee55e1fd196e62e38ff387e4980121

Library Source Files (64)

* The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.

  • /splitterino/node_modules/console-browserify/test/static/test-adapter.js
  • /splitterino/node_modules/nan/nan_callbacks_pre_12_inl.h
  • /splitterino/node_modules/node-sass/src/libsass/src/expand.hpp
  • /splitterino/node_modules/node-sass/src/sass_types/factory.cpp
  • /splitterino/node_modules/js-base64/.attic/test-moment/./yoshinoya.js
  • /splitterino/node_modules/node-sass/src/sass_types/boolean.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/value.h
  • /splitterino/node_modules/node-sass/src/libsass/src/emitter.hpp
  • /splitterino/node_modules/nan/nan_converters_pre_43_inl.h
  • /splitterino/node_modules/node-sass/src/libsass/src/file.cpp
  • /splitterino/node_modules/nan/nan_persistent_12_inl.h
  • /splitterino/node_modules/node-sass/src/libsass/src/operation.hpp
  • /splitterino/node_modules/nan/nan_persistent_pre_12_inl.h
  • /splitterino/node_modules/node-sass/src/libsass/src/operators.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/constants.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/error_handling.hpp
  • /splitterino/node_modules/nan/nan_implementation_pre_12_inl.h
  • /splitterino/node_modules/js-base64/.attic/test-moment/./dankogai.js
  • /splitterino/node_modules/node-sass/src/libsass/src/constants.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/list.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/functions.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/util.cpp
  • /splitterino/node_modules/node-sass/src/custom_function_bridge.cpp
  • /splitterino/node_modules/node-sass/src/custom_importer_bridge.h
  • /splitterino/node_modules/node-sass/src/libsass/src/bind.cpp
  • /splitterino/node_modules/nan/nan_json.h
  • /splitterino/node_modules/node-sass/src/libsass/src/eval.hpp
  • /splitterino/node_modules/nan/nan_converters.h
  • /splitterino/node_modules/node-sass/src/libsass/src/backtrace.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/extend.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/sass_value_wrapper.h
  • /splitterino/node_modules/node-sass/src/libsass/src/error_handling.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/emitter.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/number.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/color.h
  • /splitterino/node_modules/nan/nan_new.h
  • /splitterino/node_modules/node-sass/src/libsass/src/sass_values.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/ast.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/output.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/check_nesting.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/null.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/ast_def_macros.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/cssize.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/ast.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/to_c.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/to_value.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/ast_fwd_decl.hpp
  • /splitterino/node_modules/nan/nan_callbacks.h
  • /splitterino/node_modules/node-sass/src/libsass/src/inspect.hpp
  • /splitterino/node_modules/node-sass/src/sass_types/color.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/values.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/list.h
  • /splitterino/node_modules/node-sass/src/libsass/src/check_nesting.hpp
  • /splitterino/node_modules/nan/nan_define_own_property_helper.h
  • /splitterino/node_modules/js-base64/test/./es5.js
  • /splitterino/node_modules/node-sass/src/sass_types/map.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/to_value.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/context.cpp
  • /splitterino/node_modules/node-sass/src/sass_types/string.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/sass_context.cpp
  • /splitterino/node_modules/node-sass/src/libsass/src/prelexer.hpp
  • /splitterino/node_modules/node-sass/src/libsass/src/context.hpp
  • /splitterino/node_modules/node-sass/src/sass_types/boolean.h
  • /splitterino/node_modules/nan/nan_private.h

Vulnerability Details

In LibSass prior to 3.5.5, functions inside ast.cpp for IMPLEMENT_AST_OPERATORS expansion allow attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, as demonstrated by recursive calls involving clone(), cloneChildren(), and copy().

Publish Date: 2018-12-04

URL: CVE-2018-19838

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/sass/libsass/blob/3.6.0/src/ast.cpp

Release Date: 2019-07-01

Fix Resolution: LibSass - 3.6.0


Step up your Open Source Security Game with WhiteSource here

@mend-bolt-for-github mend-bolt-for-github bot added the security vulnerability Security vulnerability detected by WhiteSource label Jun 3, 2020
@issue-label-bot
Copy link

Issue-Label Bot is automatically applying the label bug to this issue, with a confidence of 0.85. Please mark this comment with 👍 or 👎 to give our bot feedback!

Links: app homepage, dashboard and code for this bot.

@issue-label-bot issue-label-bot bot added the bug label Jun 3, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

1 participant