This repository was archived by the owner on Jul 13, 2021. It is now read-only.
  
  
  
  
  
Description
 Vulnerable Library - qs-0.6.6.tgz
 Vulnerable Library - qs-0.6.6.tgz
querystring parser
Library home page: https://registry.npmjs.org/qs/-/qs-0.6.6.tgz
Path to dependency file: curratelo/package.json
Path to vulnerable library: curratelo/node_modules/feedparser/node_modules/qs/package.json
Dependency Hierarchy:
- rsj-0.0.4.tgz (Root Library)
- feedparser-0.15.10.tgz
- request-2.21.0.tgz
- ❌ qs-0.6.6.tgz (Vulnerable Library)
 
 
 
Found in HEAD commit: 3ae90cc0fdc0775addab724debe5389064e80b29
 Vulnerability Details
 Vulnerability Details
  
the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.
Publish Date: 2017-07-17
URL: CVE-2017-1000048
 CVSS 3 Score Details (7.5)
 CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
 
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
 
For more information on CVSS3 Scores, click here. Suggested Fix
 Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048
Release Date: 2017-07-17
Fix Resolution: qs - 6.0.4,6.1.2,6.2.3,6.3.2
Step up your Open Source Security Game with WhiteSource here