GHSA-vjvw-wcmw-pr26 – parsel
Package
Manager: npm
Name: parsel
Vulnerable Version: >=0.0.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: N/A pctlN/A
Details
Insufficient Entropy in parsel All versions of `parsel` use an insecure key derivation function. The package runs keys of arbitrary lengths through one round of SHA256 hashing for key stretching. This allows for the use of keys of insufficient entropy with inappropriate key stretching. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
Metadata
Created: 2020-09-04T17:37:08Z
Modified: 2020-08-31T19:00:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-vjvw-wcmw-pr26/GHSA-vjvw-wcmw-pr26.json
CWE IDs: ["CWE-331"]
Alternative ID: N/A
Finding: F034
Auto approve: 1