scriptex/rollup-mpa

CVE-2021-32640 (Medium) detected in ws-7.4.5.tgz, ws-6.2.1.tgz

Closed this issue · 0 comments

CVE-2021-32640 - Medium Severity Vulnerability

Vulnerable Libraries - ws-7.4.5.tgz, ws-6.2.1.tgz

ws-7.4.5.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-7.4.5.tgz

Path to dependency file: rollup-mpa/package.json

Path to vulnerable library: rollup-mpa/node_modules/ws

Dependency Hierarchy:

  • rollup-plugin-browsersync-1.3.3.tgz (Root Library)
    • browser-sync-2.26.14.tgz
      • browser-sync-ui-2.26.14.tgz
        • socket.io-client-2.4.0.tgz
          • engine.io-client-3.5.2.tgz
            • ws-7.4.5.tgz (Vulnerable Library)
ws-6.2.1.tgz

Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js

Library home page: https://registry.npmjs.org/ws/-/ws-6.2.1.tgz

Path to dependency file: rollup-mpa/package.json

Path to vulnerable library: rollup-mpa/node_modules/ws

Dependency Hierarchy:

  • critical-3.1.0.tgz (Root Library)
    • penthouse-2.3.2.tgz
      • puppeteer-2.1.1.tgz
        • ws-6.2.1.tgz (Vulnerable Library)

Found in HEAD commit: da9215f899d878573eb406b3d7a6b82546e5e14f

Vulnerability Details

ws is an open source WebSocket client and server library for Node.js. A specially crafted value of the Sec-Websocket-Protocol header can be used to significantly slow down a ws server. The vulnerability has been fixed in ws@7.4.6 (websockets/ws@00c425e). In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options.

Publish Date: 2021-05-25

URL: CVE-2021-32640

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-6fc8-4gx4-v693

Release Date: 2021-05-25

Fix Resolution: ws - 7.4.6


Step up your Open Source Security Game with WhiteSource here