classicvalues / Resumes

resume from public, personal project

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2021-29469 (High) detected in redis-2.8.0.tgz - autoclosed

mend-bolt-for-github opened this issue · comments

CVE-2021-29469 - High Severity Vulnerability

Vulnerable Library - redis-2.8.0.tgz

Redis client library

Library home page: https://registry.npmjs.org/redis/-/redis-2.8.0.tgz

Path to dependency file: Resume_1/Application/package.json

Path to vulnerable library: Resume_1/Application/node_modules/redis/package.json

Dependency Hierarchy:

  • sails-1.4.4.tgz (Root Library)
    • machinepack-redis-2.0.6.tgz
      • redis-2.8.0.tgz (Vulnerable Library)

Found in HEAD commit: 737831e53efbc9c9f7e767c1fa90aa5c8c17a205

Found in base branch: master

Vulnerability Details

Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. The issue is patched in version 3.1.1.

Publish Date: 2021-04-23

URL: CVE-2021-29469

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-35q2-47q7-3pc3

Release Date: 2021-04-23

Fix Resolution: redis - 3.1.1


Step up your Open Source Security Game with WhiteSource here

ℹ️ This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #12

ℹ️ This issue was automatically closed by WhiteSource because it is a duplicate of an existing issue: #12