Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

moment-2.10.3.min.js: 3 vulnerabilities (highest severity is: 7.5) #25

Open
dev-mend-for-github-com bot opened this issue Mar 21, 2022 · 0 comments
Labels
security vulnerability Security vulnerability detected by WhiteSource

Comments

@dev-mend-for-github-com
Copy link
Contributor

Vulnerable Library - moment-2.10.3.min.js

Parse, validate, manipulate, and display dates

Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.3/moment.min.js

Path to vulnerable library: /NuGet_NonSDK_Test/App_Plugins/UmbracoForms/Assets/moment/min/moment.min.js

Found in HEAD commit: 1485a69c20022d87a3b00fb210407992d144a42a

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in Remediation Available
CVE-2017-18214 High 7.5 moment-2.10.3.min.js Direct 2.19.3
CVE-2016-4055 Medium 6.5 moment-2.10.3.min.js Direct 2.11.2
WS-2016-0075 Medium 5.3 moment-2.10.3.min.js Direct 2.15.2

Details

CVE-2017-18214

Vulnerable Library - moment-2.10.3.min.js

Parse, validate, manipulate, and display dates

Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.3/moment.min.js

Path to vulnerable library: /NuGet_NonSDK_Test/App_Plugins/UmbracoForms/Assets/moment/min/moment.min.js

Dependency Hierarchy:

  • moment-2.10.3.min.js (Vulnerable Library)

Found in HEAD commit: 1485a69c20022d87a3b00fb210407992d144a42a

Found in base branch: main

Vulnerability Details

The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055.

Publish Date: 2018-03-04

URL: CVE-2017-18214

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18214

Release Date: 2018-03-04

Fix Resolution: 2.19.3

CVE-2016-4055

Vulnerable Library - moment-2.10.3.min.js

Parse, validate, manipulate, and display dates

Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.3/moment.min.js

Path to vulnerable library: /NuGet_NonSDK_Test/App_Plugins/UmbracoForms/Assets/moment/min/moment.min.js

Dependency Hierarchy:

  • moment-2.10.3.min.js (Vulnerable Library)

Found in HEAD commit: 1485a69c20022d87a3b00fb210407992d144a42a

Found in base branch: main

Vulnerability Details

The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."

Publish Date: 2017-01-23

URL: CVE-2016-4055

CVSS 3 Score Details (6.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4055

Release Date: 2017-01-23

Fix Resolution: 2.11.2

WS-2016-0075

Vulnerable Library - moment-2.10.3.min.js

Parse, validate, manipulate, and display dates

Library home page: https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.10.3/moment.min.js

Path to vulnerable library: /NuGet_NonSDK_Test/App_Plugins/UmbracoForms/Assets/moment/min/moment.min.js

Dependency Hierarchy:

  • moment-2.10.3.min.js (Vulnerable Library)

Found in HEAD commit: 1485a69c20022d87a3b00fb210407992d144a42a

Found in base branch: main

Vulnerability Details

Regular expression denial of service vulnerability in the moment package, by using a specific 40 characters long string in the "format" method.

Publish Date: 2016-10-24

URL: WS-2016-0075

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: moment/moment#3525

Release Date: 2016-10-24

Fix Resolution: 2.15.2

@dev-mend-for-github-com dev-mend-for-github-com bot added the security vulnerability Security vulnerability detected by WhiteSource label Mar 21, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants