scriptex/github-pages-vuepress

CVE-2022-0691 (Medium) detected in url-parse-1.5.7.tgz #127

whitesource-bolt-for-github[bot] posted onGitHub

CVE-2022-0691 - Medium Severity Vulnerability

<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png&#39; width=19 height=20> Vulnerable Library - <b>url-parse-1.5.7.tgz</b></p></summary>

<p>Small footprint URL parser that works seamlessly across Node.js and browser environments</p> <p>Library home page: <a href="https://registry.npmjs.org/url-parse/-/url-parse-1.5.7.tgz">https://registry.npmjs.org/url-parse/-/url-parse-1.5.7.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/url-parse/package.json</p> <p>

Dependency Hierarchy:

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

<p>Publish Date: 2022-02-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0691>CVE-2022-0691</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png&#39; width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p>

Base Score Metrics:

<p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0691</a></p> <p>Release Date: 2022-02-21</p> <p>Fix Resolution: url-parse - 1.5.9</p>

</p> </details> <p></p>


Step up your Open Source Security Game with WhiteSource here


Fund this Issue

$0.00
Funded

Pull requests