samuelteixeiras / caite

See your youtube subscriptions like a boss!

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2014-7191 (Medium) detected in qs-0.5.6.tgz, qs-0.6.5.tgz

mend-bolt-for-github opened this issue · comments

CVE-2014-7191 - Medium Severity Vulnerability

Vulnerable Libraries - qs-0.5.6.tgz, qs-0.6.5.tgz

qs-0.5.6.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.5.6.tgz

Path to dependency file: caite/package.json

Path to vulnerable library: caite/node_modules/tiny-lr/node_modules/qs/package.json

Dependency Hierarchy:

  • grunt-contrib-watch-0.5.3.tgz (Root Library)
    • tiny-lr-0.0.4.tgz
      • qs-0.5.6.tgz (Vulnerable Library)
qs-0.6.5.tgz

querystring parser

Library home page: https://registry.npmjs.org/qs/-/qs-0.6.5.tgz

Path to dependency file: caite/package.json

Path to vulnerable library: caite/node_modules/qs/package.json

Dependency Hierarchy:

  • grunt-contrib-connect-0.5.0.tgz (Root Library)
    • connect-2.7.11.tgz
      • qs-0.6.5.tgz (Vulnerable Library)

Found in HEAD commit: cd9951c688404f842b5b42d372e5ac4d387ff367

Found in base branch: master

Vulnerability Details

The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.

Publish Date: 2014-10-19

URL: CVE-2014-7191

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: N/A
    • Attack Complexity: N/A
    • Privileges Required: N/A
    • User Interaction: N/A
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-7191

Release Date: 2014-10-19

Fix Resolution: 1.0.0


Step up your Open Source Security Game with WhiteSource here