-
Notifications
You must be signed in to change notification settings - Fork 903
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-44907 (Low) detected in qs-6.10.3.tgz, qs-6.5.2.tgz #1375
Labels
cve
Security vulnerabilities detected by Dependabot or Mend
low severity
Low severity CVE
Mend: dependency security vulnerability
Security vulnerability detected by Mend
v2.0.0
Comments
mend-for-github-com
bot
added
the
Mend: dependency security vulnerability
Security vulnerability detected by Mend
label
Mar 23, 2022
tmarkley
added
cve
Security vulnerabilities detected by Dependabot or Mend
low severity
Low severity CVE
labels
Mar 23, 2022
|
|
tmarkley
pushed a commit
to tmarkley/OpenSearch-Dashboards
that referenced
this issue
Mar 24, 2022
* [CHANGELOG](https://github.com/ljharb/qs/blob/v6.10.3/CHANGELOG.md) * The upstream library with a dependency on ~6.5.2 is `node-sass`, but that will not be addressed until sass/node-sass#3193 is included in a release. Resolves opensearch-project#1375 Signed-off-by: Tommy Markley <markleyt@amazon.com>
7 tasks
tmarkley
pushed a commit
that referenced
this issue
Mar 24, 2022
* [CHANGELOG](https://github.com/ljharb/qs/blob/v6.10.3/CHANGELOG.md) * The upstream library with a dependency on ~6.5.2 is `node-sass`, but that will not be addressed until sass/node-sass#3193 is included in a release. Resolves #1375 Signed-off-by: Tommy Markley <markleyt@amazon.com>
8 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
cve
Security vulnerabilities detected by Dependabot or Mend
low severity
Low severity CVE
Mend: dependency security vulnerability
Security vulnerability detected by Mend
v2.0.0
CVE-2021-44907 - Low Severity Vulnerability
Vulnerable Libraries - qs-6.10.3.tgz, qs-6.5.2.tgz
qs-6.10.3.tgz
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-6.10.3.tgz
Dependency Hierarchy:
qs-6.5.2.tgz
A querystring parser that supports nesting and arrays, with a depth limit
Library home page: https://registry.npmjs.org/qs/-/qs-6.5.2.tgz
Dependency Hierarchy:
Found in HEAD commit: 6b66b115cbd108473c249589a334a847710b49ef
Found in base branch: main
Vulnerability Details
A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.
Publish Date: 2022-03-17
URL: CVE-2021-44907
CVSS 3 Score Details (3.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907
Release Date: 2022-03-17
Fix Resolution (qs): 6.8.1
Direct dependency fix Resolution (re2): 1.16.0
The text was updated successfully, but these errors were encountered: