This repository has been archived by the owner on Jan 8, 2021. It is now read-only.
CVE-2020-7693 (Medium) detected in sockjs-0.3.19.tgz #181
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2020-7693 - Medium Severity Vulnerability
SockJS-node is a server counterpart of SockJS-client a JavaScript library that provides a WebSocket-like object in the browser. SockJS gives you a coherent, cross-browser, Javascript API which creates a low latency, full duplex, cross-domain communication
Library home page: https://registry.npmjs.org/sockjs/-/sockjs-0.3.19.tgz
Path to dependency file: recursos.osweekends.com/client/package.json
Path to vulnerable library: recursos.osweekends.com/client/node_modules/sockjs/package.json
Dependency Hierarchy:
Found in HEAD commit: c83955b286970e6cbd3d350e89d20e99ccb6eacc
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
Publish Date: 2020-07-09
URL: CVE-2020-7693
Base Score Metrics:
Type: Upgrade version
Origin: sockjs/sockjs-node#265
Release Date: 2020-07-09
Fix Resolution: sockjs - 0.3.20
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: