This repository has been archived by the owner on Nov 21, 2022. It is now read-only.
WS-2020-0097 (High) detected in papaparse-5.1.1.tgz #29
Labels
security vulnerability
Security vulnerability detected by WhiteSource
WS-2020-0097 - High Severity Vulnerability
Vulnerable Library - papaparse-5.1.1.tgz
Fast and powerful CSV parser for the browser that supports web workers and streaming large files. Converts CSV to JSON and JSON to CSV.
Library home page: https://registry.npmjs.org/papaparse/-/papaparse-5.1.1.tgz
Path to dependency file: /makeData/package.json
Path to vulnerable library: /makeData/node_modules/papaparse/package.json
Dependency Hierarchy:
Found in HEAD commit: 10db1e5b1547ae8e8931a71b3e558e5e67785116
Found in base branch: master
Vulnerability Details
papaparse before 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The parse function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
Publish Date: 2020-05-19
URL: WS-2020-0097
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/1515
Release Date: 2020-05-19
Fix Resolution: 5.2.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: