-
Notifications
You must be signed in to change notification settings - Fork 0
libxmljs-1.0.11.tgz: 1 vulnerabilities (highest severity is: 8.1) reachable #42
Description
Vulnerable Library - libxmljs-1.0.11.tgz
Library home page: https://registry.npmjs.org/libxmljs/-/libxmljs-1.0.11.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/libxmljs/package.json
Found in HEAD commit: 46f9017bf07d9afe8f4c8706e6bb2bdfc9524486
Vulnerabilities
| Vulnerability | Severity | Dependency | Type | Fixed in (libxmljs version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|
| CVE-2024-34392 | 8.1 | libxmljs-1.0.11.tgz | Direct | N/A | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-34392
Vulnerable Library - libxmljs-1.0.11.tgz
Library home page: https://registry.npmjs.org/libxmljs/-/libxmljs-1.0.11.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/libxmljs/package.json
Dependency Hierarchy:
- ❌ libxmljs-1.0.11.tgz (Vulnerable Library)
Found in HEAD commit: 46f9017bf07d9afe8f4c8706e6bb2bdfc9524486
Found in base branch: main
Reachability Analysis
This vulnerability is potentially reachable
juice-shop-17.0.0/routes/fileUpload.ts (Application)
-> libxmljs-1.0.11/dist/index.js (Extension)
-> libxmljs-1.0.11/dist/lib/index.js (Extension)
-> libxmljs-1.0.11/dist/lib/document.js (Extension)
-> ❌ libxmljs-1.0.11/dist/lib/bindings/functions.js (Vulnerable Component)
Vulnerability Details
libxmljs is vulnerable to a type confusion vulnerability when parsing a specially crafted XML while invoking the namespaces() function (which invokes _wrap__xmlNode_nsDef_get()) on a grand-child of a node that refers to an entity. This vulnerability can lead to denial of service and remote code execution.
Publish Date: 2024-05-02
URL: CVE-2024-34392
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High