-
Notifications
You must be signed in to change notification settings - Fork 1
Description
π Vulnerable Library - squidex.assets.imagesharp.6.19.0.nupkg
Squidex Internal Libraries
Path to dependency file: /tools/TestSuite/TestSuite.ApiTests/TestSuite.ApiTests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/squidex.assets.imagesharp/6.19.0/squidex.assets.imagesharp.6.19.0.nupkg
Findings
| Finding | Severity | π― CVSS | Exploit Maturity | EPSS | Library | Type | Fixed in | Remediation Available | Reachability |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2017-0248 | π΄ High | 8.7 | Not Defined | 1.1% | system.net.http.4.3.0.nupkg | Transitive | N/A | β | |
| CVE-2018-8292 | π΄ High | 8.7 | Not Defined | 6.5% | system.net.http.4.3.0.nupkg | Transitive | N/A | β | |
| CVE-2019-0820 | π΄ High | 8.7 | Not Defined | 3.2% | system.text.regularexpressions.4.3.0.nupkg | Transitive | N/A | β | |
| CVE-2025-54575 | π Medium | 6.9 | Not Defined | < 1% | sixlabors.imagesharp.3.1.5.nupkg | Transitive | N/A | β |
Details
π΄CVE-2017-0248
Vulnerable Library - system.net.http.4.3.0.nupkg
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /tools/TestSuite/TestSuite.ApiTests/TestSuite.ApiTests.csproj
Path to vulnerable library: /opt/containerbase/tools/dotnet/sdk/NuGetFallbackFolder/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
- squidex.assets.imagesharp.6.19.0.nupkg (Root Library)
- blurhash.imagesharp.3.0.0.nupkg
- blurhash.core.2.0.0.nupkg
- netstandard.library.1.6.1.nupkg
- β system.net.http.4.3.0.nupkg (Vulnerable Library)
- netstandard.library.1.6.1.nupkg
- blurhash.core.2.0.0.nupkg
- blurhash.imagesharp.3.0.0.nupkg
Vulnerability Details
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
Publish Date: May 12, 2017 02:00 PM
URL: CVE-2017-0248
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-ch6p-4jcm-h8vh
Release Date: May 12, 2017 02:00 PM
Fix Resolution : Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,System.Net.WebSockets.Client - 4.0.1,Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,System.Net.Http - 4.1.2,Microsoft.AspNetCore.Mvc.ApiExplorer - 1.1.3,Microsoft.AspNetCore.Mvc - 1.1.3,System.Net.WebSockets.Client - 4.3.1,Microsoft.AspNetCore.Mvc.TagHelpers - 1.1.3,Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,System.Net.Security - 4.0.1,Microsoft.AspNetCore.Mvc - 1.0.4,Microsoft.AspNetCore.Mvc.Localization - 1.0.4,Microsoft.AspNetCore.Mvc.Core - 1.1.3,Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,Microsoft.AspNetCore.Mvc.Abstractions - 1.1.3,Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.1.3,System.Net.Http.WinHttpHandler - 4.0.1,Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,System.Text.Encodings.Web - 4.3.1,System.Text.Encodings.Web - 4.0.1,Microsoft.AspNetCore.Mvc.Localization - 1.1.3,Microsoft.AspNetCore.Mvc.DataAnnotations - 1.1.3,Microsoft.AspNetCore.Mvc.Razor - 1.1.3,Microsoft.AspNetCore.Mvc.Cors - 1.0.4,Microsoft.AspNetCore.Mvc.Razor - 1.0.4,System.Net.Http - 4.3.2,System.Net.Http.WinHttpHandler - 4.3.1,Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.1.3,Microsoft.AspNetCore.Mvc.Core - 1.0.4,Microsoft.AspNetCore.Mvc.Cors - 1.1.3,System.Net.Security - 4.3.1,Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,Microsoft.AspNetCore.Mvc.Razor.Host - 1.1.3,Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,Microsoft.AspNetCore.Mvc.ViewFeatures - 1.1.3,Microsoft.AspNetCore.Mvc.Formatters.Json - 1.1.3
π΄CVE-2018-8292
Vulnerable Library - system.net.http.4.3.0.nupkg
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /tools/TestSuite/TestSuite.ApiTests/TestSuite.ApiTests.csproj
Path to vulnerable library: /opt/containerbase/tools/dotnet/sdk/NuGetFallbackFolder/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
- squidex.assets.imagesharp.6.19.0.nupkg (Root Library)
- blurhash.imagesharp.3.0.0.nupkg
- blurhash.core.2.0.0.nupkg
- netstandard.library.1.6.1.nupkg
- β system.net.http.4.3.0.nupkg (Vulnerable Library)
- netstandard.library.1.6.1.nupkg
- blurhash.core.2.0.0.nupkg
- blurhash.imagesharp.3.0.0.nupkg
Vulnerability Details
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
Publish Date: Oct 10, 2018 01:00 PM
URL: CVE-2018-8292
Threat Assessment
Exploit Maturity:Not Defined
EPSS:6.5%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-7jgj-8wvc-jh57
Release Date: Oct 10, 2018 01:00 PM
Fix Resolution : System.Net.Http - 4.3.4
π΄CVE-2019-0820
Vulnerable Library - system.text.regularexpressions.4.3.0.nupkg
Provides the System.Text.RegularExpressions.Regex class, an implementation of a regular expression e...
Library home page: https://api.nuget.org/packages/system.text.regularexpressions.4.3.0.nupkg
Path to dependency file: /backend/src/Squidex/Squidex.csproj
Path to vulnerable library: /opt/containerbase/tools/dotnet/sdk/NuGetFallbackFolder/system.text.regularexpressions/4.3.0/system.text.regularexpressions.4.3.0.nupkg
Dependency Hierarchy:
-
Squidex.Domain.Apps.Entities.Tests-1.0.0 (Root Library)
- Squidex.Extensions-1.0.0
- windowsazure.storage.9.3.3.nupkg
- netstandard.library.1.6.1.nupkg
- system.xml.xdocument.4.3.0.nupkg
- system.xml.readerwriter.4.3.0.nupkg
- β system.text.regularexpressions.4.3.0.nupkg (Vulnerable Library)
- system.xml.readerwriter.4.3.0.nupkg
- system.xml.xdocument.4.3.0.nupkg
- netstandard.library.1.6.1.nupkg
- windowsazure.storage.9.3.3.nupkg
- Squidex.Extensions-1.0.0
-
windowsazure.storage.9.3.3.nupkg (Root Library)
- netstandard.library.1.6.1.nupkg
- system.xml.xdocument.4.3.0.nupkg
- system.xml.readerwriter.4.3.0.nupkg
- β system.text.regularexpressions.4.3.0.nupkg (Vulnerable Library)
- system.xml.readerwriter.4.3.0.nupkg
- system.xml.xdocument.4.3.0.nupkg
- netstandard.library.1.6.1.nupkg
-
Squidex.Extensions-1.0.0 (Root Library)
- windowsazure.storage.9.3.3.nupkg
- netstandard.library.1.6.1.nupkg
- system.xml.xdocument.4.3.0.nupkg
- system.xml.readerwriter.4.3.0.nupkg
- β system.text.regularexpressions.4.3.0.nupkg (Vulnerable Library)
- system.xml.readerwriter.4.3.0.nupkg
- system.xml.xdocument.4.3.0.nupkg
- netstandard.library.1.6.1.nupkg
- windowsazure.storage.9.3.3.nupkg
-
squidex.assets.imagesharp.6.19.0.nupkg (Root Library)
- blurhash.imagesharp.3.0.0.nupkg
- blurhash.core.2.0.0.nupkg
- netstandard.library.1.6.1.nupkg
- system.xml.xdocument.4.3.0.nupkg
- system.xml.readerwriter.4.3.0.nupkg
- β system.text.regularexpressions.4.3.0.nupkg (Vulnerable Library)
- system.xml.readerwriter.4.3.0.nupkg
- system.xml.xdocument.4.3.0.nupkg
- netstandard.library.1.6.1.nupkg
- blurhash.core.2.0.0.nupkg
- blurhash.imagesharp.3.0.0.nupkg
-
microsoft.azure.cognitiveservices.vision.computervision.7.0.1.nupkg (Root Library)
- microsoft.rest.clientruntime.azure.3.3.18.nupkg
- netstandard.library.1.6.1.nupkg
- system.xml.xdocument.4.3.0.nupkg
- system.xml.readerwriter.4.3.0.nupkg
- β system.text.regularexpressions.4.3.0.nupkg (Vulnerable Library)
- system.xml.readerwriter.4.3.0.nupkg
- system.xml.xdocument.4.3.0.nupkg
- netstandard.library.1.6.1.nupkg
- microsoft.rest.clientruntime.azure.3.3.18.nupkg
Vulnerability Details
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981. After conducting further research, Mend has determined that CVE-2019-0820 only affects environments with versions 4.3.0 and 4.3.1 only on netcore50 environment of system.text.regularexpressions.nupkg.
Publish Date: May 16, 2019 06:17 PM
URL: CVE-2019-0820
Threat Assessment
Exploit Maturity:Not Defined
EPSS:3.2%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-cmhx-cq75-c4mj
Release Date: May 16, 2019 06:17 PM
Fix Resolution : System.Text.RegularExpressions - 4.3.1
π CVE-2025-54575
Vulnerable Library - sixlabors.imagesharp.3.1.5.nupkg
A new, fully featured, fully managed, cross-platform, 2D graphics API for .NET
Library home page: https://api.nuget.org/packages/sixlabors.imagesharp.3.1.5.nupkg
Path to dependency file: /tools/TestSuite/TestSuite.Shared/TestSuite.Shared.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/sixlabors.imagesharp/3.1.5/sixlabors.imagesharp.3.1.5.nupkg
Dependency Hierarchy:
-
squidex.assets.6.19.0.nupkg (Root Library)
- β sixlabors.imagesharp.3.1.5.nupkg (Vulnerable Library)
-
squidex.assets.imagesharp.6.22.0.nupkg (Root Library)
- β sixlabors.imagesharp.3.1.5.nupkg (Vulnerable Library)
-
squidex.assets.imagesharp.6.19.0.nupkg (Root Library)
- squidex.assets.6.19.0.nupkg
- β sixlabors.imagesharp.3.1.5.nupkg (Vulnerable Library)
- squidex.assets.6.19.0.nupkg
-
TestSuite.Shared-1.0.0 (Root Library)
- squidex.assets.6.19.0.nupkg
- β sixlabors.imagesharp.3.1.5.nupkg (Vulnerable Library)
- squidex.assets.6.19.0.nupkg
Vulnerability Details
ImageSharp is a 2D graphics library. In versions below 2.1.11 and 3.0.0 through 3.1.10, a specially crafted GIF file containing a malformed comment extension block (with a missing block terminator) can cause the ImageSharp GIF decoder to enter an infinite loop while attempting to skip the block. This leads to a denial of service. Applications processing untrusted GIF input should upgrade to a patched version. This issue is fixed in versions 2.1.11 and 3.1.11.
Publish Date: Jul 30, 2025 07:55 PM
URL: CVE-2025-54575
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 6.9
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :