AlexRogalskiy/android-patterns

CVE-2021-3795 (Medium) detected in semver-regex-1.0.0.tgz

mend-bolt-for-github opened this issue · 0 comments

CVE-2021-3795 - Medium Severity Vulnerability

Vulnerable Library - semver-regex-1.0.0.tgz

Regular expression for matching semver versions

Library home page: https://registry.npmjs.org/semver-regex/-/semver-regex-1.0.0.tgz

Path to dependency file: android-patterns/package.json

Path to vulnerable library: android-patterns/node_modules/semver-regex/package.json

Dependency Hierarchy:

  • validate-commit-msg-2.14.0.tgz (Root Library)
    • semver-regex-1.0.0.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

semver-regex is vulnerable to Inefficient Regular Expression Complexity

Publish Date: 2021-09-15

URL: CVE-2021-3795

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: N/A
    • Attack Complexity: N/A
    • Privileges Required: N/A
    • User Interaction: N/A
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/sindresorhus/semver-regex/releases/tag/v4.0.1

Release Date: 2021-09-15

Fix Resolution: semver-regex - 3.1.3,4.0.1


Step up your Open Source Security Game with WhiteSource here