-
Couldn't load subscription status.
- Fork 0
Description
CVE-2021-3377 - Medium Severity Vulnerability
Vulnerable Library - ansi_up-2.0.3.tgz
Convert ansi sequences in strings to colorful HTML
Library home page: https://registry.npmjs.org/ansi_up/-/ansi_up-2.0.3.tgz
Path to dependency file: cloud-pipeline/data-sharing-service/client/package.json
Path to vulnerable library: cloud-pipeline/data-sharing-service/client/node_modules/ansi_up/package.json,cloud-pipeline/client/node_modules/ansi_up/package.json
Dependency Hierarchy:
- ❌ ansi_up-2.0.3.tgz (Vulnerable Library)
Found in HEAD commit: 1db3170e0bd699acd5fec6e3fcebfa68fe86edcf
Found in base branch: develop
Vulnerability Details
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
Publish Date: 2021-03-05
URL: CVE-2021-3377
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://github.com/drudru/ansi_up/releases/tag/v5.0.0
Release Date: 2021-03-05
Fix Resolution: v5.0.0
⛑️ Automatic Remediation is available for this issue