-
-
Notifications
You must be signed in to change notification settings - Fork 11
Description
CVE-2022-1650 - High Severity Vulnerability
Vulnerable Library - eventsource-1.1.0.tgz
W3C compliant EventSource client for Node.js and browser (polyfill)
Library home page: https://registry.npmjs.org/eventsource/-/eventsource-1.1.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/eventsource/package.json
Dependency Hierarchy:
- vuepress-1.9.7.tgz (Root Library)
- core-1.9.7.tgz
- webpack-dev-server-3.11.2.tgz
- sockjs-client-1.5.1.tgz
- ❌ eventsource-1.1.0.tgz (Vulnerable Library)
- sockjs-client-1.5.1.tgz
- webpack-dev-server-3.11.2.tgz
- core-1.9.7.tgz
Found in HEAD commit: 20e3cd7cbde80fb9d9c5e9374cc6f0ffeff3fe98
Found in base branch: master
Vulnerability Details
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.
Publish Date: 2022-05-12
URL: CVE-2022-1650
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/
Release Date: 2022-05-12
Fix Resolution: eventsource - 2.0.2
Step up your Open Source Security Game with WhiteSource here