-
Notifications
You must be signed in to change notification settings - Fork 9
Description
Vulnerable Library - socket.io-4.0.0.js
node.js realtime framework server
Library home page: https://cdnjs.cloudflare.com/ajax/libs/socket.io/4.0.0/socket.io.js
Path to dependency file: /odm/user_interface/templates/dashboard.html
Path to vulnerable library: /odm/user_interface/templates/dashboard.html
Found in HEAD commit: a2ed13ef7f5dce613f19af695433a78d5b7ea082
Vulnerabilities
Vulnerability | Severity | Dependency | Type | Fixed in (socket.io version) | Remediation Possible** | |
---|---|---|---|---|---|---|
CVE-2024-38355 | 7.3 | socket.io-4.0.0.js | Direct | socket.io - 2.5.1,4.6.2 | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-38355
Vulnerable Library - socket.io-4.0.0.js
node.js realtime framework server
Library home page: https://cdnjs.cloudflare.com/ajax/libs/socket.io/4.0.0/socket.io.js
Path to dependency file: /odm/user_interface/templates/dashboard.html
Path to vulnerable library: /odm/user_interface/templates/dashboard.html
Dependency Hierarchy:
- ❌ socket.io-4.0.0.js (Vulnerable Library)
Found in HEAD commit: a2ed13ef7f5dce613f19af695433a78d5b7ea082
Found in base branch: main
Vulnerability Details
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit 15af22fc22
which has been included in socket.io@4.6.2
(released in May 2023). The fix was backported in the 2.x branch as well with commit d30630ba10
. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2024-06-19
URL: CVE-2024-38355
CVSS 3 Score Details (7.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-25hc-qcg6-38wj
Release Date: 2024-06-19
Fix Resolution: socket.io - 2.5.1,4.6.2
Step up your Open Source Security Game with Mend here