ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
npm
GHSA-7r8m-45gc-m2c8
Downloads Resources over HTTP in mongodb-instance
Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`. ## Recommendation Update to version 0.0.3 or later.
{'CVE-2016-10572'}
2021-01-08T19:14:34Z
2019-02-18T23:52:14Z
HIGH
null
{'CWE-311'}
{'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'}
null
{'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'}
{'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'}
npm
GHSA-vpf5-82c8-9v36
Prototype Pollution in algoliasearch-helper
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.
{'CVE-2021-23433'}
2021-11-24T19:00:33Z
2021-11-23T21:15:35Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://github.com/algolia/algoliasearch-helper-js'}
null
{'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'}
{'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'}
npm
GHSA-vm5j-vqr6-v7v8
OS Command Injection in pixl-class
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
{'CVE-2020-7640'}
2021-05-25T20:40:19Z
2021-12-10T20:04:56Z
HIGH
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
null
{'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
{'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
npm
GHSA-q42p-pg8m-cqh6
Prototype Pollution in handlebars
Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. ## Recommendation For handlebars 4.1.x upgrade to 4.1.2 or later. For handlebars 4.0.x upgrade to 4.0.14 or later.
null
2021-08-04T20:54:05Z
2019-06-05T14:07:48Z
HIGH
null
{'CWE-471'}
{'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://www.npmjs.com/advisories/755', 'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'}
null
{'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'}
{'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'}
npm
GHSA-jmqm-f2gx-4fjv
Sensitive information exposure through logs in npm-registry-fetch
Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
null
2021-09-22T19:00:07Z
2020-07-07T18:59:10Z
MODERATE
null
{'CWE-352'}
{'https://github.com/npm/npm-registry-fetch', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432'}
null
{'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}
{'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}
npm
GHSA-w3w8-37jv-2c58
Cross-Site Scripting in mustache
Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted. ### Example Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 2.2.1 or later. Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.
{'CVE-2015-8862'}
2021-09-20T22:34:08Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'http://www.securityfocus.com/bid/96436', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/janl/mustache.js', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', 'https://nodesecurity.io/advisories/62', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.npmjs.com/advisories/62'}
null
{'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}
{'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}
npm
GHSA-8p9r-f949-699g
Path Traversal in browserless-chrome
This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
{'CVE-2020-7758'}
2021-04-20T22:41:52Z
2021-05-10T18:46:48Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758', 'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable'}
null
{'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'}
{'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'}
npm
GHSA-6c8f-qphg-qjgp
Validation Bypass in kind-of
Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation. ## Recommendation Upgrade to versions 6.0.3 or later.
{'CVE-2019-20149'}
2021-08-23T15:03:55Z
2020-03-31T15:59:54Z
HIGH
null
{'CWE-668'}
{'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://www.npmjs.com/advisories/1490'}
null
{'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'}
{'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'}
npm
GHSA-4m8h-h59m-m34j
Prototype Pollution in bmoor
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
{'CVE-2021-23558'}
2022-02-07T21:21:00Z
2022-02-01T00:50:09Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://github.com/b-heilman/bmoor/', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558'}
null
{'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'}
{'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'}
npm
GHSA-wmx6-vxcf-c3gr
Validation Bypass in slp-validate
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus. ## Recommendation Upgrade to version 1.0.1 or later.
{'CVE-2019-16761'}
2021-01-08T20:11:31Z
2019-11-15T23:10:19Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'}
null
{'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'}
{'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'}
npm
GHSA-77jf-fjjf-xcww
Invalid Curve Attack in openpgp
Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key. ## Recommendation Upgrade to version 4.3.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9155'}
2021-07-27T21:15:18Z
2019-08-23T21:42:22Z
MODERATE
null
{'CWE-327'}
{'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'}
null
{'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'}
{'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'}
npm
GHSA-v8v8-6859-qxm4
Arbitrary shell command execution in logkitty
Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1.
{'CVE-2020-8149'}
2020-06-04T19:33:24Z
2020-06-05T14:47:02Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf', 'https://github.com/zamotany/logkitty/pull/18', 'https://hackerone.com/reports/825729'}
null
{'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}
{'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}
npm
GHSA-74cr-77xc-8g6r
Prototype Pollution in @apollo/gateway
Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. ## Recommendation Upgrade to version 0.6.2 or later.
null
2021-08-16T15:28:22Z
2019-06-13T20:37:39Z
HIGH
null
{'CWE-400', 'CWE-1321'}
{'https://github.com/apollographql/apollo-server/pull/2779', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://www.npmjs.com/advisories/917'}
null
{'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'}
{'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'}
npm
GHSA-x2mc-8fgj-3wmr
Improper Input Validation in tar-fs
A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.
{'CVE-2018-20835'}
2021-08-03T21:27:51Z
2019-05-01T18:37:18Z
HIGH
null
{'CWE-20'}
{'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2', 'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'}
null
{'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}
{'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}
npm
GHSA-w46j-8hm6-h8mm
XSS in apexcharts
The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields.
{'CVE-2021-23327'}
2021-02-10T18:18:38Z
2021-02-11T20:47:34Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327'}
null
{'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'}
{'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'}
npm
GHSA-gqgv-6jq5-jjj9
Prototype Pollution Protection Bypass in qs
Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances. ## Recommendation Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.
{'CVE-2017-1000048'}
2021-08-25T21:03:56Z
2020-04-30T17:16:47Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://github.com/ljharb/qs/issues/200', 'https://snyk.io/vuln/npm:qs:20170213', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://www.npmjs.com/advisories/1469'}
null
{'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'}
{'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'}
npm
GHSA-v39p-96qg-c8rf
Prototype Pollution in object-path
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
{'CVE-2021-23434'}
2021-08-30T18:16:08Z
2021-09-01T18:37:11Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb', 'https://github.com/mariocasciaro/object-path'}
null
{'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'}
{'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'}
npm
GHSA-qv2v-m59f-v5fw
Insecure randomness in socket.io
Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization. ## Recommendation Update to v0.9.7 or later.
{'CVE-2017-16031'}
2021-09-16T21:04:32Z
2018-11-07T00:29:37Z
HIGH
null
{'CWE-330'}
{'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://github.com/socketio/socket.io/pull/857', 'https://nodesecurity.io/advisories/321', 'https://github.com/socketio/socket.io', 'https://www.npmjs.com/advisories/321', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/socketio/socket.io/issues/856', 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}
null
{'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}
{'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}
npm
GHSA-vc9j-fhvv-8vrf
Remote Code Execution in scratch-vm
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented. NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.
{'CVE-2020-14000'}
2021-09-22T21:24:07Z
2020-07-27T19:55:52Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://github.com/LLK/scratch-vm/pull/2476', 'https://github.com/LLK/scratch-vm'}
null
{'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}
{'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}
npm
GHSA-fj59-f6c3-3vw4
Command Injection in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()` ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)
{'CVE-2020-26300'}
2021-09-10T14:54:48Z
2020-10-27T20:40:00Z
MODERATE
null
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4'}
null
{'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'}
{'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'}
npm
GHSA-m8fw-534v-xm85
Cross-Site Scripting (XSS) in cloudcmd
Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable. ## Recommendation Update to version 9.1.6 or later.
null
2020-08-31T18:31:00Z
2019-06-04T15:43:29Z
HIGH
null
{'CWE-79'}
{'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38', 'https://www.npmjs.com/advisories/642', 'https://hackerone.com/reports/341044)', 'https://hackerone.com/reports/341044'}
null
{'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'}
{'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'}
npm
GHSA-pw54-mh39-w3hc
Regular expression denial of service in npm-user-validate
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
{'CVE-2020-7754'}
2021-04-20T17:21:44Z
2021-05-10T19:08:15Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'}
null
{'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'}
{'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'}
npm
GHSA-h97g-4mx7-5p2p
Open Redirect in apostrophe
Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end. ## Recommendation Update to version 2.92.0 or later.
null
2021-09-28T21:18:57Z
2020-09-03T17:11:36Z
MODERATE
null
{'CWE-601'}
{'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7', 'https://github.com/apostrophecms/apostrophe', 'https://www.npmjs.com/advisories/1029', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089'}
null
{'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'}
{'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'}
npm
GHSA-rwv8-jvff-jq28
Path Traversal in public
Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user. ## Recommendation Update to version 0.1.3 or later.
{'CVE-2018-3731'}
2020-08-31T18:28:14Z
2018-07-18T21:20:30Z
HIGH
null
{'CWE-22'}
{'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918', 'https://www.npmjs.com/advisories/571', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731'}
null
{'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'}
{'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'}
npm
GHSA-p493-635q-r6gr
Remote code execution via the `pretty` option.
### Impact If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. ### Patches Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter. ### Workarounds If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade. ### References Original report: https://github.com/pugjs/pug/issues/3312 ### For more information If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md)
{'CVE-2021-21353'}
2021-03-03T01:49:22Z
2021-03-03T02:03:52Z
HIGH
null
{'CWE-74'}
{'https://www.npmjs.com/package/pug-code-gen', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353', 'https://github.com/pugjs/pug/issues/3312', 'https://github.com/pugjs/pug/pull/3314'}
null
{'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'}
{'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'}
npm
GHSA-7jh9-6cpf-h4m7
XSS in hello.js
This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).
{'CVE-2020-7741'}
2021-01-13T19:06:37Z
2021-01-13T19:07:01Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546'}
null
{'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'}
{'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'}
npm
GHSA-4j46-mp85-mv8c
Path traversal in rollup-plugin-serve
Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation.
{'CVE-2020-7684'}
2021-05-18T01:51:52Z
2021-05-18T01:52:24Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2', 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969', 'https://vuldb.com/?id.158745', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7684'}
null
{'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'}
{'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'}
npm
GHSA-3pxp-6963-46r9
Command Injection in pdfinfojs
Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor. ## Recommendation Update to version 0.4.1 or later.
{'CVE-2018-3746'}
2020-08-31T18:31:03Z
2018-06-07T19:43:00Z
HIGH
null
{'CWE-77'}
{'https://hackerone.com/reports/330957', 'https://www.npmjs.com/advisories/643', 'https://github.com/advisories/GHSA-3pxp-6963-46r9', 'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746'}
null
{'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'}
{'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'}
npm
GHSA-rch9-xh7r-mqgw
Cross-Site Scripting in simple-server
Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server. ## Recommendation Update to version 1.1.0 or later.
{'CVE-2018-3717'}
2020-08-31T18:29:12Z
2018-07-26T15:08:05Z
HIGH
null
{'CWE-79'}
{'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717', 'https://hackerone.com/reports/309394', 'https://hackerone.com/reports/309641', 'https://www.npmjs.com/advisories/595', 'https://www.npmjs.com/advisories/584', 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448', 'https://github.com/advisories/GHSA-rch9-xh7r-mqgw'}
null
{'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'}
{'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'}
npm
GHSA-jfcc-rm7f-xgf8
Cross-Site Scripting in mavon-editor
All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-29T18:37:46Z
2020-09-03T20:36:35Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://github.com/hinesboy/mavonEditor', 'https://www.npmjs.com/advisories/1169', 'https://www.npmjs.com/package/mavon-editor', 'https://github.com/hinesboy/mavonEditor/pull/548', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108', 'https://github.com/hinesboy/mavonEditor/issues/472'}
null
{'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'}
{'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'}
npm
GHSA-3fjq-93xj-3f3f
Cross-Site Scripting in serialize-to-js
Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 3.0.1 or later.
{'CVE-2019-16772'}
2021-01-08T20:02:20Z
2019-12-06T23:20:26Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://www.npmjs.com/advisories/1429', 'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}
null
{'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}
{'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}
npm
GHSA-wm77-q74p-5763
Path Traversal in superstatic
Affected of `superstatic` are vulnerable to path traversal when used on Windows. Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0). ## Recommendation Update to version 5.0.2 or later.
null
2021-08-09T22:21:02Z
2018-07-27T17:06:03Z
HIGH
null
{'CWE-177'}
{'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://www.npmjs.com/advisories/652', 'https://github.com/firebase/superstatic/pull/255', 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}
null
{'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}
{'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}
npm
GHSA-753c-phhg-cj29
Improper Neutralization of Special Elements used in a Command
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.
{'CVE-2021-23352'}
2021-03-12T21:10:53Z
2021-03-12T23:01:49Z
HIGH
null
{'CWE-77', 'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}
null
{'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}
{'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}
npm
GHSA-f522-ffg8-j8r6
Regular Expression Denial of Service in is-my-json-valid
Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. ## Recommendation Update to version 1.4.1, 2.17.2 or later.
{'CVE-2016-2537'}
2021-09-09T21:38:37Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/76', 'https://www.npmjs.com/advisories/572', 'https://nodesecurity.io/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://hackerone.com/reports/317548', 'https://github.com/mafintosh/is-my-json-valid', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://github.com/mafintosh/is-my-json-valid/pull/159'}
null
{'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b'}
{'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}
npm
GHSA-pch5-whg9-qr2r
netmask npm package vulnerable to octal input data
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
{'CVE-2021-29418'}
2021-06-09T23:10:53Z
2021-03-29T21:32:05Z
MODERATE
null
{'CWE-20'}
{'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://www.npmjs.com/package/netmask', 'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://sick.codes/sick-2021-011', 'https://vuln.ryotak.me/advisories/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418', 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'}
null
{'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'}
{'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'}
npm
GHSA-h73q-5wmj-q8pj
Cross site scripting in datatables.net
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
{'CVE-2021-23445'}
2021-10-13T17:26:00Z
2021-09-29T17:11:28Z
MODERATE
null
{'CWE-79'}
{'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371', 'https://cdn.datatables.net/1.11.3/', 'https://github.com/DataTables/Dist-DataTables', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544'}
null
{'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'}
{'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'}
npm
GHSA-qqxp-xp9v-vvx6
Moderate severity vulnerability that affects jquery-ui
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
{'CVE-2012-6662'}
2021-09-16T20:04:38Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'http://bugs.jqueryui.com/ticket/8859', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'http://www.securityfocus.com/bid/71107', 'http://seclists.org/oss-sec/2014/q4/613', 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://github.com/jquery/jquery/issues/2432', 'http://seclists.org/oss-sec/2014/q4/616', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697', 'http://bugs.jqueryui.com/ticket/8861', 'https://github.com/jquery/jquery', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}
null
{'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'}
{'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'}
npm
GHSA-g452-6rfc-vrvx
Prototype Pollution in open-graph
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
{'CVE-2021-23419'}
2021-08-30T21:26:46Z
2021-09-01T18:31:53Z
MODERATE
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747', 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348', 'https://github.com/samholmes/node-open-graph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419'}
null
{'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'}
{'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'}
npm
GHSA-hhqj-cfjx-vj25
Cross site scripting in reveal.js
The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on victim's browser window hosting reveal.js
{'CVE-2022-0776'}
2022-03-10T16:00:14Z
2022-03-02T00:00:20Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hakimel/reveal.js', 'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'}
null
{'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'}
{'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'}
npm
GHSA-c35v-qwqg-87jc
Timing Attack in express-basic-auth
Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-08-04T20:58:12Z
2019-06-06T15:32:32Z
LOW
null
{'CWE-208'}
{'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345', 'https://www.npmjs.com/advisories/827', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/LionC/express-basic-auth/pull/20'}
null
{'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'}
{'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'}
npm
GHSA-6c3f-p5wp-34mh
OS Command Injection in async-git
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
{'CVE-2021-3190'}
2022-05-03T02:56:05Z
2021-01-29T18:14:00Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a', 'https://github.com/omrilotan/async-git', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git/pull/14'}
null
{'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'}
{'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'}
npm
GHSA-wx69-rvg3-x7fc
XSS via prototype pollution in NodeBB
### Impact A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43787'}
2021-12-01T15:07:01Z
2021-11-30T22:21:01Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc', 'https://github.com/NodeBB/NodeBB'}
null
{'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'}
{'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'}
npm
GHSA-84p7-fh9c-6g8h
Prototype Pollution in mixme
### Impact When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content. ### Patches The problem was patch with a more agressive discovery of secured properties to filter out.
null
2021-09-16T21:30:18Z
2021-09-20T19:52:24Z
HIGH
null
{'CWE-1321'}
{'https://github.com/adaltas/node-mixme/issues/1', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme', 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4'}
null
{'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'}
{'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'}
npm
GHSA-94xh-2fmc-xf5j
command injection vulnerability
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite() ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
{'CVE-2020-7752'}
2021-10-08T21:15:35Z
2020-10-27T20:30:20Z
HIGH
null
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j', 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js'}
null
{'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'}
{'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'}
npm
GHSA-rjf2-j2r6-q8gr
Prototype Pollution in vm2
This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.
{'CVE-2021-23449'}
2021-10-19T14:18:05Z
2021-10-19T15:28:45Z
CRITICAL
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23449', 'https://github.com/patriksimek/vm2', 'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886', 'https://security.netapp.com/advisory/ntap-20211029-0010/'}
null
{'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'}
{'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'}
npm
GHSA-m52x-29pq-w3vv
Cross-Site Scripting in pannellum
Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser. ## Recommendation Upgrade to version 2.5.6 or later.
{'CVE-2019-16763'}
2021-01-08T18:31:10Z
2019-11-22T18:18:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763', 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://www.npmjs.com/advisories/1418'}
null
{'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'}
{'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'}
npm
GHSA-vx3p-948g-6vhq
Regular Expression Denial of Service (ReDoS)
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
{'CVE-2021-27290'}
2021-10-21T17:38:11Z
2021-03-19T21:24:36Z
HIGH
null
{'CWE-400'}
{'https://github.com/npm/ssri', 'https://www.npmjs.com/package/ssri', 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://npmjs.com', 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf'}
null
{'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1'}
{'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2'}
npm
GHSA-43f8-2h32-f4cj
Regular Expression Denial of Service in hosted-git-info
The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity
{'CVE-2021-23362'}
2022-03-18T20:25:44Z
2021-05-06T16:10:39Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://github.com/npm/hosted-git-info', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/pull/76', 'https://github.com/npm/hosted-git-info/commits/v2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7'}
null
{'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3'}
{'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7'}
npm
GHSA-67mq-h2r9-rh2m
Prototype pollution in multi-ini
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
{'CVE-2020-28460'}
2021-04-07T23:23:09Z
2021-04-13T15:23:41Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}
null
{'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}
{'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}
npm
GHSA-8v38-pw62-9cw2
Incorrect returned href via an '@' sign but no user info and hostname
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular, ````` parse(\"http://@/127.0.0.1\") ````` Will return: ````` { slashes: true, protocol: 'http:', hash: '', query: '', pathname: '/127.0.0.1', auth: '', host: '', port: '', hostname: '', password: '', username: '', origin: 'null', href: 'http:///127.0.0.1' } ````` If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
{'CVE-2022-0639'}
2022-03-11T22:48:39Z
2022-02-18T00:00:33Z
MODERATE
null
{'CWE-639'}
{'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639', 'https://github.com/unshiftio/url-parse'}
null
{'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'}
{'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'}
npm
GHSA-7wpw-2hjm-89gp
Prototype Pollution in merge
All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge .
{'CVE-2020-28499'}
2021-05-04T20:20:28Z
2021-05-04T20:18:47Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://snyk.io/vuln/SNYK-JS-MERGE-1042987', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64', 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'}
null
{'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'}
{'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'}
npm
GHSA-6956-83fg-5wc5
Prototype Pollution in set-in
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
{'CVE-2022-25354'}
2022-03-29T21:05:15Z
2022-03-18T00:01:11Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://github.com/ahdinosaur/set-in', 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5'}
null
{'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'}
{'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'}
npm
GHSA-4xcv-9jjx-gfj3
Denial of Service in mem
Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging. ## Recommendation Upgrade to version 4.0.0 or later.
null
2021-08-17T15:44:45Z
2019-07-05T21:07:58Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1084', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://snyk.io/vuln/npm:mem:20180117', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
null
{'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
{'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
npm
GHSA-333x-9vgq-v2j4
Directory Traversal in geddy
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors. ### Proof of Concept ``` http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd ``` ## Recommendation Update geddy to version >= 13.0.8
{'CVE-2015-5688'}
2021-08-31T20:33:50Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-22'}
{'https://github.com/geddy/geddy', 'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688', 'https://github.com/geddy/geddy/pull/699', 'https://github.com/geddy/geddy/issues/697', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231', 'https://github.com/geddy/geddy/releases/tag/v13.0.8', 'https://www.npmjs.com/advisories/10'}
null
{'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'}
{'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'}
npm
GHSA-32x6-qvw6-mxj4
Forwarding of confidentials headers to third parties in fluture-node
### Impact Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing. ### Patches The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin. ### Workarounds Use a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2. ### References - This vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/ - Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
{'CVE-2022-24719'}
2022-03-15T18:05:24Z
2022-03-01T22:14:57Z
LOW
null
{'CWE-359', 'CWE-601', 'CWE-200'}
{'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/psf/requests/pull/4718', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719'}
null
{'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4'}
{'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77'}
npm
GHSA-6chw-6frg-f759
Regular Expression Denial of Service in Acorn
Affected versions of acorn are vulnerable to Regular Expression Denial of Service. A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop. The string is not valid UTF16 which usually results in it being sanitized before reaching the parser. If an application processes untrusted input and passes it directly to acorn, attackers may leverage the vulnerability leading to Denial of Service.
null
2021-08-23T15:10:32Z
2020-04-03T21:48:38Z
HIGH
null
{'CWE-400'}
{'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469', 'https://www.npmjs.com/advisories/1488'}
null
{'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'}
{'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'}
npm
GHSA-3qh4-r86r-grvm
Arbitrary JavaScript Execution in typed-function
Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code. ## Recommendation Upgrade to version 0.10.6 or later.
{'CVE-2017-1001004'}
2020-08-31T18:36:57Z
2020-09-02T18:24:39Z
HIGH
null
{'CWE-94'}
{'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106', 'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004', 'https://www.npmjs.com/advisories/819'}
null
{'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'}
{'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'}
npm
GHSA-33rv-m2gp-mm2r
Prototype pollution in safe-flat
Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25927'}
2021-05-20T21:34:56Z
2021-06-21T17:18:29Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927', 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927'}
null
{'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'}
{'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'}
npm
GHSA-hhfg-6hfc-rvxm
Regular Expression Denial of Service in jsoneditor
JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex.
{'CVE-2021-3822'}
2022-05-04T03:39:38Z
2021-09-29T17:15:55Z
MODERATE
null
{'CWE-400', 'CWE-697', 'CWE-1333'}
{'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822', 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e', 'https://github.com/josdejong/jsoneditor'}
null
{'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'}
{'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'}
npm
GHSA-gjwp-7v3g-99pj
Cross-site Request Forgery (CSRF) in joplin
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
{'CVE-2021-23431'}
2021-08-25T18:00:40Z
2021-09-02T17:09:05Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23431', 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e', 'https://github.com/laurent22/joplin', 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'}
null
{'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'}
{'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'}
npm
GHSA-4r62-v4vq-hr96
Regular Expression Denial of Service (REDoS) in Marked
### Impact _What kind of vulnerability is it? Who is impacted?_ [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) A Denial of Service attack can affect anyone who runs user generated code through `marked`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ patched in v2.0.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ None. ### References _Are there any links users can visit to find out more?_ https://github.com/markedjs/marked/issues/1927 https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked/issues)
{'CVE-2021-21306'}
2021-02-08T21:17:26Z
2021-02-08T21:17:58Z
MODERATE
null
{'CWE-400'}
{'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd', 'https://www.npmjs.com/package/marked', 'https://github.com/markedjs/marked/issues/1927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306', 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96', 'https://github.com/markedjs/marked/pull/1864'}
null
{'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'}
{'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'}
npm
GHSA-4p55-xj37-fx7g
Improper Authorization in Strapi
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
{'CVE-2020-27665'}
2020-10-29T16:25:47Z
2020-10-29T18:29:31Z
MODERATE
null
{'CWE-276'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27665', 'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616', 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb', 'https://github.com/strapi/strapi/pull/8439'}
null
{'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'}
{'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'}
npm
GHSA-6c3j-c64m-qhgq
XSS in jQuery as used in Drupal, Backdrop CMS, and other products
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
{'CVE-2019-11358'}
2022-02-08T22:08:08Z
2019-04-26T16:29:11Z
MODERATE
null
{'CWE-79', 'CWE-1321'}
{'https://seclists.org/bugtraq/2019/Apr/32', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://backdropcms.org/security/backdrop-sa-core-2019-009', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11358', 'https://www.debian.org/security/2019/dsa-4460', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b', 'https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E', 'https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://www.debian.org/security/2019/dsa-4434', 'https://seclists.org/bugtraq/2019/Jun/12', 'https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/', 'https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E', 'https://www.drupal.org/sa-core-2019-006', 'https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://github.com/jquery/jquery/pull/4333', 'https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://snyk.io/vuln/SNYK-JS-JQUERY-174006', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/', 'https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190919-0001/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/', 'https://access.redhat.com/errata/RHSA-2019:2587', 'https://seclists.org/bugtraq/2019/May/18', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/jquery/jquery', 'http://www.securityfocus.com/bid/108023', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/13', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://www.tenable.com/security/tns-2019-08', 'https://www.tenable.com/security/tns-2020-02'}
null
{'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b'}
{'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b'}
npm
GHSA-2v5f-23xc-v9qr
Cross-site scripting
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
{'CVE-2021-3377'}
2021-03-11T22:49:55Z
2021-03-11T22:50:39Z
MODERATE
null
{'CWE-79'}
{'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377', 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf'}
null
{'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'}
{'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'}
npm
GHSA-xc6g-ggrc-qq4r
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`. ## Proof of Concept ``` var sanitizeHtml = require('sanitize-html'); var dirty = '!<textarea>&lt;/textarea&gt;<svg/onload=prompt`xs`&gt;</textarea>!'; var clean = sanitizeHtml(dirty, { allowedTags: [ 'textarea' ] }); console.log(clean); // !<textarea></textarea><svg/onload=prompt`xs`></textarea>! ``` ## Recommendation Update to version 1.11.4 or later.
{'CVE-2017-16016'}
2020-08-31T18:12:43Z
2018-11-09T17:47:23Z
MODERATE
null
{'CWE-79'}
{'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://nodesecurity.io/advisories/154', 'https://github.com/punkave/sanitize-html/issues/100', 'https://www.npmjs.com/advisories/154', 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r', 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag'}
null
{'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'}
{'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'}
npm
GHSA-gh78-48h3-frjq
Improper exception handling in Aedes
An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.
{'CVE-2020-13410'}
2021-05-05T20:02:28Z
2021-05-06T18:10:46Z
HIGH
null
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13410', 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b', 'https://github.com/moscajs/aedes/pull/493', 'https://payatu.com/advisory/dos-in-aedes-mqtt-broker'}
null
{'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'}
{'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'}
npm
GHSA-m7rg-8wvq-846v
Prototype pollution
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25947'}
2021-06-14T21:47:44Z
2021-06-07T21:49:14Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947', 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'}
null
{'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'}
{'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'}
npm
GHSA-c53x-wwx2-pg96
Cross-Site Scripting in @berslucas/liljs
Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation Upgrade to version 1.0.2 or later.
null
2021-09-28T17:27:43Z
2020-09-03T17:03:58Z
MODERATE
null
{'CWE-79'}
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2'}
null
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
npm
GHSA-pm52-wwrw-c282
Command Injection in wiki-plugin-datalog
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system. ## Recommendation Upgrade to version 0.1.6 or later.
null
2021-08-16T14:32:10Z
2019-06-13T18:59:06Z
HIGH
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926'}
null
{'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}
{'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}
npm
GHSA-w42g-7vfc-xf37
Introspection in schema validation in Apollo Server
We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions. ### Impact If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled. The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory. > **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary. In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)). The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP). **The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors. ### Affected packages The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server. Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`. > Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form. ### Resolution The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.) ### Workarounds Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**: ```js const server = new ApolloServer({ subscriptions: false, /* Other options, such as typeDefs, resolvers, schema, etc. */ }); ``` ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist. ### Credit and appreciation Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing. Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing.
null
2020-08-31T19:02:14Z
2020-06-05T19:38:14Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1526', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1530', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1528', 'https://www.npmjs.com/advisories/1527', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1531', 'https://www.npmjs.com/advisories/1533', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1534'}
null
{'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}
{'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}
npm
GHSA-p77h-hv6g-fmfp
Sensitive Data Exposure in ibm_db
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode. ## Recommendation Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
null
2021-09-29T18:49:03Z
2020-09-03T20:43:16Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762'}
null
{'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
{'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
npm
GHSA-hv96-xxx2-5v7w
Downloads Resources over HTTP in nw
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`. ## Recommendation Update to version 0.23.6-1 or later.
{'CVE-2016-10588'}
2021-06-10T23:26:24Z
2019-02-18T23:51:04Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://nodesecurity.io/advisories/166'}
null
{'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}
{'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}
npm
GHSA-82rf-q3pr-4f6p
Sensitive data exposure in NATS
Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment. The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected. Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. Affected versions: Security impact: * NPM package nats.js: + mainline is unaffected + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 Logic flaw: * NPM package nats.ws: + status: preview + flawed from 1.0.0-85, fixed in 1.0.0-111 * Deno repository https://github.com/nats-io/nats.deno + status: preview + flawed in all git tags prior to fix + fixed with git tag v1.0.0-9 Impact: For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
{'CVE-2020-26149'}
2021-10-04T21:25:47Z
2020-10-08T22:11:32Z
HIGH
null
{'CWE-522'}
{'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.ws', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
null
{'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
{'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
npm
GHSA-v82v-rq72-phq9
Server side request forgery in @isomorphic-git/cors-proxy
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
{'CVE-2021-23664'}
2022-01-31T22:00:02Z
2022-01-26T22:13:05Z
HIGH
null
{'CWE-918'}
{'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311', 'https://github.com/isomorphic-git/cors-proxy'}
null
{'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
{'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
npm
GHSA-mfcp-34xw-p57x
Authentication Bypass in saml2-js
Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely. ## Recommendation Upgrade to version 2.0.5 or later.
null
2021-09-29T20:12:42Z
2020-09-03T21:20:52Z
MODERATE
null
{'CWE-287'}
{'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637', 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/Clever/saml2'}
null
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}
npm
GHSA-pfxf-wh96-fvjc
Log Forging in generator-jhipster-kotlin
### Impact We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. ### Patches version 1.7.0. ### Workarounds In `AccountResource.kt` you should change the line ```kotlin log.warn("Password reset requested for non existing mail '$mail'"); ``` to ```kotlin log.warn("Password reset requested for non existing mail"); ``` ### References * https://cwe.mitre.org/data/definitions/117.html * https://owasp.org/www-community/attacks/Log_Injection * https://www.baeldung.com/jvm-log-forging ### For more information If you have any questions or comments about this advisory: * Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin)
{'CVE-2020-4072'}
2021-01-07T23:50:00Z
2020-06-25T20:02:51Z
MODERATE
null
{'CWE-117'}
{'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072'}
null
{'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
{'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
npm
GHSA-2pr6-76vf-7546
Denial of Service in js-yaml
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. ## Recommendation Upgrade to version 3.13.0.
null
2021-08-04T21:32:56Z
2019-06-05T14:35:29Z
MODERATE
null
{'CWE-400'}
{'https://github.com/nodeca/js-yaml/issues/475', 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'}
null
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}
npm
GHSA-6394-6h9h-cfjg
Regular Expression Denial of Service
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
null
2021-02-25T17:23:12Z
2019-06-07T21:12:35Z
MODERATE
null
{'CWE-400'}
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
null
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
npm
GHSA-2x4q-6jfv-8h9h
Path Traversal in glance
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`. ## Recommendation Update to version 3.0.4 or later.
{'CVE-2018-3715'}
2020-08-31T18:29:00Z
2018-07-26T14:53:14Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/590', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106'}
null
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
npm
GHSA-63q7-h895-m982
Cross-site Scripting in dompurify
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
{'CVE-2020-26870'}
2022-04-28T17:58:51Z
2020-12-18T22:51:40Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://github.com/cure53/DOMPurify', 'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
{'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
npm
GHSA-f698-m2v9-5fh3
Command Injection in opencv
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands. ## Recommendation Upgrade to version 6.1.0.
null
2020-08-31T18:35:50Z
2019-06-04T20:11:44Z
LOW
null
{'CWE-77'}
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb', 'https://www.npmjs.com/advisories/789'}
null
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
npm
GHSA-3c48-6pcv-88rm
Macro in MathJax running untrusted Javascript within a web browser
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
{'CVE-2018-1999024'}
2022-04-26T18:17:56Z
2018-07-27T17:05:27Z
MODERATE
null
{'CWE-79'}
{'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://github.com/mathjax/MathJax', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
null
{'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
{'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
npm
GHSA-r9p9-mrjm-926w
Use of a Broken or Risky Cryptographic Algorithm
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
{'CVE-2020-28498'}
2021-03-08T16:02:43Z
2021-03-08T16:06:50Z
MODERATE
null
{'CWE-327'}
{'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
null
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}
npm
GHSA-4w46-w44m-3jq3
Parse Server stores password in plain text
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
{'CVE-2020-26288'}
2021-01-07T22:32:25Z
2020-12-28T16:33:17Z
LOW
null
{'CWE-312'}
{'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://www.npmjs.com/advisories/1593', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288'}
null
{'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
{'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
npm
GHSA-6cgh-hjpw-q3gq
Utils.readChallengeTx does not verify the server account signature
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
{'CVE-2021-32738'}
2021-07-02T18:25:08Z
2021-07-02T19:20:33Z
MODERATE
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq'}
null
{'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}
{'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}
npm
GHSA-jgrx-mgxx-jf9v
Regular Expression Denial of Service in tmpl
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
{'CVE-2021-3777'}
2022-05-04T03:26:16Z
2021-09-20T20:27:52Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
null
{'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
{'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
npm
GHSA-w8qv-6jwh-64r5
Regular Expression Denial of Service in browserslist
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
{'CVE-2021-23364'}
2021-05-20T22:03:36Z
2021-05-24T19:52:40Z
MODERATE
null
{'CWE-400'}
{'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/pull/593'}
null
{'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}
{'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}
npm
GHSA-8h84-8j4f-p97q
Injection in bodymen
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10792'}
2021-04-07T20:24:23Z
2021-04-13T15:24:21Z
MODERATE
null
{'CWE-74'}
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}
null
{'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
{'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
npm
GHSA-mxjr-xmcg-fg7w
Arbitrary Code Injection in mobile-icon-resizer
mobile-icon-resizer resizes large images for use as icons for iOS and Android. mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3. mobile-icon-resizer takes an options object as an argument to define the resulting icons as such: ``` var options = { config: './config.js' } resize(options, function(err){}); ``` config.js would need to be a file on the filesystem and look something like: ``` var config = { iOS: { "images": [ /* iOS image definitions are not vulnerable */ ] }, android: { "images" : [ { "baseRatio" : "console.log('Executing script as baseRatio property')", "folder" : "drawable-ldpi" }, { "ratio" : "console.log('Executing script as ratio property')", "folder" : "drawable-mdpi" }, /* other android image defintiions ... */ ] } }; exports = module.exports = config; ``` The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed. ## Recommendation Update to version 0.4.3 or later.
null
2021-08-17T15:41:58Z
2019-06-27T17:25:21Z
MODERATE
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/317', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
null
{'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
{'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
npm
GHSA-g95j-p8f6-pwh4
Downloads Resources over HTTP in headless-browser-lite
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`. ## Recommendation Update to version 2015.4.18-a or later.
{'CVE-2016-10625'}
2021-06-10T23:42:13Z
2019-02-18T23:56:58Z
HIGH
null
{'CWE-311'}
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://www.npmjs.com/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nodesecurity.io/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4'}
null
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'}
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'}
npm
GHSA-2hw7-mxvj-m455
Path traversal in Node-RED-Dashboard
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
{'CVE-2021-3223'}
2021-01-27T23:26:39Z
2021-01-29T18:13:52Z
HIGH
null
{'CWE-22'}
{'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}
null
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}
npm
GHSA-j44m-qm6p-hp7m
Arbitrary File Overwrite in tar
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. ## Recommendation For tar 4.x, upgrade to version 4.4.2 or later. For tar 2.x, upgrade to version 2.2.2 or later.
{'CVE-2018-20834'}
2021-08-03T21:28:27Z
2019-05-01T18:37:31Z
HIGH
null
{'CWE-59'}
{'https://hackerone.com/reports/344595', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://www.npmjs.com/advisories/803', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779'}
null
{'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}
{'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'}
npm
GHSA-hqq7-2q2v-82xq
Cross-site Scripting in sanitize-url
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
{'CVE-2021-23648'}
2022-03-21T17:20:05Z
2022-03-17T00:00:24Z
MODERATE
null
{'CWE-79'}
{'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://github.com/braintree/sanitize-url', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882'}
null
{'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
{'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
npm
GHSA-82mg-x548-gq3j
LDAP Injection in ldapauth
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter. ## Recommendation ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
{'CVE-2015-7294'}
2021-09-23T19:58:02Z
2020-08-31T22:49:46Z
HIGH
null
{'CWE-90'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://www.npmjs.com/advisories/19', 'https://github.com/vesse/node-ldapauth-fork', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'http://www.openwall.com/lists/oss-security/2015/09/18/4'}
null
{'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}
{'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}
npm
GHSA-3pcq-34w5-p4g2
forEachSeries and forEachLimit do not limit the number of requests
### Impact This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. ### Patches The problem has been patched in 1.0.4. ### Workarounds There is no workaround aside from upgrading to 1.0.4.
{'CVE-2021-41167'}
2021-10-27T17:05:58Z
2021-10-21T17:49:30Z
HIGH
null
{'CWE-400'}
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/nicolas-van/modern-async', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}
null
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
npm
GHSA-7p7h-4mm5-852v
Regular Expression Denial of Service in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
{'CVE-2021-33623'}
2022-05-04T03:06:53Z
2021-06-07T22:10:39Z
HIGH
null
{'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1', 'https://github.com/sindresorhus/trim-newlines', 'https://www.npmjs.com/package/trim-newlines', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623'}
null
{'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'}
{'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'}
npm
GHSA-72mh-269x-7mh5
Improper Certificate Validation in xmlhttprequest-ssl
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
{'CVE-2021-31597'}
2021-05-20T21:59:29Z
2021-05-24T19:52:55Z
CRITICAL
null
{'CWE-295'}
{'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt'}
null
{'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'}
{'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'}
npm
GHSA-6qpr-9mc5-7gch
Command Injection in async-git
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
{'CVE-2020-28490'}
2021-03-18T22:57:13Z
2021-04-12T19:50:20Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d', 'https://www.npmjs.com/package/async-git', 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://github.com/omrilotan/async-git/pull/14'}
null
{'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}
{'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}
npm
GHSA-3jfq-g458-7qm9
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. ### Patches 3.2.2 || 4.4.14 || 5.0.6 || 6.1.1 NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case. ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. ```js const path = require('path') const tar = require('tar') tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } }, // or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{'CVE-2021-32804'}
2021-08-30T23:14:50Z
2021-08-03T19:06:36Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/npm/node-tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/tar', 'https://www.npmjs.com/advisories/1770', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}
null
{'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'}
{'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'}
npm
GHSA-8fr3-hfg3-gpgp
Open Redirect in node-forge
parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path.
{'CVE-2022-0122'}
2022-01-13T18:49:59Z
2022-01-21T23:36:19Z
MODERATE
null
{'CWE-601'}
{'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'}
null
{'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'}
{'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'}