You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/http-proxy/package.json
Dependency Hierarchy:
hjs-webpack-8.4.3.tgz (Root Library)
http-proxy-middleware-0.17.4.tgz
❌ http-proxy-1.17.0.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Versions of http-proxy prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an ERR_HTTP_HEADERS_SENT unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the proxyReq.setHeader function.
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/qs/package.json
Dependency Hierarchy:
hjs-webpack-8.4.3.tgz (Root Library)
express-4.16.4.tgz
❌ qs-6.5.2.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: [email protected]" in its release description, is not vulnerable).
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/ansi-html/package.json
Dependency Hierarchy:
hjs-webpack-8.4.3.tgz (Root Library)
webpack-hot-middleware-2.24.3.tgz
❌ ansi-html-0.0.7.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/follow-redirects/package.json
Dependency Hierarchy:
hjs-webpack-8.4.3.tgz (Root Library)
http-proxy-middleware-0.17.4.tgz
http-proxy-1.17.0.tgz
❌ follow-redirects-1.7.0.tgz (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
mend-bolt-for-githubbot
changed the title
hjs-webpack-8.4.3.tgz: 1 vulnerabilities (highest severity is: 7.5)
hjs-webpack-8.4.3.tgz: 2 vulnerabilities (highest severity is: 7.8)
Apr 15, 2022
mend-bolt-for-githubbot
changed the title
hjs-webpack-8.4.3.tgz: 2 vulnerabilities (highest severity is: 7.8)
hjs-webpack-8.4.3.tgz: 1 vulnerabilities (highest severity is: 7.5)
Jan 6, 2023
mend-bolt-for-githubbot
changed the title
hjs-webpack-8.4.3.tgz: 1 vulnerabilities (highest severity is: 7.5)
hjs-webpack-8.4.3.tgz: 3 vulnerabilities (highest severity is: 7.5)
Dec 12, 2023
mend-bolt-for-githubbot
changed the title
hjs-webpack-8.4.3.tgz: 3 vulnerabilities (highest severity is: 7.5)
hjs-webpack-8.4.3.tgz: 6 vulnerabilities (highest severity is: 7.5)
Mar 17, 2024
Vulnerable Library - hjs-webpack-8.4.3.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/http-proxy/package.json
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2020-0091
Vulnerable Library - http-proxy-1.17.0.tgz
HTTP proxying for the masses
Library home page: https://registry.npmjs.org/http-proxy/-/http-proxy-1.17.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/http-proxy/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Versions of http-proxy prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an ERR_HTTP_HEADERS_SENT unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the proxyReq.setHeader function.
Publish Date: 2020-05-14
URL: WS-2020-0091
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1486
Release Date: 2020-05-14
Fix Resolution (http-proxy): 1.18.1
Direct dependency fix Resolution (hjs-webpack): 9.0.0
Step up your Open Source Security Game with Mend here
CVE-2022-24999
Vulnerable Library - qs-6.5.2.tgz
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-6.5.2.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/qs/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[proto]=b&a[proto]&a[length]=100000000. The fix was backported to qs 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, and 6.2.4 (and therefore Express 4.17.3, which has "deps: [email protected]" in its release description, is not vulnerable).
Publish Date: 2022-11-26
URL: CVE-2022-24999
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2022-24999
Release Date: 2022-11-26
Fix Resolution (qs): 6.5.3
Direct dependency fix Resolution (hjs-webpack): 9.0.0
Step up your Open Source Security Game with Mend here
CVE-2021-23424
Vulnerable Library - ansi-html-0.0.7.tgz
An elegant lib that converts the chalked (ANSI) text to HTML.
Library home page: https://registry.npmjs.org/ansi-html/-/ansi-html-0.0.7.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/ansi-html/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
Publish Date: 2021-08-18
URL: CVE-2021-23424
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-23424
Release Date: 2021-08-18
Fix Resolution (ansi-html): 0.0.8
Direct dependency fix Resolution (hjs-webpack): 9.0.0
Step up your Open Source Security Game with Mend here
CVE-2022-0155
Vulnerable Library - follow-redirects-1.7.0.tgz
HTTP and HTTPS modules that follow redirects.
Library home page: https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.7.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/follow-redirects/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
Publish Date: 2022-01-10
URL: CVE-2022-0155
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/
Release Date: 2022-01-10
Fix Resolution (follow-redirects): 1.14.7
Direct dependency fix Resolution (hjs-webpack): 9.0.0
Step up your Open Source Security Game with Mend here
CVE-2023-26159
Vulnerable Library - follow-redirects-1.7.0.tgz
HTTP and HTTPS modules that follow redirects.
Library home page: https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.7.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/follow-redirects/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
Publish Date: 2024-01-02
URL: CVE-2023-26159
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-26159
Release Date: 2024-01-02
Fix Resolution (follow-redirects): 1.15.4
Direct dependency fix Resolution (hjs-webpack): 9.0.0
Step up your Open Source Security Game with Mend here
CVE-2022-0536
Vulnerable Library - follow-redirects-1.7.0.tgz
HTTP and HTTPS modules that follow redirects.
Library home page: https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.7.0.tgz
Path to dependency file: /react-google-map-apis/package.json
Path to vulnerable library: /tmp/git/react-google-map-apis/node_modules/follow-redirects/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Improper Removal of Sensitive Information Before Storage or Transfer in NPM follow-redirects prior to 1.14.8.
Publish Date: 2022-02-09
URL: CVE-2022-0536
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0536
Release Date: 2022-02-09
Fix Resolution (follow-redirects): 1.14.8
Direct dependency fix Resolution (hjs-webpack): 9.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: