You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/package.json
Path to vulnerable library: /npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm7/subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm6/subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm5/subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm5_and_yarn/npm_subdependency_update/node_modules/ws/package.json
ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the Sec-Websocket-Protocol header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (websockets/ws@00c425e). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options.
✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
mend-for-github-combot
changed the title
CVE-2021-32640 (Medium) detected in opennmsopennms-source-25.2.0-1, ws-5.2.2.tgz
CVE-2021-32640 (Medium) detected in opennmsopennms-source-25.2.0-1, ws-5.2.2.tgz - autoclosed
Mar 22, 2022
ℹ️ This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.
mend-for-github-combot
changed the title
CVE-2021-32640 (Medium) detected in opennmsopennms-source-25.2.0-1, ws-5.2.2.tgz - autoclosed
CVE-2021-32640 (Medium) detected in opennmsopennms-source-25.2.0-1, ws-5.2.2.tgz
Mar 23, 2022
mend-for-github-combot
changed the title
CVE-2021-32640 (Medium) detected in opennmsopennms-source-25.2.0-1, ws-5.2.2.tgz
CVE-2021-32640 (Medium) detected in ws-5.2.2.tgz
Oct 18, 2022
mend-for-github-combot
changed the title
CVE-2021-32640 (Medium) detected in ws-5.2.2.tgz
CVE-2021-32640 (Medium) detected in ws-5.2.2.tgz - autoclosed
May 5, 2024
CVE-2021-32640 - Medium Severity Vulnerability
Vulnerable Library - ws-5.2.2.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
Library home page: https://registry.npmjs.org/ws/-/ws-5.2.2.tgz
Path to dependency file: /npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/package.json
Path to vulnerable library: /npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm7/subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm6/subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm5/subdependency_update/node_modules/ws/package.json,/npm_and_yarn/spec/fixtures/projects/npm5_and_yarn/npm_subdependency_update/node_modules/ws/package.json
Dependency Hierarchy:
Found in HEAD commit: ba8cd9078c8ce0cb202767d627706711237abf71
Found in base branch: main
Vulnerability Details
ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the
Sec-Websocket-Protocol
header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (websockets/ws@00c425e). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the--max-http-header-size=size
and/or themaxHeaderSize
options.Publish Date: 2021-05-25
URL: CVE-2021-32640
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-6fc8-4gx4-v693
Release Date: 2021-05-25
Fix Resolution (ws): 5.2.3
Direct dependency fix Resolution (jest): 22.0.5
⛑️ Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: