You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: amplify-cli/packages/amplify-category-interactions/package.json
Path to vulnerable library: amplify-cli/packages/amplify-category-interactions/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json,amplify-cli/packages/amplify-category-function/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json,amplify-cli/packages/amplify-category-api/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json,amplify-cli/packages/amplify-cli/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
mend-bolt-for-githubbot
changed the title
CVE-2018-1107 (High) detected in is-my-json-valid-2.13.1.tgz
CVE-2018-1107 (Medium) detected in is-my-json-valid-2.13.1.tgz
Apr 7, 2021
CVE-2018-1107 - Medium Severity Vulnerability
A JSONSchema validator that uses code generation to be extremely fast
Library home page: https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.13.1.tgz
Path to dependency file: amplify-cli/packages/amplify-category-interactions/package.json
Path to vulnerable library: amplify-cli/packages/amplify-category-interactions/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json,amplify-cli/packages/amplify-category-function/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json,amplify-cli/packages/amplify-category-api/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json,amplify-cli/packages/amplify-cli/node_modules/npm/node_modules/request/node_modules/har-validator/node_modules/is-my-json-valid/package.json
Dependency Hierarchy:
Found in HEAD commit: 3833df1564b738a3f729dc6bff2583e4890060cc
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
Publish Date: 2021-03-30
URL: CVE-2018-1107
Base Score Metrics:
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1546357
Release Date: 2020-07-21
Fix Resolution: 1.4.2,2.17.2
The text was updated successfully, but these errors were encountered: