This repository has been archived by the owner on May 1, 2021. It is now read-only.
CVE-2021-29469 (Medium) detected in redis-3.0.2.tgz #14
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2021-29469 - Medium Severity Vulnerability
Vulnerable Library - redis-3.0.2.tgz
A high performance Redis client.
Library home page: https://registry.npmjs.org/redis/-/redis-3.0.2.tgz
Path to dependency file: dogehouse-site/package.json
Path to vulnerable library: dogehouse-site/node_modules/redis/package.json
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. The issue is patched in version 3.1.1.
Publish Date: 2021-04-23
URL: CVE-2021-29469
CVSS 3 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-35q2-47q7-3pc3
Release Date: 2021-04-23
Fix Resolution: redis - 3.1.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: