n-devs/example-scripts-react

CVE-2021-32640 (Medium) detected in ws-5.2.2.tgz, ws-6.2.1.tgz

Opened this issue · 0 comments

CVE-2021-32640 - Medium Severity Vulnerability

Vulnerable Libraries - ws-5.2.2.tgz, ws-6.2.1.tgz

ws-5.2.2.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-5.2.2.tgz

Path to dependency file: /example-scripts-react/package.json

Path to vulnerable library: /node_modules/ws/package.json

Dependency Hierarchy:

  • jest-24.7.1.tgz (Root Library)
    • jest-cli-24.8.0.tgz
      • jest-config-24.8.0.tgz
        • jest-environment-jsdom-24.8.0.tgz
          • jsdom-11.12.0.tgz
            • ws-5.2.2.tgz (Vulnerable Library)
ws-6.2.1.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-6.2.1.tgz

Path to dependency file: /example-scripts-react/package.json

Path to vulnerable library: /node_modules/jest-environment-jsdom-fourteen/node_modules/ws/package.json

Dependency Hierarchy:

  • jest-environment-jsdom-fourteen-0.1.0.tgz (Root Library)
    • jsdom-14.1.0.tgz
      • ws-6.2.1.tgz (Vulnerable Library)

Found in HEAD commit: ac8cb104efadc95928de5331b866ed869bb87799

Found in base branch: master

Vulnerability Details

ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the Sec-Websocket-Protocol header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (websockets/ws@00c425e). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options.

Publish Date: 2021-05-25

URL: CVE-2021-32640

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-6fc8-4gx4-v693

Release Date: 2021-05-25

Fix Resolution (ws): 5.2.3

Direct dependency fix Resolution (jest): 24.8.0

Fix Resolution (ws): 5.2.3

Direct dependency fix Resolution (jest-environment-jsdom-fourteen): 1.0.0


Step up your Open Source Security Game with Mend here