Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

web3-4.9.0.tgz: 1 vulnerabilities (highest severity is: 8.7) #27

Open
mend-for-jackfan.us.kg bot opened this issue Jun 18, 2024 · 5 comments
Open
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend Stale

Comments

@mend-for-jackfan.us.kg
Copy link
Contributor

mend-for-jackfan.us.kg bot commented Jun 18, 2024

Vulnerable Library - web3-4.9.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/web3-providers-ws/node_modules/ws/package.json

Found in HEAD commit: 141277bbe1dbdc1d667de53b0177a226b25277eb

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (web3 version) Remediation Possible**
CVE-2024-37890 High 8.7 ws-8.17.0.tgz Transitive 4.10.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2024-37890

Vulnerable Library - ws-8.17.0.tgz

Library home page: https://registry.npmjs.org/ws/-/ws-8.17.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/web3-providers-ws/node_modules/ws/package.json

Dependency Hierarchy:

  • web3-4.9.0.tgz (Root Library)
    • web3-providers-ws-4.0.7.tgz
      • ws-8.17.0.tgz (Vulnerable Library)

Found in HEAD commit: 141277bbe1dbdc1d667de53b0177a226b25277eb

Found in base branch: master

Vulnerability Details

ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in [email protected] (e55e510) and backported to [email protected] (22c2876), [email protected] (eeb76d3), and [email protected] (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.

Publish Date: 2024-06-17

URL: CVE-2024-37890

CVSS 4 Score Details (8.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: N/A
  • Impact Metrics:
    • Confidentiality Impact: N/A
    • Integrity Impact: N/A
    • Availability Impact: N/A

For more information on CVSS4 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-3h5v-q93c-6h6q

Release Date: 2024-06-17

Fix Resolution (ws): 8.17.1

Direct dependency fix Resolution (web3): 4.10.0

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Jun 18, 2024
@mend-for-jackfan.us.kg mend-for-jackfan.us.kg bot changed the title web3-4.9.0.tgz: 1 vulnerabilities (highest severity is: 7.5) web3-4.9.0.tgz: 1 vulnerabilities (highest severity is: 8.7) Jun 27, 2024
Copy link

This issue has been automatically marked as stale because it has not had recent activity. 📆 It will be closed automatically in one week if no further activity occurs.

@github-actions github-actions bot added Stale and removed Stale labels Jul 12, 2024
Copy link

This issue has been automatically marked as stale because it has not had recent activity. 📆 It will be closed automatically in one week if no further activity occurs.

@github-actions github-actions bot added the Stale label Jul 29, 2024
Copy link

github-actions bot commented Aug 6, 2024

This issue was closed because it has been stalled for 7 days with no activity.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Aug 6, 2024
Copy link
Contributor Author

ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.

@github-actions github-actions bot removed the Stale label Jan 20, 2025
Copy link

github-actions bot commented Feb 4, 2025

This issue has been automatically marked as stale because it has not had recent activity. 📆 It will be closed automatically in one week if no further activity occurs.

@github-actions github-actions bot added the Stale label Feb 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend Stale
Projects
None yet
Development

No branches or pull requests

0 participants