You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2018-0111
Vulnerable Library - base64-url-1.3.3.tgz
Base64 encode, decode, escape and unescape for URL applications
cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
A vulnerability classified as problematic has been found in debug-js debug up to 3.0.x. This affects the function useColors of the file src/node.js. The manipulation of the argument str leads to inefficient regular expression complexity. Upgrading to version 3.1.0 is able to address this issue. The identifier of the patch is c38a0166c266a679c8de012d4eaccec3f944e685. It is recommended to upgrade the affected component. The identifier VDB-217665 was assigned to this vulnerability.
mend-for-github-combot
changed the title
express-session-1.15.0.tgz: 2 vulnerabilities (highest severity is: 9.1)
express-session-1.15.0.tgz: 1 vulnerabilities (highest severity is: 9.1)
Sep 8, 2022
mend-for-github-combot
changed the title
express-session-1.15.0.tgz: 1 vulnerabilities (highest severity is: 9.1)
express-session-1.15.0.tgz: 2 vulnerabilities (highest severity is: 9.1)
Dec 23, 2022
mend-for-github-combot
changed the title
express-session-1.15.0.tgz: 2 vulnerabilities (highest severity is: 9.1)
express-session-1.15.0.tgz: 3 vulnerabilities (highest severity is: 9.1)
Mar 8, 2023
mend-for-github-combot
changed the title
express-session-1.15.0.tgz: 3 vulnerabilities (highest severity is: 9.1)
express-session-1.15.0.tgz: 4 vulnerabilities (highest severity is: 9.1)
Oct 12, 2024
Vulnerable Library - express-session-1.15.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/cookie/package.json
Found in HEAD commit: 5a4685b4ea28454c003cffa10474bd29bb2d9a88
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
WS-2018-0111
Vulnerable Library - base64-url-1.3.3.tgz
Base64 encode, decode, escape and unescape for URL applications
Library home page: https://registry.npmjs.org/base64-url/-/base64-url-1.3.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/base64-url/package.json
Dependency Hierarchy:
Found in HEAD commit: 5a4685b4ea28454c003cffa10474bd29bb2d9a88
Found in base branch: main
Vulnerability Details
Versions of base64-url before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input.
Publish Date: 2018-05-16
URL: WS-2018-0111
CVSS 3 Score Details (9.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nodesecurity.io/advisories/660
Release Date: 2018-01-27
Fix Resolution (base64-url): 2.0.0
Direct dependency fix Resolution (express-session): 1.15.1
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2024-47764
Vulnerable Library - cookie-0.3.1.tgz
HTTP server cookie parsing and serialization
Library home page: https://registry.npmjs.org/cookie/-/cookie-0.3.1.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/cookie/package.json
Dependency Hierarchy:
Found in HEAD commit: 5a4685b4ea28454c003cffa10474bd29bb2d9a88
Found in base branch: main
Vulnerability Details
cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.
Publish Date: 2024-10-04
URL: CVE-2024-47764
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-pxg6-pf52-xh8x
Release Date: 2024-10-04
Fix Resolution: cookie - 0.7.0
CVE-2017-16137
Vulnerable Library - debug-2.6.0.tgz
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-2.6.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/express-session/node_modules/debug/package.json,/node_modules/connect-redis/node_modules/debug/package.json
Dependency Hierarchy:
Found in HEAD commit: 5a4685b4ea28454c003cffa10474bd29bb2d9a88
Found in base branch: main
Vulnerability Details
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
Publish Date: 2018-06-07
URL: CVE-2017-16137
CVSS 3 Score Details (3.7)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-gxpj-cx7g-858c
Release Date: 2018-06-07
Fix Resolution (debug): 2.6.9
Direct dependency fix Resolution (express-session): 1.15.6
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2017-20165
Vulnerable Library - debug-2.6.0.tgz
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-2.6.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/express-session/node_modules/debug/package.json,/node_modules/connect-redis/node_modules/debug/package.json
Dependency Hierarchy:
Found in HEAD commit: 5a4685b4ea28454c003cffa10474bd29bb2d9a88
Found in base branch: main
Vulnerability Details
A vulnerability classified as problematic has been found in debug-js debug up to 3.0.x. This affects the function useColors of the file src/node.js. The manipulation of the argument str leads to inefficient regular expression complexity. Upgrading to version 3.1.0 is able to address this issue. The identifier of the patch is c38a0166c266a679c8de012d4eaccec3f944e685. It is recommended to upgrade the affected component. The identifier VDB-217665 was assigned to this vulnerability.
Publish Date: 2023-01-09
URL: CVE-2017-20165
CVSS 3 Score Details (3.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-9vvw-cc9w-f27h
Release Date: 2023-01-09
Fix Resolution (debug): 2.6.9
Direct dependency fix Resolution (express-session): 1.15.6
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: