WS-2018-0232 (Medium) detected in underscore.string-2.3.3.tgz - autoclosed
mend-bolt-for-github opened this issue · 1 comments
WS-2018-0232 - Medium Severity Vulnerability
Vulnerable Library - underscore.string-2.3.3.tgz
String manipulation extensions for Underscore.js javascript library.
Library home page: https://registry.npmjs.org/underscore.string/-/underscore.string-2.3.3.tgz
Path to dependency file: /tmp/WhiteSource-ArchiveExtractor_1b5c7dde-ab13-4b50-af30-1814130ab7c5/20191018140529_20994/ws-scm_depth_0/FeatureSwitch/EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json
Path to vulnerable library: /tmp/WhiteSource-ArchiveExtractor_1b5c7dde-ab13-4b50-af30-1814130ab7c5/20191018140529_20994/ws-scm_depth_0/FeatureSwitch/EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/underscore.string/package.json
Dependency Hierarchy:
- intern-geezer-2.2.3.tgz (Root Library)
- digdug-1.4.0.tgz
- decompress-0.2.3.tgz
- extname-0.1.5.tgz
- ❌ underscore.string-2.3.3.tgz (Vulnerable Library)
- extname-0.1.5.tgz
- decompress-0.2.3.tgz
- digdug-1.4.0.tgz
Found in HEAD commit: baddc41bd57cf58410158a299a95502682b45d07
Vulnerability Details
Underscore.string, before 3.3.5, is vulnerable to Regular Expression Denial of Service (ReDoS).
Publish Date: 2018-12-30
URL: WS-2018-0232
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/745
Release Date: 2018-12-30
Fix Resolution: 3.3.5
Step up your Open Source Security Game with WhiteSource here
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.