-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix(parseable): add support for critical vulns and more resolves on u…
…pdate/install action (#28) Fixes: https://npm.community/t/1419
- Loading branch information
Showing
4 changed files
with
241 additions
and
18 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,127 @@ | ||
{ | ||
"actions": [ | ||
{ | ||
"action": "install", | ||
"module": "mocha-jenkins-reporter", | ||
"target": "0.3.12", | ||
"isMajor": false, | ||
"resolves": [ | ||
{ | ||
"id": 534, | ||
"path": "mocha-jenkins-reporter>mocha>debug", | ||
"dev": true, | ||
"optional": false, | ||
"bundled": false | ||
}, | ||
{ | ||
"id": 146, | ||
"path": "mocha-jenkins-reporter>mocha>growl", | ||
"dev": true, | ||
"optional": false, | ||
"bundled": false | ||
} | ||
] | ||
} | ||
], | ||
"advisories": { | ||
"146": { | ||
"findings": [ | ||
{ | ||
"version": "1.9.2", | ||
"paths": [ | ||
"mocha-jenkins-reporter>mocha>growl" | ||
], | ||
"dev": true, | ||
"optional": false, | ||
"bundled": false | ||
} | ||
], | ||
"id": 146, | ||
"created": "2016-09-06T12:49:40.000Z", | ||
"updated": "2018-03-02T21:07:28.071Z", | ||
"deleted": null, | ||
"title": "Command Injection", | ||
"found_by": { | ||
"name": "Cristian-Alexandru Staicu" | ||
}, | ||
"reported_by": { | ||
"name": "Cristian-Alexandru Staicu" | ||
}, | ||
"module_name": "growl", | ||
"cves": [ | ||
"CVE-2017-16042" | ||
], | ||
"vulnerable_versions": "<1.10.2", | ||
"patched_versions": ">=1.10.2", | ||
"overview": "Affected versions of `growl` do not properly sanitize input prior to passing it into a shell command, allowing for arbitrary command execution.", | ||
"recommendation": "Update to version 1.10.2 or later.", | ||
"references": "[Issue #60](https://github.com/tj/node-growl/issues/60)\n[PR #61](https://github.com/tj/node-growl/pull/61)", | ||
"access": "public", | ||
"severity": "critical", | ||
"cwe": "CWE-94", | ||
"metadata": { | ||
"module_type": "CLI.Library", | ||
"exploitability": 5, | ||
"affected_components": "" | ||
}, | ||
"url": "https://nodesecurity.io/advisories/146" | ||
}, | ||
"534": { | ||
"findings": [ | ||
{ | ||
"version": "2.6.8", | ||
"paths": [ | ||
"mocha-jenkins-reporter>mocha>debug" | ||
], | ||
"dev": true, | ||
"optional": false, | ||
"bundled": false | ||
} | ||
], | ||
"id": 534, | ||
"created": "2017-09-25T18:55:55.956Z", | ||
"updated": "2018-05-16T19:37:43.686Z", | ||
"deleted": null, | ||
"title": "Regular Expression Denial of Service", | ||
"found_by": { | ||
"name": "Cristian-Alexandru Staicu" | ||
}, | ||
"reported_by": { | ||
"name": "Cristian-Alexandru Staicu" | ||
}, | ||
"module_name": "debug", | ||
"cves": [ | ||
"CVE-2017-16137" | ||
], | ||
"vulnerable_versions": "<= 2.6.8 || >= 3.0.0 <= 3.0.1", | ||
"patched_versions": ">= 2.6.9 < 3.0.0 || >= 3.1.0", | ||
"overview": "Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. \n\nAs it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.", | ||
"recommendation": "Version 2.x.x: Update to version 2.6.9 or later.\nVersion 3.x.x: Update to version 3.1.0 or later.\n", | ||
"references": "- [Issue #501](https://github.com/visionmedia/debug/issues/501)\n- [PR #504](https://github.com/visionmedia/debug/pull/504)", | ||
"access": "public", | ||
"severity": "low", | ||
"cwe": "CWE-400", | ||
"metadata": { | ||
"module_type": "", | ||
"exploitability": 5, | ||
"affected_components": "" | ||
}, | ||
"url": "https://nodesecurity.io/advisories/534" | ||
} | ||
}, | ||
"muted": [], | ||
"metadata": { | ||
"vulnerabilities": { | ||
"info": 0, | ||
"low": 1, | ||
"moderate": 0, | ||
"high": 0, | ||
"critical": 1 | ||
}, | ||
"dependencies": 0, | ||
"devDependencies": 43, | ||
"optionalDependencies": 0, | ||
"totalDependencies": 43 | ||
}, | ||
"runId": "ab9f276f-15b6-4034-a7a2-f0af6d4420f3" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,78 @@ | ||
{ | ||
"actions": [ | ||
{ | ||
"action": "install", | ||
"module": "mocha-jenkins-reporter", | ||
"target": "0.3.12", | ||
"isMajor": false, | ||
"resolves": [ | ||
{ | ||
"id": 146, | ||
"path": "mocha-jenkins-reporter>mocha>growl", | ||
"dev": true, | ||
"optional": false, | ||
"bundled": false | ||
} | ||
] | ||
} | ||
], | ||
"advisories": { | ||
"146": { | ||
"findings": [ | ||
{ | ||
"version": "1.9.2", | ||
"paths": [ | ||
"mocha-jenkins-reporter>mocha>growl" | ||
], | ||
"dev": true, | ||
"optional": false, | ||
"bundled": false | ||
} | ||
], | ||
"id": 146, | ||
"created": "2016-09-06T12:49:40.000Z", | ||
"updated": "2018-03-02T21:07:28.071Z", | ||
"deleted": null, | ||
"title": "Command Injection", | ||
"found_by": { | ||
"name": "Cristian-Alexandru Staicu" | ||
}, | ||
"reported_by": { | ||
"name": "Cristian-Alexandru Staicu" | ||
}, | ||
"module_name": "growl", | ||
"cves": [ | ||
"CVE-2017-16042" | ||
], | ||
"vulnerable_versions": "<1.10.2", | ||
"patched_versions": ">=1.10.2", | ||
"overview": "Affected versions of `growl` do not properly sanitize input prior to passing it into a shell command, allowing for arbitrary command execution.", | ||
"recommendation": "Update to version 1.10.2 or later.", | ||
"references": "[Issue #60](https://github.com/tj/node-growl/issues/60)\n[PR #61](https://github.com/tj/node-growl/pull/61)", | ||
"access": "public", | ||
"severity": "critical", | ||
"cwe": "CWE-94", | ||
"metadata": { | ||
"module_type": "CLI.Library", | ||
"exploitability": 5, | ||
"affected_components": "" | ||
}, | ||
"url": "https://nodesecurity.io/advisories/146" | ||
} | ||
}, | ||
"muted": [], | ||
"metadata": { | ||
"vulnerabilities": { | ||
"info": 0, | ||
"low": 1, | ||
"moderate": 0, | ||
"high": 0, | ||
"critical": 1 | ||
}, | ||
"dependencies": 0, | ||
"devDependencies": 43, | ||
"optionalDependencies": 0, | ||
"totalDependencies": 43 | ||
}, | ||
"runId": "ab9f276f-15b6-4034-a7a2-f0af6d4420f3" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters