CVE-2020-7693 (Medium) detected in sockjs-0.3.19.tgz #181
Description
CVE-2020-7693 - Medium Severity Vulnerability
Vulnerable Library - sockjs-0.3.19.tgz
SockJS-node is a server counterpart of SockJS-client a JavaScript library that provides a WebSocket-like object in the browser. SockJS gives you a coherent, cross-browser, Javascript API which creates a low latency, full duplex, cross-domain communication
Library home page: https://registry.npmjs.org/sockjs/-/sockjs-0.3.19.tgz
Path to dependency file: recursos.osweekends.com/client/package.json
Path to vulnerable library: recursos.osweekends.com/client/node_modules/sockjs/package.json
Dependency Hierarchy:
- webpack-dev-server-2.11.2.tgz (Root Library)
- ❌ sockjs-0.3.19.tgz (Vulnerable Library)
Found in HEAD commit: c83955b286970e6cbd3d350e89d20e99ccb6eacc
Vulnerability Details
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
Publish Date: 2020-07-09
URL: CVE-2020-7693
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: sockjs/sockjs-node#265
Release Date: 2020-07-09
Fix Resolution: sockjs - 0.3.20
Step up your Open Source Security Game with WhiteSource here
Activity