chore(findings): secure-ee/pawnshop
Summary
secure-ee/pawnshop has 20 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=secure-ee/pawnshop&tag=2.9&branch=master
id | source | severity | package | impact | workaround |
---|---|---|---|---|---|
GHSA-9wv6-86v2-598j | Anchore CVE | High | path-to-regexp-0.1.7 | ||
GHSA-qwcr-r2fm-qrc7 | Anchore CVE | High | body-parser-1.20.2 | ||
GHSA-9wv6-86v2-598j | Anchore CVE | High | path-to-regexp-3.2.0 | ||
GHSA-9wv6-86v2-598j | Anchore CVE | High | path-to-regexp-0.2.5 | ||
GHSA-qw6h-vgh9-j6wx | Anchore CVE | Medium | express-4.19.2 | ||
GHSA-m6fv-jmcg-4jfg | Anchore CVE | Medium | send-0.18.0 | ||
GHSA-cm22-4g7w-348p | Anchore CVE | Medium | serve-static-1.15.0 | ||
GHSA-pxg6-pf52-xh8x | Anchore CVE | Low | cookie-0.6.0 | ||
GHSA-434g-2637-qmqr | Anchore CVE | Low | elliptic-6.5.4 | ||
GHSA-fc9h-whq2-v747 | Anchore CVE | Low | elliptic-6.5.4 | ||
CVE-2024-45296 | Twistlock CVE | High | path-to-regexp-0.2.5 | Its unlikely you are using routes that match the required characteristics, overwhelming majority of user paths stick with foobar or foo.bar. | Provide a manual regular expression to the second parameter that does not match the prefixed text. |
CVE-2024-45296 | Twistlock CVE | High | path-to-regexp-0.1.7 | Its unlikely you are using routes that match the required characteristics, overwhelming majority of user paths stick with foobar or foo.bar. | Provide a manual regular expression to the second parameter that does not match the prefixed text. |
CVE-2024-45296 | Twistlock CVE | High | path-to-regexp-3.2.0 | Its unlikely you are using routes that match the required characteristics, overwhelming majority of user paths stick with foobar or foo.bar. | Provide a manual regular expression to the second parameter that does not match the prefixed text. |
CVE-2024-45590 | Twistlock CVE | High | body-parser-1.20.2 | ||
CVE-2024-43800 | Twistlock CVE | Medium | serve-static-1.15.0 | Users who are already validating and sanitizing their inputs as expected are highly unlikely to be impacted. | Validate and sanitize user input before passing it to this method. |
CVE-2024-43799 | Twistlock CVE | Medium | send-0.18.0 | Application owners have always been expected to sanitize and validate their inputs, so using it correctly should result in very low likelihood of impact. | Validate and sanitize user inputs. |
CVE-2024-43796 | Twistlock CVE | Medium | express-4.19.2 | ||
CVE-2024-47764 | Twistlock CVE | Low | cookie-0.6.0 | ||
CVE-2024-48949 | Twistlock CVE | Low | elliptic-6.5.4 | ||
CVE-2024-48948 | Twistlock CVE | Low | elliptic-6.5.4 |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=secure-ee/pawnshop&tag=2.9&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.