morgan-1.7.0.tgz: 2 vulnerabilities (highest severity is: 9.8) #48
Description
Vulnerable Library - morgan-1.7.0.tgz
HTTP request logger middleware for node.js
Library home page: https://registry.npmjs.org/morgan/-/morgan-1.7.0.tgz
Vulnerabilities
CVE | Severity | Dependency | Type | Fixed in (morgan version) | Remediation Available | |
---|---|---|---|---|---|---|
CVE-2019-5413 | 9.8 | morgan-1.7.0.tgz | Direct | 1.9.1 | ❌ | |
CVE-2017-16137 | 5.3 | debug-2.2.0.tgz | Transitive | 1.9.0 | ❌ |
Details
CVE-2019-5413
Vulnerable Library - morgan-1.7.0.tgz
HTTP request logger middleware for node.js
Library home page: https://registry.npmjs.org/morgan/-/morgan-1.7.0.tgz
Dependency Hierarchy:
- ❌ morgan-1.7.0.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
An attacker can use the format parameter to inject arbitrary commands in the npm package morgan < 1.9.1.
Publish Date: 2019-03-21
URL: CVE-2019-5413
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://hackerone.com/reports/390881
Release Date: 2019-10-09
Fix Resolution: 1.9.1
CVE-2017-16137
Vulnerable Library - debug-2.2.0.tgz
small debugging utility
Library home page: https://registry.npmjs.org/debug/-/debug-2.2.0.tgz
Dependency Hierarchy:
- morgan-1.7.0.tgz (Root Library)
- ❌ debug-2.2.0.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.
Publish Date: 2018-06-07
URL: CVE-2017-16137
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16137
Release Date: 2018-06-07
Fix Resolution (debug): 2.6.9
Direct dependency fix Resolution (morgan): 1.9.0