Skip to content

aws-cdk-lib-2.100.0.tgz: 2 vulnerabilities (highest severity is: 3.9) - autoclosed #5779

@mend-for-github-com

Description

@mend-for-github-com
Vulnerable Library - aws-cdk-lib-2.100.0.tgz

Library home page: https://registry.npmjs.org/aws-cdk-lib/-/aws-cdk-lib-2.100.0.tgz

Path to dependency file: /testing/aws-testing-cdk/package.json

Path to vulnerable library: /testing/aws-testing-cdk/node_modules/aws-cdk-lib/package.json

Found in HEAD commit: eed21ce11a1f5e4c1671583fc8d6f340caaa6b71

Vulnerabilities

Vulnerability Severity CVSS Dependency Type Fixed in (aws-cdk-lib version) Remediation Possible**
CVE-2025-23206 Low 3.9 aws-cdk-lib-2.100.0.tgz Direct aws-cdk - 2.177.0
CVE-2025-5889 Low 3.1 brace-expansion-1.1.11.tgz Transitive 2.101.0

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-23206

Vulnerable Library - aws-cdk-lib-2.100.0.tgz

Library home page: https://registry.npmjs.org/aws-cdk-lib/-/aws-cdk-lib-2.100.0.tgz

Path to dependency file: /testing/aws-testing-cdk/package.json

Path to vulnerable library: /testing/aws-testing-cdk/node_modules/aws-cdk-lib/package.json

Dependency Hierarchy:

  • aws-cdk-lib-2.100.0.tgz (Vulnerable Library)

Found in HEAD commit: eed21ce11a1f5e4c1671583fc8d6f340caaa6b71

Found in base branch: main

Vulnerability Details

The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current "tls.connect" method will always set "rejectUnauthorized: false" which is a potential security concern. CDK should follow the best practice and set "rejectUnauthorized: true". However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in "cdk.context.json" or "cdk.json". There are no known workarounds for this vulnerability.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2025-01-17

URL: CVE-2025-23206

CVSS 3 Score Details (3.9)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-v4mq-x674-ff73

Release Date: 2025-01-17

Fix Resolution: aws-cdk - 2.177.0

⛑️ Automatic Remediation will be attempted for this issue.

CVE-2025-5889

Vulnerable Library - brace-expansion-1.1.11.tgz

Brace expansion as known from sh/bash

Library home page: https://registry.npmjs.org/brace-expansion/-/brace-expansion-1.1.11.tgz

Path to dependency file: /testing/aws-testing-cdk/package.json

Path to vulnerable library: /testing/aws-testing-cdk/node_modules/aws-cdk-lib/node_modules/brace-expansion/package.json,/release/staging-resources-cdk/node_modules/aws-cdk-lib/node_modules/brace-expansion/package.json

Dependency Hierarchy:

  • aws-cdk-lib-2.100.0.tgz (Root Library)
    • minimatch-3.1.2.tgz
      • brace-expansion-1.1.11.tgz (Vulnerable Library)

Found in HEAD commit: eed21ce11a1f5e4c1671583fc8d6f340caaa6b71

Found in base branch: main

Vulnerability Details

A vulnerability was found in juliangruber brace-expansion up to 1.1.11. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended to apply a patch to fix this issue.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: 2025-06-09

URL: CVE-2025-5889

CVSS 3 Score Details (3.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-v6h2-p8h4-qcjw

Release Date: 2025-06-09

Fix Resolution (brace-expansion): 1.1.12

Direct dependency fix Resolution (aws-cdk-lib): 2.101.0

⛑️ Automatic Remediation will be attempted for this issue.


⛑️Automatic Remediation will be attempted for this issue.

Metadata

Metadata

Assignees

Type

No type

Projects

Status

Done

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions