Insecure Component

ID

insecure_component

Severity

info

Kind

Security Misconfiguration

CWE

N/A

Description

Based on passive analysis of the response, insecure component {0} {1} appears to be in use. The detector identifies client-side libraries, frameworks, and components with known vulnerabilities by analyzing JavaScript includes, version strings, and characteristic code patterns. The highest noted CVSS rating for this product version is {2}. In total, {3} vulnerabilities were noted. Some Linux distributions such as Red Hat employ the practice of retaining old version numbers when security fixes are "backported". These cases are noted as "False Positives", but should be manually verified.

Deprecated: 2020-02-07 Replaced by the Retire rule which is actively maintained.

Rationale

Vulnerable components with publicly disclosed security flaws provide attackers with ready-made exploit code and detailed attack vectors. Once a vulnerable library version is identified, attackers can leverage existing exploits from public databases to compromise the application without developing custom attacks. The widespread use of common libraries means exploits are well-tested and reliable, making this a high-value target for automated scanning and exploitation.

Remediation

Update the identified component to the latest patched version that addresses the noted vulnerabilities. Establish a dependency management process that includes regular vulnerability scanning of client-side libraries using tools like npm audit, Retire.js, or OWASP Dependency-Check. Implement subresource integrity (SRI) for third-party scripts and consider using a Content Security Policy to limit the impact of compromised components. Monitor security advisories for all used libraries and maintain an inventory of frontend dependencies.

References

  • No references available.