-
Notifications
You must be signed in to change notification settings - Fork 2
CVE-2017-1000048 (High) detected in qs-0.6.6.tgz #82
Description
CVE-2017-1000048 - High Severity Vulnerability
Vulnerable Library - qs-0.6.6.tgz
querystring parser
Library home page: https://registry.npmjs.org/qs/-/qs-0.6.6.tgz
Path to dependency file: curratelo/package.json
Path to vulnerable library: curratelo/node_modules/feedparser/node_modules/qs/package.json
Dependency Hierarchy:
- rsj-0.0.4.tgz (Root Library)
- feedparser-0.15.10.tgz
- request-2.21.0.tgz
- ❌ qs-0.6.6.tgz (Vulnerable Library)
- request-2.21.0.tgz
- feedparser-0.15.10.tgz
Found in HEAD commit: 3ae90cc0fdc0775addab724debe5389064e80b29
Vulnerability Details
the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.
Publish Date: 2017-07-17
URL: CVE-2017-1000048
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048
Release Date: 2017-07-17
Fix Resolution: qs - 6.0.4,6.1.2,6.2.3,6.3.2
Step up your Open Source Security Game with WhiteSource here