-
Notifications
You must be signed in to change notification settings - Fork 3
Description
CVE-2024-43799 - Medium Severity Vulnerability
Vulnerable Library - send-0.16.2.tgz
Better streaming static file server with Range and conditional-GET support
Library home page: https://registry.npmjs.org/send/-/send-0.16.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- express-4.16.4.tgz (Root Library)
- ❌ send-0.16.2.tgz (Vulnerable Library)
Found in HEAD commit: 9747f642e0c7071927887b37359653c28972ea6a
Found in base branch: main
Vulnerability Details
Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.
Publish Date: 2024-09-10
URL: CVE-2024-43799
CVSS 3 Score Details (5.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-m6fv-jmcg-4jfg
Release Date: 2024-09-10
Fix Resolution (send): 0.19.0
Direct dependency fix Resolution (express): 4.21.0
Step up your Open Source Security Game with Mend here