-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed #226
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Comments
mend-for-github-com
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
label
Feb 6, 2022
mend-for-github-com
bot
changed the title
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed
Feb 6, 2022
mend-for-github-com
bot
changed the title
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed
Feb 6, 2022
mend-for-github-com
bot
changed the title
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed
Feb 6, 2022
mend-for-github-com
bot
changed the title
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed
Feb 6, 2022
mend-for-github-com
bot
changed the title
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz
CVE-2021-31597 (High) detected in xmlhttprequest-ssl-1.5.5.tgz - autoclosed
Feb 6, 2022
ℹ️ This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #230 |
2 similar comments
ℹ️ This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #230 |
ℹ️ This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #230 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
0 participants
CVE-2021-31597 - High Severity Vulnerability
Vulnerable Library - xmlhttprequest-ssl-1.5.5.tgz
XMLHttpRequest for Node
Library home page: https://registry.npmjs.org/xmlhttprequest-ssl/-/xmlhttprequest-ssl-1.5.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/karma/node_modules/xmlhttprequest-ssl/package.json
Dependency Hierarchy:
Found in HEAD commit: 1f095df445c8211555c5cac7a64ad1641823057d
Vulnerability Details
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
Publish Date: 2021-04-23
URL: CVE-2021-31597
CVSS 3 Score Details (9.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31597
Release Date: 2021-04-23
Fix Resolution: xmlhttprequest-ssl - 1.6.1
The text was updated successfully, but these errors were encountered: