Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ipfs-core-0.13.0.tgz: 9 vulnerabilities (highest severity is: 9.8) #4

Open
mend-for-github-com bot opened this issue Jan 29, 2024 · 0 comments
Open
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-for-github-com
Copy link

Vulnerable Library - ipfs-core-0.13.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/node-forge/package.json

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (ipfs-core version) Remediation Possible**
CVE-2023-26136 Critical 9.8 tough-cookie-2.5.0.tgz Transitive 0.14.4-4e93dd5d.0
CVE-2022-23487 High 7.5 libp2p-0.35.8.tgz Transitive 0.14.4-4e93dd5d.0
CVE-2022-24772 High 7.5 node-forge-0.10.0.tgz Transitive 0.13.1-6cb3a87e.0
CVE-2022-24771 High 7.5 node-forge-0.10.0.tgz Transitive 0.13.1-6cb3a87e.0
WS-2022-0008 Medium 6.6 node-forge-0.10.0.tgz Transitive 0.13.1-6cb3a87e.0
CVE-2022-0122 Medium 6.1 node-forge-0.10.0.tgz Transitive 0.13.1-6cb3a87e.0
CVE-2023-28155 Medium 6.1 request-2.88.2.tgz Transitive N/A*
CVE-2023-0842 Medium 5.3 xml2js-0.1.14.tgz Transitive 0.14.4-4e93dd5d.0
CVE-2022-24773 Medium 5.3 node-forge-0.10.0.tgz Transitive 0.13.1-6cb3a87e.0

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2023-26136

Vulnerable Library - tough-cookie-2.5.0.tgz

RFC6265 Cookies and Cookie Jar for node.js

Library home page: https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.5.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/tough-cookie/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • nat-api-0.3.1.tgz
        • request-2.88.2.tgz
          • tough-cookie-2.5.0.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.

Publish Date: 2023-07-01

URL: CVE-2023-26136

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-26136

Release Date: 2023-07-01

Fix Resolution (tough-cookie): 4.1.3

Direct dependency fix Resolution (ipfs-core): 0.14.4-4e93dd5d.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-23487

Vulnerable Library - libp2p-0.35.8.tgz

Library home page: https://registry.npmjs.org/libp2p/-/libp2p-0.35.8.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/libp2p/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

js-libp2p is the official javascript Implementation of libp2p networking stack. Versions older than v0.38.0 of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to update their js-libp2p dependency to v0.38.0 or greater. There are no known workarounds for this vulnerability.

Publish Date: 2022-12-07

URL: CVE-2022-23487

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-f44q-634c-jvwv

Release Date: 2022-12-07

Fix Resolution (libp2p): 0.37.3-4199042

Direct dependency fix Resolution (ipfs-core): 0.14.4-4e93dd5d.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-24772

Vulnerable Library - node-forge-0.10.0.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/node-forge/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • node-forge-0.10.0.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a DigestInfo ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

Publish Date: 2022-03-18

URL: CVE-2022-24772

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24772

Release Date: 2022-03-18

Fix Resolution (node-forge): 1.3.0

Direct dependency fix Resolution (ipfs-core): 0.13.1-6cb3a87e.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-24771

Vulnerable Library - node-forge-0.10.0.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/node-forge/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • node-forge-0.10.0.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

Publish Date: 2022-03-18

URL: CVE-2022-24771

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24771

Release Date: 2022-03-18

Fix Resolution (node-forge): 1.3.0

Direct dependency fix Resolution (ipfs-core): 0.13.1-6cb3a87e.0

⛑️ Automatic Remediation will be attempted for this issue.

WS-2022-0008

Vulnerable Library - node-forge-0.10.0.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/node-forge/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • node-forge-0.10.0.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

The forge.debug API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way.

Publish Date: 2022-01-08

URL: WS-2022-0008

CVSS 3 Score Details (6.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-5rrq-pxf6-6jx5

Release Date: 2022-01-08

Fix Resolution (node-forge): 1.0.0

Direct dependency fix Resolution (ipfs-core): 0.13.1-6cb3a87e.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-0122

Vulnerable Library - node-forge-0.10.0.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/node-forge/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • node-forge-0.10.0.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

forge is vulnerable to URL Redirection to Untrusted Site
Mend Note: Converted from WS-2022-0007, on 2022-11-07.

Publish Date: 2022-01-06

URL: CVE-2022-0122

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-gf8q-jrpm-jvxq

Release Date: 2022-01-06

Fix Resolution (node-forge): 1.0.0

Direct dependency fix Resolution (ipfs-core): 0.13.1-6cb3a87e.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2023-28155

Vulnerable Library - request-2.88.2.tgz

Simplified HTTP request client.

Library home page: https://registry.npmjs.org/request/-/request-2.88.2.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/request/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • nat-api-0.3.1.tgz
        • request-2.88.2.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

The request package through 2.88.2 for Node.js and the @cypress/request package prior to 3.0.0 allow a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP).NOTE: The request package is no longer supported by the maintainer.

Publish Date: 2023-03-16

URL: CVE-2023-28155

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-p8p7-x288-28g6

Release Date: 2023-03-16

Fix Resolution: @cypress/request - 3.0.0

CVE-2023-0842

Vulnerable Library - xml2js-0.1.14.tgz

Simple XML to JavaScript object converter.

Library home page: https://registry.npmjs.org/xml2js/-/xml2js-0.1.14.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/xml2js/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • nat-api-0.3.1.tgz
        • xml2js-0.1.14.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

xml2js version 0.4.23 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the proto property to be edited.

Publish Date: 2023-04-05

URL: CVE-2023-0842

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2023-0842

Release Date: 2023-04-05

Fix Resolution (xml2js): 0.5.0

Direct dependency fix Resolution (ipfs-core): 0.14.4-4e93dd5d.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2022-24773

Vulnerable Library - node-forge-0.10.0.tgz

JavaScript implementations of network transports, cryptography, ciphers, PKI, message digests, and various utilities.

Library home page: https://registry.npmjs.org/node-forge/-/node-forge-0.10.0.tgz

Path to dependency file: /packages/ipfs-daemon/package.json

Path to vulnerable library: /packages/ipfs-daemon/node_modules/node-forge/package.json

Dependency Hierarchy:

  • ipfs-core-0.13.0.tgz (Root Library)
    • libp2p-0.35.8.tgz
      • node-forge-0.10.0.tgz (Vulnerable Library)

Found in HEAD commit: d6987b85b28d538b43966928818601effd8a4737

Found in base branch: develop

Vulnerability Details

Forge (also called node-forge) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check DigestInfo for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in node-forge version 1.3.0. There are currently no known workarounds.

Publish Date: 2022-03-18

URL: CVE-2022-24773

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24773

Release Date: 2022-03-18

Fix Resolution (node-forge): 1.3.0

Direct dependency fix Resolution (ipfs-core): 0.13.1-6cb3a87e.0

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Development

No branches or pull requests

0 participants