samuelteixeiras / caite

See your youtube subscriptions like a boss!

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

WS-2019-0032 (Medium) detected in js-yaml-2.0.5.tgz

mend-bolt-for-github opened this issue · comments

WS-2019-0032 - Medium Severity Vulnerability

Vulnerable Library - js-yaml-2.0.5.tgz

YAML 1.2 parser and serializer

Library home page: https://registry.npmjs.org/js-yaml/-/js-yaml-2.0.5.tgz

Path to dependency file: caite/package.json

Path to vulnerable library: caite/node_modules/js-yaml/package.json

Dependency Hierarchy:

  • grunt-0.4.5.tgz (Root Library)
    • js-yaml-2.0.5.tgz (Vulnerable Library)

Found in HEAD commit: cd9951c688404f842b5b42d372e5ac4d387ff367

Found in base branch: master

Vulnerability Details

Versions js-yaml prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.

Publish Date: 2019-03-20

URL: WS-2019-0032

CVSS 2 Score Details (5.0)

Base Score Metrics not available

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/788/versions

Release Date: 2019-03-20

Fix Resolution: js-yaml - 3.13.0


Step up your Open Source Security Game with WhiteSource here