Skip to content

CVE-2024-43800 (Medium) detected in serve-static-1.13.2.tgz #27

@mend-bolt-for-github

Description

@mend-bolt-for-github

CVE-2024-43800 - Medium Severity Vulnerability

Vulnerable Library - serve-static-1.13.2.tgz

Serve static files

Library home page: https://registry.npmjs.org/serve-static/-/serve-static-1.13.2.tgz

Path to dependency file: /package.json

Path to vulnerable library: /package.json

Dependency Hierarchy:

  • express-4.16.4.tgz (Root Library)
    • serve-static-1.13.2.tgz (Vulnerable Library)

Found in HEAD commit: 9747f642e0c7071927887b37359653c28972ea6a

Found in base branch: main

Vulnerability Details

serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0.

Publish Date: 2024-09-10

URL: CVE-2024-43800

CVSS 3 Score Details (5.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-cm22-4g7w-348p

Release Date: 2024-09-10

Fix Resolution (serve-static): 1.16.0

Direct dependency fix Resolution (express): 4.20.0


Step up your Open Source Security Game with Mend here

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions