Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz - autoclosed #43

Closed
mend-bolt-for-github bot opened this issue Dec 20, 2020 · 3 comments · Fixed by #370, #376, #377, #386 or #378
Closed

WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz - autoclosed #43

mend-bolt-for-github bot opened this issue Dec 20, 2020 · 3 comments · Fixed by #370, #376, #377, #386 or #378
Labels
Mend: dependency security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link

mend-bolt-for-github bot commented Dec 20, 2020

WS-2020-0180 - High Severity Vulnerability

Vulnerable Library - npm-user-validate-1.0.0.tgz

User validations for npm

Library home page: https://registry.npmjs.org/npm-user-validate/-/npm-user-validate-1.0.0.tgz

Dependency Hierarchy:

  • open-color-1.7.0.tgz (Root Library)
    • npm-6.13.4.tgz
      • npm-user-validate-1.0.0.tgz (Vulnerable Library)

Found in HEAD commit: 5a4a7def9ddff6354e22069c494feb0f30196e36

Found in base branch: dev/seed-tool

Vulnerability Details

The package npm-user-validate prior to version 1.0.1 is vulnerable to REDoS. The regex that validates a user's email took exponentially longer to process input strings that begin with the '@' character.

Publish Date: 2020-10-16

URL: WS-2020-0180

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-xgh6-85xh-479p

Release Date: 2020-10-16

Fix Resolution (npm-user-validate): 1.0.1

Direct dependency fix Resolution (open-color): 1.8.0


Step up your Open Source Security Game with Mend here

@mend-bolt-for-github mend-bolt-for-github bot added the Mend: dependency security vulnerability Security vulnerability detected by WhiteSource label Dec 20, 2020
@mend-bolt-for-github mend-bolt-for-github bot changed the title WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz - autoclosed Jan 15, 2021
@mend-bolt-for-github
Copy link
Author

✔️ This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.

@mend-bolt-for-github mend-bolt-for-github bot changed the title WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz - autoclosed WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz Jul 7, 2021
@mend-bolt-for-github mend-bolt-for-github bot reopened this Jul 7, 2021
@mend-bolt-for-github
Copy link
Author

ℹ️ This issue was automatically re-opened by WhiteSource because the vulnerable library in the specific branch(es) has been detected in the WhiteSource inventory.

@mend-bolt-for-github
Copy link
Author

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.

@mend-bolt-for-github mend-bolt-for-github bot changed the title WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz WS-2020-0180 (High) detected in npm-user-validate-1.0.0.tgz - autoclosed Sep 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment