Skip to content

WS-2019-0032 Medium Severity Vulnerability detected by WhiteSource #4

Open
@mend-bolt-for-github

Description

@mend-bolt-for-github

WS-2019-0032 - Medium Severity Vulnerability

Vulnerable Library - js-yaml-3.12.1.tgz

YAML 1.2 parser and serializer

path: /tmp/WhiteSource-ArchiveExtractor_ab2bb00b-ed70-419b-9c4a-209c36c3d101/20190325115538_97251/git_depth_0/cucumber-lambda-spike/.serverless/cucumber-lambda-spike/node_modules/js-yaml/package.json

Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-3.12.1.tgz

Dependency Hierarchy:

  • eslint-5.14.0.tgz (Root Library)
    • js-yaml-3.12.1.tgz (Vulnerable Library)

Found in HEAD commit: 0f280647b9a6690c51e04c8a31247070591aec33

Vulnerability Details

Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.

Publish Date: 2019-03-26

URL: WS-2019-0032

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/788/versions

Release Date: 2019-03-26

Fix Resolution: 3.13.0


Step up your Open Source Security Game with WhiteSource here

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions