-
Notifications
You must be signed in to change notification settings - Fork 585
Expand file tree
/
Copy pathGHSA-86wf-436m-h424.json
More file actions
65 lines (65 loc) · 1.79 KB
/
GHSA-86wf-436m-h424.json
File metadata and controls
65 lines (65 loc) · 1.79 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
{
"schema_version": "1.4.0",
"id": "GHSA-86wf-436m-h424",
"modified": "2023-02-01T05:05:10Z",
"published": "2022-01-06T20:30:13Z",
"aliases": [
"CVE-2019-10196"
],
"summary": "Resource Exhaustion Denial of Service in http-proxy-agent ",
"details": "A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "http-proxy-agent"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0.1.0"
},
{
"fixed": "2.1.0"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10196"
},
{
"type": "WEB",
"url": "https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567245"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/607"
}
],
"database_specific": {
"cwe_ids": [
"CWE-665"
],
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-03-22T22:28:09Z",
"nvd_published_at": "2021-03-19T20:15:00Z"
}
}