ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
npm | GHSA-7r8m-45gc-m2c8 | Downloads Resources over HTTP in mongodb-instance | Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`.
## Recommendation
Update to version 0.0.3 or later. | {'CVE-2016-10572'} | 2021-01-08T19:14:34Z | 2019-02-18T23:52:14Z | HIGH | null | {'CWE-311'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'} | null | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} |
npm | GHSA-vpf5-82c8-9v36 | Prototype Pollution in algoliasearch-helper | The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns. | {'CVE-2021-23433'} | 2021-11-24T19:00:33Z | 2021-11-23T21:15:35Z | MODERATE | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://github.com/algolia/algoliasearch-helper-js'} | null | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} |
npm | GHSA-vm5j-vqr6-v7v8 | OS Command Injection in pixl-class | pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization. | {'CVE-2020-7640'} | 2021-05-25T20:40:19Z | 2021-12-10T20:04:56Z | HIGH | null | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | null | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} |
npm | GHSA-q42p-pg8m-cqh6 | Prototype Pollution in handlebars | Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
## Recommendation
For handlebars 4.1.x upgrade to 4.1.2 or later.
For handlebars 4.0.x upgrade to 4.0.14 or later. | null | 2021-08-04T20:54:05Z | 2019-06-05T14:07:48Z | HIGH | null | {'CWE-471'} | {'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://www.npmjs.com/advisories/755', 'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} | null | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} |
npm | GHSA-jmqm-f2gx-4fjv | Sensitive information exposure through logs in npm-registry-fetch | Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | null | 2021-09-22T19:00:07Z | 2020-07-07T18:59:10Z | MODERATE | null | {'CWE-352'} | {'https://github.com/npm/npm-registry-fetch', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432'} | null | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} |
npm | GHSA-w3w8-37jv-2c58 | Cross-Site Scripting in mustache | Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 2.2.1 or later.
Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes. | {'CVE-2015-8862'} | 2021-09-20T22:34:08Z | 2017-10-24T18:33:36Z | HIGH | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'http://www.securityfocus.com/bid/96436', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/janl/mustache.js', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', 'https://nodesecurity.io/advisories/62', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.npmjs.com/advisories/62'} | null | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} |
npm | GHSA-8p9r-f949-699g | Path Traversal in browserless-chrome | This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server. | {'CVE-2020-7758'} | 2021-04-20T22:41:52Z | 2021-05-10T18:46:48Z | HIGH | null | {'CWE-22'} | {'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758', 'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable'} | null | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} |
npm | GHSA-6c8f-qphg-qjgp | Validation Bypass in kind-of | Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
## Recommendation
Upgrade to versions 6.0.3 or later. | {'CVE-2019-20149'} | 2021-08-23T15:03:55Z | 2020-03-31T15:59:54Z | HIGH | null | {'CWE-668'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://www.npmjs.com/advisories/1490'} | null | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} |
npm | GHSA-4m8h-h59m-m34j | Prototype Pollution in bmoor | The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664) | {'CVE-2021-23558'} | 2022-02-07T21:21:00Z | 2022-02-01T00:50:09Z | HIGH | null | {'CWE-1321'} | {'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://github.com/b-heilman/bmoor/', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558'} | null | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} |
npm | GHSA-wmx6-vxcf-c3gr | Validation Bypass in slp-validate | Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade to version 1.0.1 or later. | {'CVE-2019-16761'} | 2021-01-08T20:11:31Z | 2019-11-15T23:10:19Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'} | null | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} |
npm | GHSA-77jf-fjjf-xcww | Invalid Curve Attack in openpgp | Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key.
## Recommendation
Upgrade to version 4.3.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0 | {'CVE-2019-9155'} | 2021-07-27T21:15:18Z | 2019-08-23T21:42:22Z | MODERATE | null | {'CWE-327'} | {'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'} | null | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} |
npm | GHSA-v8v8-6859-qxm4 | Arbitrary shell command execution in logkitty | Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1. | {'CVE-2020-8149'} | 2020-06-04T19:33:24Z | 2020-06-05T14:47:02Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf', 'https://github.com/zamotany/logkitty/pull/18', 'https://hackerone.com/reports/825729'} | null | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} |
npm | GHSA-74cr-77xc-8g6r | Prototype Pollution in @apollo/gateway | Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
Upgrade to version 0.6.2 or later.
| null | 2021-08-16T15:28:22Z | 2019-06-13T20:37:39Z | HIGH | null | {'CWE-400', 'CWE-1321'} | {'https://github.com/apollographql/apollo-server/pull/2779', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://www.npmjs.com/advisories/917'} | null | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} |
npm | GHSA-x2mc-8fgj-3wmr | Improper Input Validation in tar-fs | A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. | {'CVE-2018-20835'} | 2021-08-03T21:27:51Z | 2019-05-01T18:37:18Z | HIGH | null | {'CWE-20'} | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2', 'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'} | null | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} |
npm | GHSA-w46j-8hm6-h8mm | XSS in apexcharts | The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields. | {'CVE-2021-23327'} | 2021-02-10T18:18:38Z | 2021-02-11T20:47:34Z | MODERATE | null | {'CWE-79'} | {'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327'} | null | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} |
npm | GHSA-gqgv-6jq5-jjj9 | Prototype Pollution Protection Bypass in qs | Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
## Recommendation
Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later. | {'CVE-2017-1000048'} | 2021-08-25T21:03:56Z | 2020-04-30T17:16:47Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://github.com/ljharb/qs/issues/200', 'https://snyk.io/vuln/npm:qs:20170213', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://www.npmjs.com/advisories/1469'} | null | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} |
npm | GHSA-v39p-96qg-c8rf | Prototype Pollution in object-path | This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different. | {'CVE-2021-23434'} | 2021-08-30T18:16:08Z | 2021-09-01T18:37:11Z | MODERATE | null | {'CWE-843', 'CWE-1321'} | {'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb', 'https://github.com/mariocasciaro/object-path'} | null | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} |
npm | GHSA-qv2v-m59f-v5fw | Insecure randomness in socket.io | Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
## Recommendation
Update to v0.9.7 or later. | {'CVE-2017-16031'} | 2021-09-16T21:04:32Z | 2018-11-07T00:29:37Z | HIGH | null | {'CWE-330'} | {'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://github.com/socketio/socket.io/pull/857', 'https://nodesecurity.io/advisories/321', 'https://github.com/socketio/socket.io', 'https://www.npmjs.com/advisories/321', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/socketio/socket.io/issues/856', 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} | null | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} |
npm | GHSA-vc9j-fhvv-8vrf | Remote Code Execution in scratch-vm | MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented.
NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts. | {'CVE-2020-14000'} | 2021-09-22T21:24:07Z | 2020-07-27T19:55:52Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://github.com/LLK/scratch-vm/pull/2476', 'https://github.com/LLK/scratch-vm'} | null | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} |
npm | GHSA-fj59-f6c3-3vw4 | Command Injection in systeminformation | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()`
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation) | {'CVE-2020-26300'} | 2021-09-10T14:54:48Z | 2020-10-27T20:40:00Z | MODERATE | null | {'CWE-78'} | {'https://github.com/sebhildebrandt/systeminformation', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4'} | null | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} |
npm | GHSA-m8fw-534v-xm85 | Cross-Site Scripting (XSS) in cloudcmd | Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable.
## Recommendation
Update to version 9.1.6 or later. | null | 2020-08-31T18:31:00Z | 2019-06-04T15:43:29Z | HIGH | null | {'CWE-79'} | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38', 'https://www.npmjs.com/advisories/642', 'https://hackerone.com/reports/341044)', 'https://hackerone.com/reports/341044'} | null | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} |
npm | GHSA-pw54-mh39-w3hc | Regular expression denial of service in npm-user-validate | This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters. | {'CVE-2020-7754'} | 2021-04-20T17:21:44Z | 2021-05-10T19:08:15Z | HIGH | null | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} | null | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} |
npm | GHSA-h97g-4mx7-5p2p | Open Redirect in apostrophe | Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end.
## Recommendation
Update to version 2.92.0 or later. | null | 2021-09-28T21:18:57Z | 2020-09-03T17:11:36Z | MODERATE | null | {'CWE-601'} | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7', 'https://github.com/apostrophecms/apostrophe', 'https://www.npmjs.com/advisories/1029', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089'} | null | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} |
npm | GHSA-rwv8-jvff-jq28 | Path Traversal in public | Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.
## Recommendation
Update to version 0.1.3 or later. | {'CVE-2018-3731'} | 2020-08-31T18:28:14Z | 2018-07-18T21:20:30Z | HIGH | null | {'CWE-22'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918', 'https://www.npmjs.com/advisories/571', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731'} | null | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} |
npm | GHSA-p493-635q-r6gr | Remote code execution via the `pretty` option. | ### Impact
If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.
### Patches
Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter.
### Workarounds
If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade.
### References
Original report: https://github.com/pugjs/pug/issues/3312
### For more information
If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md) | {'CVE-2021-21353'} | 2021-03-03T01:49:22Z | 2021-03-03T02:03:52Z | HIGH | null | {'CWE-74'} | {'https://www.npmjs.com/package/pug-code-gen', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353', 'https://github.com/pugjs/pug/issues/3312', 'https://github.com/pugjs/pug/pull/3314'} | null | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} |
npm | GHSA-7jh9-6cpf-h4m7 | XSS in hello.js | This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1). | {'CVE-2020-7741'} | 2021-01-13T19:06:37Z | 2021-01-13T19:07:01Z | CRITICAL | null | {'CWE-79'} | {'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546'} | null | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} |
npm | GHSA-4j46-mp85-mv8c | Path traversal in rollup-plugin-serve | Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation. | {'CVE-2020-7684'} | 2021-05-18T01:51:52Z | 2021-05-18T01:52:24Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2', 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969', 'https://vuldb.com/?id.158745', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7684'} | null | {'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'} | {'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'} |
npm | GHSA-3pxp-6963-46r9 | Command Injection in pdfinfojs | Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor.
## Recommendation
Update to version 0.4.1 or later. | {'CVE-2018-3746'} | 2020-08-31T18:31:03Z | 2018-06-07T19:43:00Z | HIGH | null | {'CWE-77'} | {'https://hackerone.com/reports/330957', 'https://www.npmjs.com/advisories/643', 'https://github.com/advisories/GHSA-3pxp-6963-46r9', 'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746'} | null | {'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'} | {'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'} |
npm | GHSA-rch9-xh7r-mqgw | Cross-Site Scripting in simple-server | Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server.
## Recommendation
Update to version 1.1.0 or later. | {'CVE-2018-3717'} | 2020-08-31T18:29:12Z | 2018-07-26T15:08:05Z | HIGH | null | {'CWE-79'} | {'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717', 'https://hackerone.com/reports/309394', 'https://hackerone.com/reports/309641', 'https://www.npmjs.com/advisories/595', 'https://www.npmjs.com/advisories/584', 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448', 'https://github.com/advisories/GHSA-rch9-xh7r-mqgw'} | null | {'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'} | {'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'} |
npm | GHSA-jfcc-rm7f-xgf8 | Cross-Site Scripting in mavon-editor | All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-29T18:37:46Z | 2020-09-03T20:36:35Z | MODERATE | null | {'CWE-79'} | {'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://github.com/hinesboy/mavonEditor', 'https://www.npmjs.com/advisories/1169', 'https://www.npmjs.com/package/mavon-editor', 'https://github.com/hinesboy/mavonEditor/pull/548', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108', 'https://github.com/hinesboy/mavonEditor/issues/472'} | null | {'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'} | {'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'} |
npm | GHSA-3fjq-93xj-3f3f | Cross-Site Scripting in serialize-to-js | Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 3.0.1 or later. | {'CVE-2019-16772'} | 2021-01-08T20:02:20Z | 2019-12-06T23:20:26Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://www.npmjs.com/advisories/1429', 'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'} | null | {'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'} | {'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'} |
npm | GHSA-wm77-q74p-5763 | Path Traversal in superstatic | Affected of `superstatic` are vulnerable to path traversal when used on Windows.
Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).
## Recommendation
Update to version 5.0.2 or later. | null | 2021-08-09T22:21:02Z | 2018-07-27T17:06:03Z | HIGH | null | {'CWE-177'} | {'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://www.npmjs.com/advisories/652', 'https://github.com/firebase/superstatic/pull/255', 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'} | null | {'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'} | {'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'} |
npm | GHSA-753c-phhg-cj29 | Improper Neutralization of Special Elements used in a Command | This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function. | {'CVE-2021-23352'} | 2021-03-12T21:10:53Z | 2021-03-12T23:01:49Z | HIGH | null | {'CWE-77', 'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'} | null | {'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'} | {'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'} |
npm | GHSA-f522-ffg8-j8r6 | Regular Expression Denial of Service in is-my-json-valid | Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.
## Recommendation
Update to version 1.4.1, 2.17.2 or later. | {'CVE-2016-2537'} | 2021-09-09T21:38:37Z | 2017-10-24T18:33:35Z | HIGH | null | {'CWE-20'} | {'https://www.npmjs.com/advisories/76', 'https://www.npmjs.com/advisories/572', 'https://nodesecurity.io/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://hackerone.com/reports/317548', 'https://github.com/mafintosh/is-my-json-valid', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://github.com/mafintosh/is-my-json-valid/pull/159'} | null | {'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b'} | {'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'} |
npm | GHSA-pch5-whg9-qr2r | netmask npm package vulnerable to octal input data | The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918. | {'CVE-2021-29418'} | 2021-06-09T23:10:53Z | 2021-03-29T21:32:05Z | MODERATE | null | {'CWE-20'} | {'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://www.npmjs.com/package/netmask', 'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://sick.codes/sick-2021-011', 'https://vuln.ryotak.me/advisories/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418', 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'} | null | {'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'} | {'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'} |
npm | GHSA-h73q-5wmj-q8pj | Cross site scripting in datatables.net | This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped. | {'CVE-2021-23445'} | 2021-10-13T17:26:00Z | 2021-09-29T17:11:28Z | MODERATE | null | {'CWE-79'} | {'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371', 'https://cdn.datatables.net/1.11.3/', 'https://github.com/DataTables/Dist-DataTables', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544'} | null | {'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'} | {'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'} |
npm | GHSA-qqxp-xp9v-vvx6 | Moderate severity vulnerability that affects jquery-ui | Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo. | {'CVE-2012-6662'} | 2021-09-16T20:04:38Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'http://bugs.jqueryui.com/ticket/8859', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'http://www.securityfocus.com/bid/71107', 'http://seclists.org/oss-sec/2014/q4/613', 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://github.com/jquery/jquery/issues/2432', 'http://seclists.org/oss-sec/2014/q4/616', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697', 'http://bugs.jqueryui.com/ticket/8861', 'https://github.com/jquery/jquery', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'} | null | {'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'} | {'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'} |
npm | GHSA-g452-6rfc-vrvx | Prototype Pollution in open-graph | This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload. | {'CVE-2021-23419'} | 2021-08-30T21:26:46Z | 2021-09-01T18:31:53Z | MODERATE | null | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747', 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348', 'https://github.com/samholmes/node-open-graph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419'} | null | {'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'} | {'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'} |
npm | GHSA-hhqj-cfjx-vj25 | Cross site scripting in reveal.js | The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on victim's browser window hosting reveal.js | {'CVE-2022-0776'} | 2022-03-10T16:00:14Z | 2022-03-02T00:00:20Z | MODERATE | null | {'CWE-79'} | {'https://github.com/hakimel/reveal.js', 'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'} | null | {'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'} | {'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'} |
npm | GHSA-c35v-qwqg-87jc | Timing Attack in express-basic-auth | Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets.
## Recommendation
Upgrade to version 1.2.0 or later. | null | 2021-08-04T20:58:12Z | 2019-06-06T15:32:32Z | LOW | null | {'CWE-208'} | {'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345', 'https://www.npmjs.com/advisories/827', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/LionC/express-basic-auth/pull/20'} | null | {'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'} | {'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'} |
npm | GHSA-6c3f-p5wp-34mh | OS Command Injection in async-git | The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1. | {'CVE-2021-3190'} | 2022-05-03T02:56:05Z | 2021-01-29T18:14:00Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a', 'https://github.com/omrilotan/async-git', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git/pull/14'} | null | {'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'} | {'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'} |
npm | GHSA-wx69-rvg3-x7fc | XSS via prototype pollution in NodeBB | ### Impact
A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report.
### Patches
The vulnerability has been patched as of v1.18.5.
### Workarounds
Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
| {'CVE-2021-43787'} | 2021-12-01T15:07:01Z | 2021-11-30T22:21:01Z | CRITICAL | null | {'CWE-79'} | {'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc', 'https://github.com/NodeBB/NodeBB'} | null | {'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'} | {'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'} |
npm | GHSA-84p7-fh9c-6g8h | Prototype Pollution in mixme | ### Impact
When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content.
### Patches
The problem was patch with a more agressive discovery of secured properties to filter out.
| null | 2021-09-16T21:30:18Z | 2021-09-20T19:52:24Z | HIGH | null | {'CWE-1321'} | {'https://github.com/adaltas/node-mixme/issues/1', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme', 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4'} | null | {'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'} | {'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'} |
npm | GHSA-94xh-2fmc-xf5j | command injection vulnerability | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md) | {'CVE-2020-7752'} | 2021-10-08T21:15:35Z | 2020-10-27T20:30:20Z | HIGH | null | {'CWE-78'} | {'https://github.com/sebhildebrandt/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j', 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js'} | null | {'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'} | {'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'} |
npm | GHSA-rjf2-j2r6-q8gr | Prototype Pollution in vm2 | This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine. | {'CVE-2021-23449'} | 2021-10-19T14:18:05Z | 2021-10-19T15:28:45Z | CRITICAL | null | {'CWE-915', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23449', 'https://github.com/patriksimek/vm2', 'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886', 'https://security.netapp.com/advisory/ntap-20211029-0010/'} | null | {'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'} | {'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'} |
npm | GHSA-m52x-29pq-w3vv | Cross-Site Scripting in pannellum | Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 2.5.6 or later. | {'CVE-2019-16763'} | 2021-01-08T18:31:10Z | 2019-11-22T18:18:03Z | MODERATE | null | {'CWE-79'} | {'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763', 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://www.npmjs.com/advisories/1418'} | null | {'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'} | {'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'} |
npm | GHSA-vx3p-948g-6vhq | Regular Expression Denial of Service (ReDoS) | npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. | {'CVE-2021-27290'} | 2021-10-21T17:38:11Z | 2021-03-19T21:24:36Z | HIGH | null | {'CWE-400'} | {'https://github.com/npm/ssri', 'https://www.npmjs.com/package/ssri', 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://npmjs.com', 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf'} | null | {'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1'} | {'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2'} |
npm | GHSA-43f8-2h32-f4cj | Regular Expression Denial of Service in hosted-git-info | The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity | {'CVE-2021-23362'} | 2022-03-18T20:25:44Z | 2021-05-06T16:10:39Z | MODERATE | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://github.com/npm/hosted-git-info', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/pull/76', 'https://github.com/npm/hosted-git-info/commits/v2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7'} | null | {'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3'} | {'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7'} |
npm | GHSA-67mq-h2r9-rh2m | Prototype pollution in multi-ini | This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448. | {'CVE-2020-28460'} | 2021-04-07T23:23:09Z | 2021-04-13T15:23:41Z | HIGH | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'} | null | {'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'} | {'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'} |
npm | GHSA-8v38-pw62-9cw2 | Incorrect returned href via an '@' sign but no user info and hostname | A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,
`````
parse(\"http://@/127.0.0.1\")
`````
Will return:
`````
{
slashes: true,
protocol: 'http:',
hash: '',
query: '',
pathname: '/127.0.0.1',
auth: '',
host: '',
port: '',
hostname: '',
password: '',
username: '',
origin: 'null',
href: 'http:///127.0.0.1'
}
`````
If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
| {'CVE-2022-0639'} | 2022-03-11T22:48:39Z | 2022-02-18T00:00:33Z | MODERATE | null | {'CWE-639'} | {'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639', 'https://github.com/unshiftio/url-parse'} | null | {'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'} | {'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'} |
npm | GHSA-7wpw-2hjm-89gp | Prototype Pollution in merge | All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge . | {'CVE-2020-28499'} | 2021-05-04T20:20:28Z | 2021-05-04T20:18:47Z | HIGH | null | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://snyk.io/vuln/SNYK-JS-MERGE-1042987', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64', 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'} | null | {'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'} | {'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'} |
npm | GHSA-6956-83fg-5wc5 | Prototype Pollution in set-in | The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049) | {'CVE-2022-25354'} | 2022-03-29T21:05:15Z | 2022-03-18T00:01:11Z | CRITICAL | null | {'CWE-1321'} | {'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://github.com/ahdinosaur/set-in', 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5'} | null | {'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'} | {'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'} |
npm | GHSA-4xcv-9jjx-gfj3 | Denial of Service in mem | Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
## Recommendation
Upgrade to version 4.0.0 or later. | null | 2021-08-17T15:44:45Z | 2019-07-05T21:07:58Z | MODERATE | null | {'CWE-400'} | {'https://www.npmjs.com/advisories/1084', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://snyk.io/vuln/npm:mem:20180117', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'} | null | {'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'} | {'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'} |
npm | GHSA-333x-9vgq-v2j4 | Directory Traversal in geddy | Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
### Proof of Concept
```
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
```
## Recommendation
Update geddy to version >= 13.0.8 | {'CVE-2015-5688'} | 2021-08-31T20:33:50Z | 2017-10-24T18:33:36Z | HIGH | null | {'CWE-22'} | {'https://github.com/geddy/geddy', 'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688', 'https://github.com/geddy/geddy/pull/699', 'https://github.com/geddy/geddy/issues/697', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231', 'https://github.com/geddy/geddy/releases/tag/v13.0.8', 'https://www.npmjs.com/advisories/10'} | null | {'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'} | {'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'} |
npm | GHSA-32x6-qvw6-mxj4 | Forwarding of confidentials headers to third parties in fluture-node | ### Impact
Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing.
### Patches
The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin.
### Workarounds
Use a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2.
### References
- This vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/
- Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
| {'CVE-2022-24719'} | 2022-03-15T18:05:24Z | 2022-03-01T22:14:57Z | LOW | null | {'CWE-359', 'CWE-601', 'CWE-200'} | {'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/psf/requests/pull/4718', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719'} | null | {'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4'} | {'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77'} |
npm | GHSA-6chw-6frg-f759 | Regular Expression Denial of Service in Acorn | Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passes it directly to acorn,
attackers may leverage the vulnerability leading to Denial of Service. | null | 2021-08-23T15:10:32Z | 2020-04-03T21:48:38Z | HIGH | null | {'CWE-400'} | {'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469', 'https://www.npmjs.com/advisories/1488'} | null | {'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'} | {'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'} |
npm | GHSA-3qh4-r86r-grvm | Arbitrary JavaScript Execution in typed-function | Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code.
## Recommendation
Upgrade to version 0.10.6 or later. | {'CVE-2017-1001004'} | 2020-08-31T18:36:57Z | 2020-09-02T18:24:39Z | HIGH | null | {'CWE-94'} | {'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106', 'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004', 'https://www.npmjs.com/advisories/819'} | null | {'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'} | {'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'} |
npm | GHSA-33rv-m2gp-mm2r | Prototype pollution in safe-flat | Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25927'} | 2021-05-20T21:34:56Z | 2021-06-21T17:18:29Z | CRITICAL | null | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927', 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927'} | null | {'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'} | {'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'} |
npm | GHSA-hhfg-6hfc-rvxm | Regular Expression Denial of Service in jsoneditor | JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex. | {'CVE-2021-3822'} | 2022-05-04T03:39:38Z | 2021-09-29T17:15:55Z | MODERATE | null | {'CWE-400', 'CWE-697', 'CWE-1333'} | {'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822', 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e', 'https://github.com/josdejong/jsoneditor'} | null | {'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'} | {'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'} |
npm | GHSA-gjwp-7v3g-99pj | Cross-site Request Forgery (CSRF) in joplin | The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms. | {'CVE-2021-23431'} | 2021-08-25T18:00:40Z | 2021-09-02T17:09:05Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23431', 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e', 'https://github.com/laurent22/joplin', 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'} | null | {'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'} | {'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'} |
npm | GHSA-4r62-v4vq-hr96 | Regular Expression Denial of Service (REDoS) in Marked | ### Impact
_What kind of vulnerability is it? Who is impacted?_
[Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
A Denial of Service attack can affect anyone who runs user generated code through `marked`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
patched in v2.0.0
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
None.
### References
_Are there any links users can visit to find out more?_
https://github.com/markedjs/marked/issues/1927
https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [marked](https://github.com/markedjs/marked/issues) | {'CVE-2021-21306'} | 2021-02-08T21:17:26Z | 2021-02-08T21:17:58Z | MODERATE | null | {'CWE-400'} | {'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd', 'https://www.npmjs.com/package/marked', 'https://github.com/markedjs/marked/issues/1927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306', 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96', 'https://github.com/markedjs/marked/pull/1864'} | null | {'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'} | {'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'} |
npm | GHSA-4p55-xj37-fx7g | Improper Authorization in Strapi | In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes. | {'CVE-2020-27665'} | 2020-10-29T16:25:47Z | 2020-10-29T18:29:31Z | MODERATE | null | {'CWE-276'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27665', 'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616', 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb', 'https://github.com/strapi/strapi/pull/8439'} | null | {'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'} | {'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'} |
npm | GHSA-6c3j-c64m-qhgq | XSS in jQuery as used in Drupal, Backdrop CMS, and other products | jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. | {'CVE-2019-11358'} | 2022-02-08T22:08:08Z | 2019-04-26T16:29:11Z | MODERATE | null | {'CWE-79', 'CWE-1321'} | {'https://seclists.org/bugtraq/2019/Apr/32', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://backdropcms.org/security/backdrop-sa-core-2019-009', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11358', 'https://www.debian.org/security/2019/dsa-4460', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b', 'https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E', 'https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://www.debian.org/security/2019/dsa-4434', 'https://seclists.org/bugtraq/2019/Jun/12', 'https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/', 'https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E', 'https://www.drupal.org/sa-core-2019-006', 'https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://github.com/jquery/jquery/pull/4333', 'https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://snyk.io/vuln/SNYK-JS-JQUERY-174006', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/', 'https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190919-0001/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/', 'https://access.redhat.com/errata/RHSA-2019:2587', 'https://seclists.org/bugtraq/2019/May/18', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/jquery/jquery', 'http://www.securityfocus.com/bid/108023', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/13', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://www.tenable.com/security/tns-2019-08', 'https://www.tenable.com/security/tns-2020-02'} | null | {'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b'} | {'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b'} |
npm | GHSA-2v5f-23xc-v9qr | Cross-site scripting | The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. | {'CVE-2021-3377'} | 2021-03-11T22:49:55Z | 2021-03-11T22:50:39Z | MODERATE | null | {'CWE-79'} | {'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377', 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf'} | null | {'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'} | {'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'} |
npm | GHSA-xc6g-ggrc-qq4r | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`.
## Proof of Concept
```
var sanitizeHtml = require('sanitize-html');
var dirty = '!<textarea></textarea><svg/onload=prompt`xs`></textarea>!';
var clean = sanitizeHtml(dirty, {
allowedTags: [ 'textarea' ]
});
console.log(clean);
// !<textarea></textarea><svg/onload=prompt`xs`></textarea>!
```
## Recommendation
Update to version 1.11.4 or later. | {'CVE-2017-16016'} | 2020-08-31T18:12:43Z | 2018-11-09T17:47:23Z | MODERATE | null | {'CWE-79'} | {'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://nodesecurity.io/advisories/154', 'https://github.com/punkave/sanitize-html/issues/100', 'https://www.npmjs.com/advisories/154', 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r', 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag'} | null | {'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'} | {'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'} |
npm | GHSA-gh78-48h3-frjq | Improper exception handling in Aedes | An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream. | {'CVE-2020-13410'} | 2021-05-05T20:02:28Z | 2021-05-06T18:10:46Z | HIGH | null | {'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13410', 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b', 'https://github.com/moscajs/aedes/pull/493', 'https://payatu.com/advisory/dos-in-aedes-mqtt-broker'} | null | {'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'} | {'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'} |
npm | GHSA-m7rg-8wvq-846v | Prototype pollution | Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25947'} | 2021-06-14T21:47:44Z | 2021-06-07T21:49:14Z | CRITICAL | null | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947', 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'} | null | {'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'} | {'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'} |
npm | GHSA-c53x-wwx2-pg96 | Cross-Site Scripting in @berslucas/liljs | Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
Upgrade to version 1.0.2 or later. | null | 2021-09-28T17:27:43Z | 2020-09-03T17:03:58Z | MODERATE | null | {'CWE-79'} | {'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2'} | null | {'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'} | {'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'} |
npm | GHSA-pm52-wwrw-c282 | Command Injection in wiki-plugin-datalog | Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system.
## Recommendation
Upgrade to version 0.1.6 or later. | null | 2021-08-16T14:32:10Z | 2019-06-13T18:59:06Z | HIGH | null | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926'} | null | {'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'} | {'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'} |
npm | GHSA-w42g-7vfc-xf37 | Introspection in schema validation in Apollo Server | We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions.
### Impact
If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled.
The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory.
> **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary.
In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)).
The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP).
**The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors.
### Affected packages
The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server.
Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`.
> Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form.
### Resolution
The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.)
### Workarounds
Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**:
```js
const server = new ApolloServer({
subscriptions: false,
/* Other options, such as typeDefs, resolvers, schema, etc. */
});
```
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist.
### Credit and appreciation
Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing.
Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing. | null | 2020-08-31T19:02:14Z | 2020-06-05T19:38:14Z | MODERATE | null | null | {'https://www.npmjs.com/advisories/1526', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1530', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1528', 'https://www.npmjs.com/advisories/1527', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1531', 'https://www.npmjs.com/advisories/1533', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1534'} | null | {'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'} | {'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'} |
npm | GHSA-p77h-hv6g-fmfp | Sensitive Data Exposure in ibm_db | Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode.
## Recommendation
Upgrade to version 2.6.0 or later and ensure sensitive information was not logged. | null | 2021-09-29T18:49:03Z | 2020-09-03T20:43:16Z | MODERATE | null | null | {'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762'} | null | {'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'} | {'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'} |
npm | GHSA-hv96-xxx2-5v7w | Downloads Resources over HTTP in nw | Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`.
## Recommendation
Update to version 0.23.6-1 or later. | {'CVE-2016-10588'} | 2021-06-10T23:26:24Z | 2019-02-18T23:51:04Z | HIGH | null | {'CWE-311'} | {'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://nodesecurity.io/advisories/166'} | null | {'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'} | {'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'} |
npm | GHSA-82rf-q3pr-4f6p | Sensitive data exposure in NATS | Preview versions of two NPM packages and one Deno package from the NATS
project contain an information disclosure flaw, leaking options to the
NATS server; for one package, this includes TLS private credentials.
The _connection_ configuration options in these JavaScript-based
implementations were fully serialized and sent to the server in the
client's CONNECT message, immediately after TLS establishment.
The nats.js client supports Mutual TLS and the credentials for the TLS
client key are included in the connection configuration options;
disclosure of the client's TLS private key to the server has been
observed.
Most authentication mechanisms are handled after connection, instead of
as part of connection, so other authentication mechanisms are
unaffected.
For clarity: NATS account NKey authentication is NOT affected.
Neither the nats.ws nor the nats.deno clients support Mutual TLS: the
affected versions listed below are those where the logic flaw is
present. We are including the nats.ws and nats.deno versions out of an
abundance of caution, as library maintainers, but rate as minimal the
likelihood of applications leaking sensitive data.
Affected versions:
Security impact:
* NPM package nats.js:
+ mainline is unaffected
+ beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209
Logic flaw:
* NPM package nats.ws:
+ status: preview
+ flawed from 1.0.0-85, fixed in 1.0.0-111
* Deno repository https://github.com/nats-io/nats.deno
+ status: preview
+ flawed in all git tags prior to fix
+ fixed with git tag v1.0.0-9
Impact:
For deployments using TLS client certificates (for mutual TLS), private
key material for TLS is leaked from the client application to the
server. If the server is untrusted (run by a third party), or if the
client application also disables TLS verification (and so the true
identity of the server is unverifiable) then authentication credentials
are leaked. | {'CVE-2020-26149'} | 2021-10-04T21:25:47Z | 2020-10-08T22:11:32Z | HIGH | null | {'CWE-522'} | {'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.ws', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'} | null | {'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'} | {'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'} |
npm | GHSA-v82v-rq72-phq9 | Server side request forgery in @isomorphic-git/cors-proxy | The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js. | {'CVE-2021-23664'} | 2022-01-31T22:00:02Z | 2022-01-26T22:13:05Z | HIGH | null | {'CWE-918'} | {'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311', 'https://github.com/isomorphic-git/cors-proxy'} | null | {'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'} | {'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'} |
npm | GHSA-mfcp-34xw-p57x | Authentication Bypass in saml2-js | Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely.
## Recommendation
Upgrade to version 2.0.5 or later. | null | 2021-09-29T20:12:42Z | 2020-09-03T21:20:52Z | MODERATE | null | {'CWE-287'} | {'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637', 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/Clever/saml2'} | null | {'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'} | {'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'} |
npm | GHSA-pfxf-wh96-fvjc | Log Forging in generator-jhipster-kotlin | ### Impact
We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.
### Patches
version 1.7.0.
### Workarounds
In `AccountResource.kt` you should change the line
```kotlin
log.warn("Password reset requested for non existing mail '$mail'");
```
to
```kotlin
log.warn("Password reset requested for non existing mail");
```
### References
* https://cwe.mitre.org/data/definitions/117.html
* https://owasp.org/www-community/attacks/Log_Injection
* https://www.baeldung.com/jvm-log-forging
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin) | {'CVE-2020-4072'} | 2021-01-07T23:50:00Z | 2020-06-25T20:02:51Z | MODERATE | null | {'CWE-117'} | {'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072'} | null | {'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'} | {'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'} |
npm | GHSA-2pr6-76vf-7546 | Denial of Service in js-yaml | Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
## Recommendation
Upgrade to version 3.13.0. | null | 2021-08-04T21:32:56Z | 2019-06-05T14:35:29Z | MODERATE | null | {'CWE-400'} | {'https://github.com/nodeca/js-yaml/issues/475', 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'} | null | {'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'} | {'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'} |
npm | GHSA-6394-6h9h-cfjg | Regular Expression Denial of Service | A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern. | null | 2021-02-25T17:23:12Z | 2019-06-07T21:12:35Z | MODERATE | null | {'CWE-400'} | {'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'} | null | {'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'} | {'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'} |
npm | GHSA-2x4q-6jfv-8h9h | Path Traversal in glance | Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`.
## Recommendation
Update to version 3.0.4 or later. | {'CVE-2018-3715'} | 2020-08-31T18:29:00Z | 2018-07-26T14:53:14Z | HIGH | null | {'CWE-22'} | {'https://www.npmjs.com/advisories/590', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106'} | null | {'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'} | {'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'} |
npm | GHSA-63q7-h895-m982 | Cross-site Scripting in dompurify | Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements. | {'CVE-2020-26870'} | 2022-04-28T17:58:51Z | 2020-12-18T22:51:40Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://github.com/cure53/DOMPurify', 'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null | {'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'} | {'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'} |
npm | GHSA-f698-m2v9-5fh3 | Command Injection in opencv | Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.
## Recommendation
Upgrade to version 6.1.0.
| null | 2020-08-31T18:35:50Z | 2019-06-04T20:11:44Z | LOW | null | {'CWE-77'} | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb', 'https://www.npmjs.com/advisories/789'} | null | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'} | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'} |
npm | GHSA-3c48-6pcv-88rm | Macro in MathJax running untrusted Javascript within a web browser | MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later. | {'CVE-2018-1999024'} | 2022-04-26T18:17:56Z | 2018-07-27T17:05:27Z | MODERATE | null | {'CWE-79'} | {'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://github.com/mathjax/MathJax', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'} | null | {'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'} | {'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'} |
npm | GHSA-r9p9-mrjm-926w | Use of a Broken or Risky Cryptographic Algorithm | The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed. | {'CVE-2020-28498'} | 2021-03-08T16:02:43Z | 2021-03-08T16:06:50Z | MODERATE | null | {'CWE-327'} | {'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'} | null | {'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'} | {'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'} |
npm | GHSA-4w46-w44m-3jq3 | Parse Server stores password in plain text | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js.
In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext.
This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage. | {'CVE-2020-26288'} | 2021-01-07T22:32:25Z | 2020-12-28T16:33:17Z | LOW | null | {'CWE-312'} | {'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://www.npmjs.com/advisories/1593', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288'} | null | {'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'} | {'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'} |
npm | GHSA-6cgh-hjpw-q3gq | Utils.readChallengeTx does not verify the server account signature | The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.
Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.
Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction. | {'CVE-2021-32738'} | 2021-07-02T18:25:08Z | 2021-07-02T19:20:33Z | MODERATE | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq'} | null | {'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'} | {'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'} |
npm | GHSA-jgrx-mgxx-jf9v | Regular Expression Denial of Service in tmpl | nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion. | {'CVE-2021-3777'} | 2022-05-04T03:26:16Z | 2021-09-20T20:27:52Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'} | null | {'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'} | {'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'} |
npm | GHSA-w8qv-6jwh-64r5 | Regular Expression Denial of Service in browserslist | The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries. | {'CVE-2021-23364'} | 2021-05-20T22:03:36Z | 2021-05-24T19:52:40Z | MODERATE | null | {'CWE-400'} | {'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/pull/593'} | null | {'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'} | {'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'} |
npm | GHSA-8h84-8j4f-p97q | Injection in bodymen | bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | {'CVE-2019-10792'} | 2021-04-07T20:24:23Z | 2021-04-13T15:24:21Z | MODERATE | null | {'CWE-74'} | {'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'} | null | {'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'} | {'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'} |
npm | GHSA-mxjr-xmcg-fg7w | Arbitrary Code Injection in mobile-icon-resizer | mobile-icon-resizer resizes large images for use as icons for iOS and Android.
mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3.
mobile-icon-resizer takes an options object as an argument to define the resulting icons as such:
```
var options = {
config: './config.js'
}
resize(options, function(err){});
```
config.js would need to be a file on the filesystem and look something like:
```
var config = {
iOS: {
"images": [
/* iOS image definitions are not vulnerable */
]
},
android: {
"images" : [
{
"baseRatio" : "console.log('Executing script as baseRatio property')",
"folder" : "drawable-ldpi"
},
{
"ratio" : "console.log('Executing script as ratio property')",
"folder" : "drawable-mdpi"
},
/* other android image defintiions ... */
]
}
};
exports = module.exports = config;
```
The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed.
## Recommendation
Update to version 0.4.3 or later. | null | 2021-08-17T15:41:58Z | 2019-06-27T17:25:21Z | MODERATE | null | {'CWE-94'} | {'https://www.npmjs.com/advisories/317', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'} | null | {'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'} | {'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'} |
npm | GHSA-g95j-p8f6-pwh4 | Downloads Resources over HTTP in headless-browser-lite | Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`.
## Recommendation
Update to version 2015.4.18-a or later. | {'CVE-2016-10625'} | 2021-06-10T23:42:13Z | 2019-02-18T23:56:58Z | HIGH | null | {'CWE-311'} | {'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://www.npmjs.com/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nodesecurity.io/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4'} | null | {'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'} | {'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'} |
npm | GHSA-2hw7-mxvj-m455 | Path traversal in Node-RED-Dashboard | In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files. | {'CVE-2021-3223'} | 2021-01-27T23:26:39Z | 2021-01-29T18:13:52Z | HIGH | null | {'CWE-22'} | {'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'} | null | {'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'} | {'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'} |
npm | GHSA-j44m-qm6p-hp7m | Arbitrary File Overwrite in tar | Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.
## Recommendation
For tar 4.x, upgrade to version 4.4.2 or later.
For tar 2.x, upgrade to version 2.2.2 or later. | {'CVE-2018-20834'} | 2021-08-03T21:28:27Z | 2019-05-01T18:37:31Z | HIGH | null | {'CWE-59'} | {'https://hackerone.com/reports/344595', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://www.npmjs.com/advisories/803', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779'} | null | {'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'} | {'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'} |
npm | GHSA-hqq7-2q2v-82xq | Cross-site Scripting in sanitize-url | The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function. | {'CVE-2021-23648'} | 2022-03-21T17:20:05Z | 2022-03-17T00:00:24Z | MODERATE | null | {'CWE-79'} | {'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://github.com/braintree/sanitize-url', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882'} | null | {'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'} | {'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'} |
npm | GHSA-82mg-x548-gq3j | LDAP Injection in ldapauth | Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter.
## Recommendation
ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater. | {'CVE-2015-7294'} | 2021-09-23T19:58:02Z | 2020-08-31T22:49:46Z | HIGH | null | {'CWE-90'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://www.npmjs.com/advisories/19', 'https://github.com/vesse/node-ldapauth-fork', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'http://www.openwall.com/lists/oss-security/2015/09/18/4'} | null | {'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'} | {'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'} |
npm | GHSA-3pcq-34w5-p4g2 | forEachSeries and forEachLimit do not limit the number of requests | ### Impact
This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects.
### Patches
The problem has been patched in 1.0.4.
### Workarounds
There is no workaround aside from upgrading to 1.0.4.
| {'CVE-2021-41167'} | 2021-10-27T17:05:58Z | 2021-10-21T17:49:30Z | HIGH | null | {'CWE-400'} | {'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/nicolas-van/modern-async', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'} | null | {'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'} | {'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'} |
npm | GHSA-7p7h-4mm5-852v | Regular Expression Denial of Service in trim-newlines | @rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method. | {'CVE-2021-33623'} | 2022-05-04T03:06:53Z | 2021-06-07T22:10:39Z | HIGH | null | {'CWE-400'} | {'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1', 'https://github.com/sindresorhus/trim-newlines', 'https://www.npmjs.com/package/trim-newlines', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623'} | null | {'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'} | {'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'} |
npm | GHSA-72mh-269x-7mh5 | Improper Certificate Validation in xmlhttprequest-ssl | The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected. | {'CVE-2021-31597'} | 2021-05-20T21:59:29Z | 2021-05-24T19:52:55Z | CRITICAL | null | {'CWE-295'} | {'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt'} | null | {'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'} | {'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'} |
npm | GHSA-6qpr-9mc5-7gch | Command Injection in async-git | The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb') | {'CVE-2020-28490'} | 2021-03-18T22:57:13Z | 2021-04-12T19:50:20Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d', 'https://www.npmjs.com/package/async-git', 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://github.com/omrilotan/async-git/pull/14'} | null | {'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'} | {'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'} |
npm | GHSA-3jfq-g458-7qm9 | Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization | ### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`.
This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite.
### Patches
3.2.2 || 4.4.14 || 5.0.6 || 6.1.1
NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case.
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths.
```js
const path = require('path')
const tar = require('tar')
tar.x({
file: 'archive.tgz',
// either add this function...
onentry: (entry) => {
if (path.isAbsolute(entry.path)) {
entry.path = sanitizeAbsolutePathSomehow(entry.path)
entry.absolute = path.resolve(entry.path)
}
},
// or this one
filter: (file, entry) => {
if (path.isAbsolute(entry.path)) {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves. | {'CVE-2021-32804'} | 2021-08-30T23:14:50Z | 2021-08-03T19:06:36Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/npm/node-tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/tar', 'https://www.npmjs.com/advisories/1770', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'} | null | {'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'} | {'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'} |
npm | GHSA-8fr3-hfg3-gpgp | Open Redirect in node-forge | parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path. | {'CVE-2022-0122'} | 2022-01-13T18:49:59Z | 2022-01-21T23:36:19Z | MODERATE | null | {'CWE-601'} | {'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'} | null | {'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'} | {'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.