valdisiljuconoks/FeatureSwitch

WS-2018-0232 (Medium) detected in underscore.string-2.3.3.tgz - autoclosed

mend-bolt-for-github opened this issue · 1 comments

WS-2018-0232 - Medium Severity Vulnerability

Vulnerable Library - underscore.string-2.3.3.tgz

String manipulation extensions for Underscore.js javascript library.

Library home page: https://registry.npmjs.org/underscore.string/-/underscore.string-2.3.3.tgz

Path to dependency file: /tmp/WhiteSource-ArchiveExtractor_1b5c7dde-ab13-4b50-af30-1814130ab7c5/20191018140529_20994/ws-scm_depth_0/FeatureSwitch/EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json

Path to vulnerable library: /tmp/WhiteSource-ArchiveExtractor_1b5c7dde-ab13-4b50-af30-1814130ab7c5/20191018140529_20994/ws-scm_depth_0/FeatureSwitch/EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/underscore.string/package.json

Dependency Hierarchy:

  • intern-geezer-2.2.3.tgz (Root Library)
    • digdug-1.4.0.tgz
      • decompress-0.2.3.tgz
        • extname-0.1.5.tgz
          • underscore.string-2.3.3.tgz (Vulnerable Library)

Found in HEAD commit: baddc41bd57cf58410158a299a95502682b45d07

Vulnerability Details

Underscore.string, before 3.3.5, is vulnerable to Regular Expression Denial of Service (ReDoS).

Publish Date: 2018-12-30

URL: WS-2018-0232

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/745

Release Date: 2018-12-30

Fix Resolution: 3.3.5


Step up your Open Source Security Game with WhiteSource here

✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.