174 lines
5.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-26256",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-12-08T22:15:17.540",
"lastModified": "2021-10-07T17:08:09.510",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Fast-csv is an npm package for parsing and formatting CSVs or any other delimited value file in node. In fast-cvs before version 4.3.6 there is a possible ReDoS vulnerability (Regular Expression Denial of Service) when using ignoreEmpty option when parsing. This has been patched in `v4.3.6` You will only be affected by this if you use the `ignoreEmpty` parsing option. If you do use this option it is recommended that you upgrade to the latest version `v4.3.6` This vulnerability was found using a CodeQL query which identified `EMPTY_ROW_REGEXP` regular expression as vulnerable."
},
{
"lang": "es",
"value": "Fast-csv es un paquete npm para analizar y formatear CSV o cualquier otro archivo de valor delimitado en node. En fast-cvs anterior a versi\u00f3n 4.3.6, se presenta una posible vulnerabilidad ReDoS (Denegaci\u00f3n de servicio de expresi\u00f3n regular) cuando se usa la opci\u00f3n ignoreEmpty al analizar. Esto ha sido parcheado en versi\u00f3n \"v4.3.6\" Solo se ver\u00e1 afectado por esto si utiliza la opci\u00f3n de an\u00e1lisis \"ignoreEmpty\". Si usa esta opci\u00f3n, se recomienda que actualice a la \u00faltima versi\u00f3n \"v4.3.6\". Esta vulnerabilidad se encontr\u00f3 usando una consulta CodeQL que identific\u00f3 la expresi\u00f3n regular \"EMPTY_ROW_REGEXP\" como vulnerable"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:c2fo:fast-csv:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "4.3.6",
"matchCriteriaId": "38FF4853-5265-411D-91CC-D0137CBE216E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/C2FO/fast-csv/commit/4bbd39f26a8cd7382151ab4f5fb102234b2f829e",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/C2FO/fast-csv/issues/540",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/C2FO/fast-csv/security/advisories/GHSA-8cv5-p934-3hwp",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lgtm.com/query/8609731774537641779/",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.npmjs.com/package/@fast-csv/parse",
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://www.npmjs.com/package/fast-csv",
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
]
}
]
}