generated from energywebfoundation/EWFRepositoryTemplate
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
@energyweb/ocn-bridge-4.0.0.tgz: 14 vulnerabilities (highest severity is: 9.1) #78
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
Comments
mend-for-github-com
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by Mend
label
Aug 2, 2022
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 1 vulnerabilities (highest severity is: 5.9)
@energyweb/ocn-bridge-4.0.0.tgz: 1 vulnerabilities (highest severity is: 5.9) - autoclosed
Aug 5, 2022
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory. |
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 1 vulnerabilities (highest severity is: 5.9) - autoclosed
@energyweb/ocn-bridge-4.0.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
Nov 26, 2023
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory. |
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 1 vulnerabilities (highest severity is: 7.5)
@energyweb/ocn-bridge-4.0.0.tgz: 2 vulnerabilities (highest severity is: 7.5)
Mar 25, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 2 vulnerabilities (highest severity is: 7.5)
@energyweb/ocn-bridge-4.0.0.tgz: 3 vulnerabilities (highest severity is: 7.5)
Mar 26, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 3 vulnerabilities (highest severity is: 7.5)
@energyweb/ocn-bridge-4.0.0.tgz: 6 vulnerabilities (highest severity is: 7.5)
Aug 4, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 6 vulnerabilities (highest severity is: 7.5)
@energyweb/ocn-bridge-4.0.0.tgz: 6 vulnerabilities (highest severity is: 9.1)
Aug 16, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 6 vulnerabilities (highest severity is: 9.1)
@energyweb/ocn-bridge-4.0.0.tgz: 7 vulnerabilities (highest severity is: 9.1)
Sep 10, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 7 vulnerabilities (highest severity is: 9.1)
@energyweb/ocn-bridge-4.0.0.tgz: 8 vulnerabilities (highest severity is: 9.1)
Sep 10, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 8 vulnerabilities (highest severity is: 9.1)
@energyweb/ocn-bridge-4.0.0.tgz: 11 vulnerabilities (highest severity is: 9.1)
Sep 11, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 11 vulnerabilities (highest severity is: 9.1)
@energyweb/ocn-bridge-4.0.0.tgz: 12 vulnerabilities (highest severity is: 9.1)
Oct 6, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 12 vulnerabilities (highest severity is: 9.1)
@energyweb/ocn-bridge-4.0.0.tgz: 13 vulnerabilities (highest severity is: 9.1)
Oct 11, 2024
mend-for-github-com
bot
changed the title
@energyweb/ocn-bridge-4.0.0.tgz: 13 vulnerabilities (highest severity is: 9.1)
@energyweb/ocn-bridge-4.0.0.tgz: 14 vulnerabilities (highest severity is: 9.1)
Dec 6, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
0 participants
Vulnerable Library - @energyweb/ocn-bridge-4.0.0.tgz
Path to dependency file: /packages/emsp-backend/package.json
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-48949
Vulnerable Library - elliptic-6.5.4.tgz
EC cryptography
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.
Publish Date: 2024-10-10
URL: CVE-2024-48949
CVSS 3 Score Details (9.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-48949
Release Date: 2024-10-10
Fix Resolution: elliptic - 6.5.6
CVE-2024-42461
Vulnerable Library - elliptic-6.5.4.tgz
EC cryptography
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.
Publish Date: 2024-08-02
URL: CVE-2024-42461
CVSS 3 Score Details (9.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2024-08-02
Fix Resolution: elliptic - 6.5.7
CVE-2024-52798
Vulnerable Library - path-to-regexp-0.1.7.tgz
Express style path to RegExp utility
Library home page: https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.7.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.
Publish Date: 2024-12-05
URL: CVE-2024-52798
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-rhx6-c78j-4q9w
Release Date: 2024-12-05
Fix Resolution: path-to-regexp - 0.1.12
CVE-2024-45590
Vulnerable Library - body-parser-1.20.0.tgz
Node.js body parsing middleware
Library home page: https://registry.npmjs.org/body-parser/-/body-parser-1.20.0.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.
Publish Date: 2024-09-10
URL: CVE-2024-45590
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-qwcr-r2fm-qrc7
Release Date: 2024-09-10
Fix Resolution: body-parser - 1.20.3
CVE-2024-45296
Vulnerable Library - path-to-regexp-0.1.7.tgz
Express style path to RegExp utility
Library home page: https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.7.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.
Publish Date: 2024-09-09
URL: CVE-2024-45296
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-9wv6-86v2-598j
Release Date: 2024-09-09
Fix Resolution: path-to-regexp - 0.1.10,1.9.0,3.3.0,6.3.0,8.0.0
CVE-2024-21505
Vulnerable Library - web3-utils-1.7.1.tgz
Collection of utility functions used in web3.js.
Library home page: https://registry.npmjs.org/web3-utils/-/web3-utils-1.7.1.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.
An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
Publish Date: 2024-03-25
URL: CVE-2024-21505
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-21505
Release Date: 2024-03-25
Fix Resolution: web3-utils - 4.2.1
CVE-2024-29041
Vulnerable Library - express-4.17.3.tgz
Fast, unopinionated, minimalist web framework
Library home page: https://registry.npmjs.org/express/-/express-4.17.3.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode using
encodeurl
on the contents before passing it to thelocation
header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted isres.location()
but this is also called from withinres.redirect()
. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3.Publish Date: 2024-03-25
URL: CVE-2024-29041
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-rv95-896h-c2vc
Release Date: 2024-03-25
Fix Resolution: express - 4.19.0
CVE-2024-47764
Vulnerable Library - cookie-0.4.2.tgz
HTTP server cookie parsing and serialization
Library home page: https://registry.npmjs.org/cookie/-/cookie-0.4.2.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.
Publish Date: 2024-10-04
URL: CVE-2024-47764
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-pxg6-pf52-xh8x
Release Date: 2024-10-04
Fix Resolution: cookie - 0.7.0
CVE-2024-42460
Vulnerable Library - elliptic-6.5.4.tgz
EC cryptography
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Publish Date: 2024-08-02
URL: CVE-2024-42460
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2024-08-02
Fix Resolution: elliptic - 6.5.7
CVE-2024-42459
Vulnerable Library - elliptic-6.5.4.tgz
EC cryptography
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.4.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.
Publish Date: 2024-08-02
URL: CVE-2024-42459
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2024-08-02
Fix Resolution: elliptic - 6.5.7
CVE-2023-26115
Vulnerable Library - word-wrap-1.2.3.tgz
Wrap words to a specified length.
Library home page: https://registry.npmjs.org/word-wrap/-/word-wrap-1.2.3.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
Publish Date: 2023-06-22
URL: CVE-2023-26115
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-j8xg-fqg3-53r7
Release Date: 2023-06-22
Fix Resolution: word-wrap - 1.2.4
CVE-2024-43800
Vulnerable Library - serve-static-1.14.2.tgz
Serve static files
Library home page: https://registry.npmjs.org/serve-static/-/serve-static-1.14.2.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.
Publish Date: 2024-09-10
URL: CVE-2024-43800
CVSS 3 Score Details (5.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-cm22-4g7w-348p
Release Date: 2024-09-10
Fix Resolution: serve-static - 1.16.0,2.1.0
CVE-2024-43799
Vulnerable Library - send-0.17.2.tgz
Better streaming static file server with Range and conditional-GET support
Library home page: https://registry.npmjs.org/send/-/send-0.17.2.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0.
Publish Date: 2024-09-10
URL: CVE-2024-43799
CVSS 3 Score Details (5.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-m6fv-jmcg-4jfg
Release Date: 2024-09-10
Fix Resolution: send - 0.19.0
CVE-2024-43796
Vulnerable Library - express-4.17.3.tgz
Fast, unopinionated, minimalist web framework
Library home page: https://registry.npmjs.org/express/-/express-4.17.3.tgz
Dependency Hierarchy:
Found in HEAD commit: a9ca696e4063e48a10f252dd7479d512df1895ad
Found in base branch: develop
Vulnerability Details
Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0.
Publish Date: 2024-09-10
URL: CVE-2024-43796
CVSS 3 Score Details (5.0)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-qw6h-vgh9-j6wx
Release Date: 2024-09-10
Fix Resolution: express - 4.20.0,5.0.0
The text was updated successfully, but these errors were encountered: