Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13am1qLWgzeGMtaHhwOM4AA8x-
Generation of Error Message Containing Sensitive Information in zsa
Impact
All users are impacted. The zsa application transfers the parse error stack from the server to the client in production build mode. This can potentially reveal sensitive information about the server environment, such as the machine username and directory paths. An attacker could exploit this vulnerability to gain unauthorized access to sensitive server information. This information could be used to plan further attacks or gain a deeper understanding of the server infrastructure.
Patches
Yes, this has been pathed on 0.3.3
Workarounds
No way to fix other than the patch.
Permalink: https://github.com/advisories/GHSA-wjmj-h3xc-hxp8JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13am1qLWgzeGMtaHhwOM4AA8x-
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 24 days ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-wjmj-h3xc-hxp8, CVE-2024-37162
References:
- https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8
- https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a
- https://nvd.nist.gov/vuln/detail/CVE-2024-37162
- https://github.com/advisories/GHSA-wjmj-h3xc-hxp8
Blast Radius: 1.0
Affected Packages
npm:zsa
Dependent packages: 0Dependent repositories: 0
Downloads: 23,590 last month
Affected Version Ranges: < 0.3.3
Fixed in: 0.3.3
All affected versions: 0.0.1, 0.1.0, 0.1.1, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.3.0, 0.3.1, 0.3.2
All unaffected versions: 0.3.3, 0.3.4, 0.3.5, 0.4.0, 0.5.0, 0.5.1, 0.6.0