-
-
Notifications
You must be signed in to change notification settings - Fork 6
Description
CVE-2024-9506 - Low Severity Vulnerability
Vulnerable Libraries - vue-2.7.16.tgz, compiler-sfc-2.7.16.tgz
vue-2.7.16.tgz
Library home page: https://registry.npmjs.org/vue/-/vue-2.7.16.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- ❌ vue-2.7.16.tgz (Vulnerable Library)
compiler-sfc-2.7.16.tgz
Library home page: https://registry.npmjs.org/@vue/compiler-sfc/-/compiler-sfc-2.7.16.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- vue-2.7.16.tgz (Root Library)
- ❌ compiler-sfc-2.7.16.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper regular expression in Vue's parseHTML function leads to a potential regular expression denial of service vulnerability.
Publish Date: 2024-10-15
URL: CVE-2024-9506
CVSS 3 Score Details (3.7)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-5j4c-8p2g-v4jx
Release Date: 2024-10-15
Fix Resolution (@vue/compiler-sfc): 3.0.0
Direct dependency fix Resolution (vue): 3.0.0
Step up your Open Source Security Game with Mend here