You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.
mend-for-github-combot
changed the title
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 9.8)
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 5.3)
Mar 16, 2024
mend-for-github-combot
changed the title
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 5.3)
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 9.8)
Mar 17, 2024
mend-for-github-combot
changed the title
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 9.8)
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 5.3)
Mar 18, 2024
ℹ️ This issue was automatically closed by Mend because it is a duplicate of an existing issue: #945
mend-for-github-combot
changed the title
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 5.3)
ip-1.1.5.tgz: 1 vulnerabilities (highest severity is: 5.3) - autoclosed
May 19, 2024
Vulnerable Library - ip-1.1.5.tgz
[![](https://badge.fury.io/js/ip.svg)](https://www.npmjs.com/package/ip)
Library home page: https://registry.npmjs.org/ip/-/ip-1.1.5.tgz
Found in HEAD commit: 7f99c836ea749efa113ef0ccdc60bfe4cbbfa856
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-42282
Vulnerable Library - ip-1.1.5.tgz
[![](https://badge.fury.io/js/ip.svg)](https://www.npmjs.com/package/ip)
Library home page: https://registry.npmjs.org/ip/-/ip-1.1.5.tgz
Dependency Hierarchy:
Found in HEAD commit: 7f99c836ea749efa113ef0ccdc60bfe4cbbfa856
Found in base branch: unstable
Vulnerability Details
The ip package before 1.1.9 for Node.js might allow SSRF because some IP addresses (such as 0x7f.1) are improperly categorized as globally routable via isPublic.
Publish Date: 2024-02-08
URL: CVE-2023-42282
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.1%
CVSS 4 Score Details (5.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-78xj-cgh5-2h22
Release Date: 2024-02-08
Fix Resolution: 1.1.9
The text was updated successfully, but these errors were encountered: