Skip to content

WS-2020-0091 (High) detected in multiple libraries #172

Open
@mend-bolt-for-github

Description

@mend-bolt-for-github

WS-2020-0091 - High Severity Vulnerability

Vulnerable Libraries - http-proxy-1.17.0.tgz, http-proxy-1.15.2.tgz, http-proxy-1.16.2.tgz

http-proxy-1.17.0.tgz

HTTP proxying for the masses

Library home page: https://registry.npmjs.org/http-proxy/-/http-proxy-1.17.0.tgz

Path to dependency file: angular/integration/bazel/src/yarn.lock

Path to vulnerable library: angular/integration/bazel/src/yarn.lock,angular/integration/cli-hello-world-ivy-compat/yarn.lock,angular/integration/cli-hello-world-ivy-minimal/yarn.lock,angular/yarn.lock

Dependency Hierarchy:

  • karma-3.1.4.tgz (Root Library)
    • http-proxy-1.17.0.tgz (Vulnerable Library)
http-proxy-1.15.2.tgz

HTTP proxying for the masses

Library home page: https://registry.npmjs.org/http-proxy/-/http-proxy-1.15.2.tgz

Path to dependency file: angular/integration/hello_world__systemjs_umd/yarn.lock

Path to vulnerable library: angular/integration/hello_world__systemjs_umd/yarn.lock,angular/integration/injectable-def/yarn.lock,angular/integration/i18n/yarn.lock,angular/integration/ng_elements/yarn.lock,angular/integration/dynamic-compiler/yarn.lock,angular/integration/ngcc/yarn.lock,angular/integration/hello_world__closure/yarn.lock

Dependency Hierarchy:

  • lite-server-2.2.2.tgz (Root Library)
    • browser-sync-2.23.5.tgz
      • http-proxy-1.15.2.tgz (Vulnerable Library)
http-proxy-1.16.2.tgz

HTTP proxying for the masses

Library home page: https://registry.npmjs.org/http-proxy/-/http-proxy-1.16.2.tgz

Path to dependency file: angular/yarn.lock

Path to vulnerable library: angular/yarn.lock,angular/integration/cli-hello-world/yarn.lock,angular/aio/yarn.lock

Dependency Hierarchy:

  • http-server-0.9.0.tgz (Root Library)
    • http-proxy-1.16.2.tgz (Vulnerable Library)

Found in HEAD commit: cf1f1c0344fa01406f61ff7437a72714be39b47e

Vulnerability Details

Versions of http-proxy prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an ERR_HTTP_HEADERS_SENT unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the proxyReq.setHeader function.

Publish Date: 2020-05-14

URL: WS-2020-0091

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.npmjs.com/advisories/1486

Release Date: 2020-05-26

Fix Resolution: http-proxy - 1.18.1

Metadata

Metadata

Assignees

No one assigned

    Labels

    security vulnerabilitySecurity vulnerability detected by WhiteSource

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions