-
Notifications
You must be signed in to change notification settings - Fork 3
Description
WS-2017-0421 - High Severity Vulnerability
Vulnerable Libraries - ws-2.3.1.tgz, ws-1.1.5.tgz
ws-2.3.1.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
path: null
Library home page: https://registry.npmjs.org/ws/-/ws-2.3.1.tgz
Dependency Hierarchy:
- react-native-0.55.4.tgz (Root Library)
- react-devtools-core-3.1.0.tgz
- ❌ ws-2.3.1.tgz (Vulnerable Library)
- react-devtools-core-3.1.0.tgz
ws-1.1.5.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
path: null
Library home page: https://registry.npmjs.org/ws/-/ws-1.1.5.tgz
Dependency Hierarchy:
- react-native-0.55.4.tgz (Root Library)
- ❌ ws-1.1.5.tgz (Vulnerable Library)
Vulnerability Details
Affected version of ws (0.2.6--3.3.0) are vulnerable to A specially crafted value of the Sec-WebSocket-Extensions header that used Object.prototype property names as extension or parameter names could be used to make a ws server crash.
Publish Date: 2017-11-08
URL: WS-2017-0421
Suggested Fix
Type: Upgrade version
Origin: https://www.npmjs.com/advisories/550/versions
Release Date: 2019-01-24
Fix Resolution: 3.3.1
Step up your Open Source Security Game with WhiteSource here