CVE-2024-43799 (Medium) detected in send-0.18.0.tgz - autoclosed
Closed this issue · 1 comments
CVE-2024-43799 - Medium Severity Vulnerability
Vulnerable Library - send-0.18.0.tgz
Better streaming static file server with Range and conditional-GET support
Library home page: https://registry.npmjs.org/send/-/send-0.18.0.tgz
Path to dependency file: /ui/package.json
Path to vulnerable library: /ui/package.json
Dependency Hierarchy:
- @postgres.ai/ce-1.0.0.tgz (Root Library)
- react-scripts-5.0.1.tgz
- webpack-dev-server-4.11.0.tgz
- express-4.19.2.tgz
- ❌ send-0.18.0.tgz (Vulnerable Library)
- express-4.19.2.tgz
- webpack-dev-server-4.11.0.tgz
- react-scripts-5.0.1.tgz
Found in HEAD commit: 648d066ef867d37462f0cde508f050b1e0b814d4
Found in base branch: master
Vulnerability Details
Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.
Publish Date: 2024-09-10
URL: CVE-2024-43799
CVSS 3 Score Details (5.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-m6fv-jmcg-4jfg
Release Date: 2024-09-10
Fix Resolution: send - 0.19.0
Step up your Open Source Security Game with Mend here
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.