scriptex/rollup-mpa

CVE-2022-0355 (High) detected in simple-get-3.1.0.tgz, simple-get-4.0.0.tgz

Closed this issue · 0 comments

CVE-2022-0355 - High Severity Vulnerability

Vulnerable Libraries - simple-get-3.1.0.tgz, simple-get-4.0.0.tgz

simple-get-3.1.0.tgz

Simplest way to make http get requests. Supports HTTPS, redirects, gzip/deflate, streams in < 100 lines.

Library home page: https://registry.npmjs.org/simple-get/-/simple-get-3.1.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/simple-get/package.json

Dependency Hierarchy:

  • create-pwa-2.3.1.tgz (Root Library)
    • sharp-0.27.1.tgz
      • prebuild-install-6.1.4.tgz
        • simple-get-3.1.0.tgz (Vulnerable Library)
simple-get-4.0.0.tgz

Simplest way to make http get requests. Supports HTTPS, redirects, gzip/deflate, streams in < 100 lines.

Library home page: https://registry.npmjs.org/simple-get/-/simple-get-4.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/simple-get/package.json

Dependency Hierarchy:

  • optisize-2.0.0.tgz (Root Library)
    • sharp-0.29.3.tgz
      • simple-get-4.0.0.tgz (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Exposure of Sensitive Information to an Unauthorized Actor in NPM simple-get prior to 4.0.1.

Publish Date: 2022-01-26

URL: CVE-2022-0355

CVSS 3 Score Details (8.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0355

Release Date: 2022-01-26

Fix Resolution: simple-get - 4.0.1


Step up your Open Source Security Game with WhiteSource here