-
Notifications
You must be signed in to change notification settings - Fork 3
CVE-2018-20843 (High) detected in expat-expat-2.2.1 #18
Description
CVE-2018-20843 - High Severity Vulnerability
Vulnerable Library - expatexpat-2.2.1
Fast XML parser library in C
Library home page: https://sourceforge.net/projects/expat/
Found in HEAD commit: 0b8ca0156130fe8d67f2fdd42af9d2f264587034
Library Source Files (17)
* The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/examples/outline.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmltok.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/siphash.h
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/expat_external.h
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/xmlwf.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmlparse.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/unixfilemap.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/examples/elements.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/readfilemap.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/win32filemap.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmlrole.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/winconfig.h
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/filemap.h
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/xmlfile.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/codepage.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmltok_impl.c
- /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/expat.h
Vulnerability Details
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
Publish Date: 2019-06-24
URL: CVE-2018-20843
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843
Release Date: 2019-06-24
Fix Resolution: 2.2.7
Step up your Open Source Security Game with WhiteSource here