ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-4448-rc82-fcr7
Path Traversal in serve-here.js
Versions of serve-here.js prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
{'CVE-2019-5444'}
2021-09-22T18:40:39Z
2021-09-22T18:40:57Z
MODERATE
null
{'CWE-22'}
{'https://hackerone.com/reports/569966', 'https://github.com/ChristoPy/serve-here.js', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5444', 'https://www.npmjs.com/advisories/1019'}
null
npm
GHSA-3q6f-8grx-pr4v
Cross-site scripting in jspdf
"It's possible to use nested script tags in order to bypass the filtering regex."
{'CVE-2020-7691'}
2021-04-09T17:33:02Z
2021-05-11T16:43:52Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7691', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255', 'https://snyk.io/vuln/SNYK-JS-JSPDF-568273', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-575253', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254', 'https://github.com/MrRio/jsPDF/issues/2971', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252', 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'}
null
npm
GHSA-j899-348x-h3rq
Malicious Package in serializes
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:53Z
2020-09-03T19:57:54Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1139'}
null
npm
GHSA-pjmx-9xr3-82qr
ReDoS via long UserAgent header in useragent
Affected versions of `useragent` are vulnerable to regular expression denial of service when an arbitrarily long `User-Agent` header is parsed. ## Proof of Concept ``` var useragent = require('useragent'); var badUserAgent = 'MSIE 0.0'+Array(900000).join('0')+'XBLWP'; var request = 'GET / HTTP/1.1\r\nUser-Agent: ' + badUserAgent + '\r\n\r\n'; console.log(useragent.parse(request)); ``` ## Recommendation Update to version 2.1.13 or later.
{'CVE-2017-16030'}
2020-08-31T18:18:52Z
2018-07-24T19:59:13Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/312', 'https://github.com/advisories/GHSA-pjmx-9xr3-82qr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16030', 'https://nodesecurity.io/advisories/312'}
null
npm
GHSA-9p2w-rmx4-9mw7
Command Injection in strapi
Versions of `strapi` before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the `/admin/plugins/install/` route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server. ## Recommendation Upgrade to version 3.0.0-beta.17.8 or later
null
2021-10-04T19:12:12Z
2020-09-04T16:54:02Z
HIGH
null
{'CWE-77'}
{'https://github.com/strapi/strapi', 'https://www.npmjs.com/advisories/1424'}
null
npm
GHSA-m5p4-7wf9-6w99
Malicious Package in regenrator
All versions of `regenrator` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:29:07Z
2020-09-01T21:10:53Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/685'}
null
npm
GHSA-8jjf-w7j6-323c
Authentication Bypass in samlify
Versions of `samlify` prior to 2.4.0 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider. ## Recommendation Upgrade to version 2.4.0 or later
{'CVE-2017-1000452'}
2021-09-07T19:47:54Z
2018-01-04T21:03:33Z
HIGH
null
{'CWE-91'}
{'https://www.npmjs.com/advisories/969', 'https://www.whitehats.nl/blog/xml-signature-wrapping-samlify', 'https://github.com/tngan/samlify', 'https://github.com/advisories/GHSA-8jjf-w7j6-323c', 'https://hackerone.com/reports/356284', 'https://github.com/tngan/samlify/releases/tag/v2.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000452'}
null
npm
GHSA-49q3-8867-5wmp
Remote Command Execution in reg-keygen-git-hash-plugin
### Impact `reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands. ### Patches Upgrade to version 0.10.16 or later. ### For more information If you have any questions or comments about this advisory: - Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-suit)
{'CVE-2021-32673'}
2021-06-08T15:31:31Z
2021-06-08T18:47:06Z
HIGH
null
{'CWE-94', 'CWE-78'}
{'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87', 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673', 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin', 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp'}
null
npm
GHSA-wh69-wc6q-7888
Command injection in node-dns-sync
dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
{'CVE-2020-11079'}
2021-11-04T17:08:10Z
2020-05-28T18:42:59Z
HIGH
null
{'CWE-77', 'CWE-94'}
{'https://github.com/skoranga/node-dns-sync', 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc', 'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079'}
null
npm
GHSA-884p-74jh-xrg2
Command Injection in tree-kill
Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems. ## Recommendation Upgrade to version 1.2.2 or later.
null
2020-08-31T18:59:05Z
2020-09-04T16:57:20Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1432', 'https://hackerone.com/reports/701183'}
null
npm
GHSA-97m3-w2cp-4xx6
Embedded Malicious Code in node-ipc
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
{'CVE-2022-23812'}
2022-03-25T19:58:47Z
2022-03-16T23:54:32Z
CRITICAL
null
{'CWE-506', 'CWE-94'}
{'https://github.com/RIAEvangelist/node-ipc', 'https://snyk.io/vuln/SNYK-JS-NODEIPC-2426370', 'https://security.netapp.com/advisory/ntap-20220407-0005/', 'https://github.com/RIAEvangelist/node-ipc/issues/236', 'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580', 'https://github.com/RIAEvangelist/node-ipc/issues/233', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812', 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab08352038b2204f0e7633449580/dao/ssl-geospec.js'}
null
npm
GHSA-r9q4-w3fm-wrm2
Cross-Site Scripting in google-closure-library
Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting. ## Recommendation Upgrade to version 20190301.0.0 or later.
null
2021-09-27T21:01:47Z
2020-09-02T21:21:43Z
MODERATE
null
{'CWE-79'}
{'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853', 'https://github.com/google/closure-library', 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519', 'https://www.npmjs.com/advisories/878'}
null
npm
GHSA-hxwm-x553-x359
Arbitrary Command Injection due to Improper Command Sanitization
### Summary There exists a command injection vulnerability in `npmcli/git` versions <2.0.8 which may result in arbitrary shell command execution due to improper argument sanitization when `npmcli/git` is used to execute Git commands based on user controlled input. The impact of this issue is possible Arbitrary Command Injection when `npmcli/git` is run with untrusted (user controlled) Git command arguments. ### Impact Arbitrary Command Injection ### Details `npmcli/git` prior to release `2.0.8` passed user controlled input as arguments to a shell command without properly sanitizing this input. Passing unsanitized input to a shell can lead to arbitrary command injection. For example passing `git+https://github.com/npm/git; echo hello world` would trigger the shell execution of `echo hello world`. This issue was remediated by no longer running `npmcli/git` git commands through an intermediate shell. ### Patches This issue has been patched in release `2.0.8` ### Acknowledgements This report was reported to us by @tyage (Ierae Security) through the [GitHub Bug Bounty Program](https://bounty.github.com).
null
2021-08-02T19:02:32Z
2021-08-05T17:07:39Z
MODERATE
null
{'CWE-78'}
{'https://github.com/npm/git/security/advisories/GHSA-hxwm-x553-x359', 'https://github.com/npm/git/pull/29'}
null
npm
GHSA-c427-hjc3-wrfw
Cross-site scripting in Swagger-UI
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that <style>@import within the JSON data was a functional attack method.
{'CVE-2019-17495'}
2022-02-08T22:07:47Z
2019-10-15T19:27:05Z
HIGH
null
{'CWE-79'}
{'https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379d2e11bf8f4e98c624f@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r3acb7e494cf1aab99b6784b7c5bbddfd0d4f8a484ab534c3a61ef9cf@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/swagger-api/swagger-ui', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17495', 'https://lists.apache.org/thread.html/ref70b940c4f69560d29d6ba792d6c82865e74de3dcad4c92d99b1f8f@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r84b327f7a8b6b28857b906c07a66dd98e1d341191fa8d7816514ef96@%3Ccommits.airflow.apache.org%3E', 'https://github.com/tarantula-team/CSS-injection-in-Swagger-UI'}
null
npm
GHSA-hxhm-3vj9-6cqh
Downloads Resources over HTTP in apk-parser2
Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser2`. ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10632'}
2021-01-08T18:38:52Z
2018-09-18T13:49:31Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10632', 'https://www.npmjs.com/advisories/223', 'https://github.com/advisories/GHSA-hxhm-3vj9-6cqh', 'https://nodesecurity.io/advisories/223'}
null
npm
GHSA-6879-xr95-5gf4
Malicious Package in malicious-do-not-install
All versions of `malicious-do-not-install` contain malicious code. The package copies the contents of `/etc/passwd` and `/etc/shadow` to files in the local `/tmp/` folder. ## Recommendation Remove the package from your environment and rotate affected credentials.
null
2021-09-30T17:16:35Z
2020-09-03T17:20:15Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1040'}
null
npm
GHSA-w8xh-93qh-35vw
Unrestricted Upload of File with Dangerous Type in Payload
An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.
{'CVE-2022-27952'}
2022-04-22T20:28:59Z
2022-04-13T00:00:22Z
CRITICAL
null
{'CWE-434'}
{'https://www.youtube.com/watch?v=6CfhAxA3xdQ', 'https://github.com/payloadcms/payload', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}
null
npm
GHSA-m8fm-mv5w-33pv
Command Injection in psnode
This affects all current versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23375'}
2021-04-19T21:25:43Z
2021-05-06T15:52:59Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23375', 'https://github.com/nrako/psnode/blob/076f623689e4506d3647505daca13b3f482e0c31/lib/index.js%23L59', 'https://www.npmjs.com/package/psnode', 'https://snyk.io/vuln/SNYK-JS-PSNODE-1078543'}
null
npm
GHSA-m8pw-h8qj-rgj9
Downloads Resources over HTTP in ipip-coffee
Affected versions of `ipip-coffee` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10673'}
2021-01-08T18:29:02Z
2019-02-18T23:44:24Z
MODERATE
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-m8pw-h8qj-rgj9', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10673', 'https://nodesecurity.io/advisories/279', 'https://www.npmjs.com/advisories/279'}
null
npm
GHSA-629c-j867-3v45
Malicious Package in bitcoisnj-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:43:02Z
2020-09-04T16:41:04Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1367'}
null
npm
GHSA-rggq-f2wf-m6cp
Malicious Package in jajajejejiji
All versions of `jajajejejiji` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:44:23Z
2020-09-02T18:31:08Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/838'}
null
npm
GHSA-hv4w-jhcj-6wfw
Cross-Site Scripting in snekserve
All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:49:43Z
2020-09-03T20:34:23Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1167'}
null
npm
GHSA-4p24-vmcr-4gqj
XSS vulnerability that affects bootstrap
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041. See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
{'CVE-2016-10735'}
2021-07-26T21:48:49Z
2019-01-17T13:57:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/twbs/bootstrap/issues/20184', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://github.com/twbs/bootstrap/pull/23687', 'https://github.com/advisories/GHSA-4p24-vmcr-4gqj', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/pull/23679', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/pull/26460', 'https://access.redhat.com/errata/RHSA-2019:1456'}
null
npm
GHSA-qmgf-fp85-55gr
Malicious Package in bitcionjs
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:39:27Z
2020-09-04T15:40:34Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1360'}
null
npm
GHSA-j28q-p8ww-cp87
Prototype Pollution in merge-deep2.
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
{'CVE-2021-23700'}
2021-12-15T15:23:03Z
2021-12-16T14:33:09Z
MODERATE
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700', 'https://github.com/luyuan/merge-deep'}
null
npm
GHSA-8549-p68h-m9mc
Malicious Package in buffdr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:57:14Z
2020-09-03T21:46:21Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1237'}
null
npm
GHSA-xm28-fw2x-fqv2
Denial of Service in foreman
All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path. ## Recommendation Upgrade to version 3.0.1.
null
2021-08-04T21:19:17Z
2019-05-31T23:08:14Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/645', 'https://snyk.io/vuln/npm:foreman:20180429', 'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30', 'https://hackerone.com/reports/320586', 'https://nodesecurity.io/advisories/645'}
null
npm
GHSA-w4v7-hwx7-9929
Cross-site Scripting in tempura
This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.
{'CVE-2021-23784'}
2021-11-08T17:49:56Z
2021-11-08T17:50:10Z
MODERATE
null
{'CWE-79'}
{'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b', 'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784', 'https://github.com/lukeed/tempura/releases/tag/v0.4.0', 'https://github.com/lukeed/tempura'}
null
npm
GHSA-7xfq-xh6v-4mrm
Malicious Package in json-serializer
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 2.0.10 of this module is found installed you will want to replace it with a version before or after 2.0.10. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-10-01T13:10:41Z
2020-09-01T20:27:53Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/630'}
null
npm
GHSA-p9pc-299p-vxgp
Prototype Pollution in yargs-parser
Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`. ## Recommendation Upgrade to versions 13.1.2, 15.0.1, 18.1.1 or later.
{'CVE-2020-7608'}
2021-07-28T21:26:24Z
2020-09-04T18:00:54Z
MODERATE
null
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7608', 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2', 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381', 'https://www.npmjs.com/advisories/1500'}
null
npm
GHSA-84fv-prrc-5ggr
Route Validation Bypass in call
Affected versions of `call` do not validate empty parameters, which may result in a bypass of route validation rules. ## Proof of Concept Routing Scheme: ``` /api/{param}/{param2}/details ``` Triggering Request Path: ``` /api/// ``` ## Recommendation Update to version 3.0.2 or later.
{'CVE-2016-10543'}
2020-08-31T18:11:30Z
2019-02-18T23:40:04Z
MODERATE
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-84fv-prrc-5ggr', 'https://nodesecurity.io/advisories/121', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10543', 'https://github.com/hapijs/hapi/issues/3228', 'https://www.npmjs.com/advisories/121'}
null
npm
GHSA-gpvr-g6gh-9mc2
No Charset in Content-Type Header in express
Vulnerable versions of express do not specify a charset field in the content-type header while displaying 400 level response messages. The lack of enforcing user's browser to set correct charset, could be leveraged by an attacker to perform a cross-site scripting attack, using non-standard encodings, like UTF-7. ## Recommendation For express 3.x, update express to version 3.11 or later. For express 4.x, update express to version 4.5 or later.
{'CVE-2014-6393'}
2021-08-02T22:35:12Z
2018-10-23T17:22:54Z
MODERATE
null
{'CWE-79'}
{'https://nodesecurity.io/advisories/express-no-charset-in-content-type-header', 'https://github.com/advisories/GHSA-gpvr-g6gh-9mc2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1203190', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6393', 'https://www.npmjs.com/advisories/8'}
null
npm
GHSA-6677-83pp-f862
Cross-Site Scripting in @nuxt/devalue
Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys. ## Recommendation Upgrade to version 1.2.3 or later.
{'CVE-2019-13506'}
2021-08-17T18:13:29Z
2019-07-16T00:42:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/nuxt/nuxt.js/compare/c0776eb...8d14cd4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13506', 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2', 'https://github.com/nuxt/devalue/pull/8', 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be', 'https://www.npmjs.com/advisories/814', 'https://github.com/Rich-Harris/devalue/issues/19', 'https://github.com/nuxt/devalue/releases/tag/v1.2.3'}
null
npm
GHSA-m4fq-xh7w-jhfm
Malicious Package in crytpo-js
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:00:29Z
2020-09-03T19:39:46Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1391'}
null
npm
GHSA-vjfr-p6hp-jqqw
Command Injection in ungit
Versions of `ungit` prior to 0.9.0 are affected by a command injection vulnerability in the `url` parameter. ## Recommendation Update version 0.9.0 or later.
{'CVE-2015-4130'}
2021-09-23T21:01:14Z
2020-08-31T23:00:10Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-4130', 'https://www.npmjs.com/advisories/40', 'https://github.com/FredrikNoren/ungit', 'https://github.com/FredrikNoren/ungit/issues/486'}
null
npm
GHSA-xfrc-7mj2-5xh9
Undefined Behavior in zencashjs
Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horizen there exists the possibility of a clash of address prefixes for testnet P2PKH and mainnet P2SH addresses, testnet P2PKH addresses start with “zt” while a subset of mainnet P2SH addresses can also start with “zt”. The package interprets transactions sent to a “zt” P2SH address on mainnet as P2PKH transactions erroneously. Any funds sent to a mainnet P2SH multisignature address starting with “zt” will be sent to the wrong address and be lost. ## Recommendation Upgrade to version 1.2.0 or later.
null
2020-08-31T18:44:53Z
2020-09-03T17:14:51Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1035', 'https://github.com/ZencashOfficial/zencashjs/commit/db01bd94b9f8a956d7835e934500eaa643f8bd13#diff-42d8d2088a96641b563b25ad908b0c0fR146'}
null
npm
GHSA-wgvj-6v57-wjh3
Malicious Package in bowee
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:37:06Z
2020-09-02T21:30:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/897'}
null
npm
GHSA-mw35-24gh-f82w
High severity vulnerability that affects keycloak-connect and keycloak-js
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
{'CVE-2017-7474'}
2020-06-16T21:47:26Z
2017-11-15T20:41:51Z
HIGH
null
{'CWE-253'}
{'http://rhn.redhat.com/errata/RHSA-2017-1203.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474', 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}
null
npm
GHSA-5p98-wpc9-g498
Server-Side Request Forgery in html-pdf-chrome
All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as `<iframe src="http://localhost" height="800px" width="800px"></iframe>`. This allows attackers to access resources through HTTP that are accessible to the server, including private resources in the hosting environment. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:12:12Z
2020-09-04T15:21:32Z
HIGH
null
{'CWE-918'}
{'https://github.com/westy92/html-pdf-chrome', 'https://github.com/westy92/html-pdf-chrome/issues/249', 'https://www.npmjs.com/advisories/1339'}
null
npm
GHSA-m2r3-8492-vx59
Denial of Service (DoS) in mongo-express
All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.
{'CVE-2021-23372'}
2021-10-06T15:13:57Z
2021-10-06T17:47:46Z
MODERATE
null
{'CWE-754'}
{'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085403', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23372', 'https://github.com/mongo-express/mongo-express'}
null
npm
GHSA-fxwf-4rqh-v8g3
Insecure defaults due to CORS misconfiguration in socket.io
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
{'CVE-2020-28481'}
2021-01-20T05:39:24Z
2021-01-20T21:22:37Z
MODERATE
null
{'CWE-453', 'CWE-346'}
{'https://snyk.io/vuln/SNYK-JS-SOCKETIO-1024859', 'https://github.com/socketio/socket.io/commit/f78a575f66ab693c3ea96ea88429ddb1a44c86c7', 'https://github.com/socketio/socket.io/issues/3671', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28481', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1056357', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1056358'}
null
npm
GHSA-jff2-qjw8-5476
Command Injection Vulnerability in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
{'CVE-2021-21388'}
2021-04-29T17:22:56Z
2021-04-06T17:30:14Z
HIGH
null
{'CWE-77', 'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21388', 'https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476'}
null
npm
GHSA-5955-9wpr-37jh
Arbitrary File Creation/Overwrite on Windows via insufficient relative path sanitization
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain `..` path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as `C:some\path`. If the drive letter does not match the extraction target, for example `D:\extraction\dir`, then the result of `path.resolve(extractionDirectory, entryPath)` would resolve against the current working directory on the `C:` drive, rather than the extraction target directory. Additionally, a `..` portion of the path could occur immediately after the drive letter, such as `C:../foo`, and was not properly sanitized by the logic that checked for `..` within the normalized and split portions of the path. This only affects users of `node-tar` on Windows systems. ### Patches 4.4.18 || 5.0.10 || 6.1.9 ### Workarounds There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves. ### Fix The fixed versions strip path roots from all paths prior to being resolved against the extraction target folder, even if such paths are not "absolute". Additionally, a path starting with a drive letter and then two dots, like `c:../`, would bypass the check for `..` path portions. This is checked properly in the patched versions. Finally, a defense in depth check is added, such that if the `entry.absolute` is outside of the extraction taret, and we are not in preservePaths:true mode, a warning is raised on that entry, and it is skipped. Currently, it is believed that this check is redundant, but it did catch some oversights in development.
{'CVE-2021-37713'}
2021-08-31T16:02:32Z
2021-08-31T16:05:05Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37713', 'https://github.com/npm/node-tar'}
null
npm
GHSA-98f7-p5rc-jx67
Cross-Site Scripting in materialize-css
All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `tooltip` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-11002'}
2021-09-07T20:45:52Z
2019-04-09T19:44:40Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174148', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11002', 'https://github.com/advisories/GHSA-98f7-p5rc-jx67', 'https://github.com/Dogfalo/materialize/issues/6286', 'https://github.com/Dogfalo/materialize', 'https://www.npmjs.com/advisories/818'}
null
npm
GHSA-cr6c-85fh-cqpg
Downloads Resources over HTTP in haxeshim
Affected versions of `haxeshim` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxeshim`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10692'}
2021-09-09T20:49:32Z
2018-07-31T22:27:04Z
HIGH
null
null
{'https://nodesecurity.io/advisories/300', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10692', 'https://github.com/advisories/GHSA-cr6c-85fh-cqpg', 'https://www.npmjs.com/advisories/300'}
null
npm
GHSA-qh2h-chj9-jffq
Command Injection in growl
Affected versions of `growl` do not properly sanitize input prior to passing it into a shell command, allowing for arbitrary command execution. ## Recommendation Update to version 1.10.2 or later.
{'CVE-2017-16042'}
2020-08-31T18:12:25Z
2018-06-08T12:43:43Z
CRITICAL
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/146', 'https://github.com/tj/node-growl/pull/61', 'https://nodesecurity.io/advisories/146', 'https://github.com/tj/node-growl/issues/60', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16042', 'https://github.com/advisories/GHSA-qh2h-chj9-jffq'}
null
npm
GHSA-446w-rrm4-r47f
Exposure of home directory through shescape on Unix with Bash
### Impact The issue allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. ```javascript const cp = require("child_process"); const shescape = require("shescape"); const payload = "home_directory=~"; const options = { interpolation: true }; console.log(cp.execSync(`echo ${shescape.escape(payload, options)}`)); // home_directory=/home/user ``` Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. ### Patches The issue was patched in `v1.5.1`. ### Workarounds Manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`. ### References See GitHub issue https://github.com/ericcornelissen/shescape/issues/169.
{'CVE-2022-24725'}
2022-03-18T20:06:07Z
2022-03-03T19:26:11Z
MODERATE
null
{'CWE-200'}
{'https://github.com/ericcornelissen/shescape', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24725', 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f', 'https://github.com/ericcornelissen/shescape/issues/169', 'https://github.com/ericcornelissen/shescape/pull/170'}
null
npm
GHSA-jrj9-5qp6-2v8q
Machine-In-The-Middle in airtable
Affected versions of `airtable` are vulnerable to Machine-In-The-Middle. The package has SSL certificate validation disabled by default unintentionally. This may allow attackers in a privileged network position to decrypt intercepted traffic. ## Recommendation Upgrade to version 0.7.2 or later.
null
2020-08-31T18:54:28Z
2020-09-03T23:22:19Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1305'}
null
npm
GHSA-552w-rqg8-gxxm
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
{'CVE-2013-7453'}
2021-09-01T19:26:29Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-552w-rqg8-gxxm', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7453', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nodesecurity.io/advisories/41'}
null
npm
GHSA-5726-g6r9-5f22
Potential for Script Injection in syntax-error
Versions of `syntax-error` prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified. ## Recommendation Update to version 1.1.1 or later.
{'CVE-2014-7192'}
2022-02-25T19:54:10Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-94'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/96728', 'https://github.com/substack/node-syntax-error', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7192', 'https://nodesecurity.io/advisories/syntax-error-potential-script-injection', 'https://www.npmjs.com/advisories/37', 'https://github.com/substack/node-browserify/blob/master/changelog.markdown#421', 'https://github.com/advisories/GHSA-5726-g6r9-5f22', 'http://www-01.ibm.com/support/docview.wss?uid=swg21690815', 'https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309'}
null
npm
GHSA-9298-m7jf-55h2
Malicious Package in bitconid-rpc
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:43:38Z
2020-09-04T16:42:08Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1369'}
null
npm
GHSA-pxqp-mv67-g528
Malicious Package in bqffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:53:05Z
2020-09-03T21:38:34Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1230'}
null
npm
GHSA-5jg5-w395-9684
Directory Traversal in ltt
Affected versions of `ltt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16212'}
2020-08-31T18:22:31Z
2018-07-23T20:39:59Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt', 'https://www.npmjs.com/advisories/422', 'https://github.com/advisories/GHSA-5jg5-w395-9684', 'https://nodesecurity.io/advisories/422', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16212'}
null
npm
GHSA-x5r6-x823-9848
Arbitrary Code Execution in json-ptr
npm `json-ptr` before 2.0.0 has an arbitrary code execution vulnerability. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.
{'CVE-2020-7766'}
2021-05-26T19:58:35Z
2021-05-10T19:15:43Z
HIGH
null
{'CWE-74', 'CWE-400'}
{'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174', 'https://github.com/418sec/json-ptr/pull/3', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396', 'https://www.huntr.dev/bounties/2-npm-json-ptr/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7766', 'https://www.npmjs.com/package/json-ptr'}
null
npm
GHSA-h6ch-v84p-w6p9
Regular Expression Denial of Service (ReDoS)
A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
null
2021-02-24T19:27:02Z
2019-06-13T18:58:54Z
HIGH
null
{'CWE-400'}
{'https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0', 'https://snyk.io/vuln/npm:diff:20180305', 'https://www.npmjs.com/advisories/1631', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2018-0590', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552148'}
null
npm
GHSA-fwr7-v2mv-hh25
Prototype Pollution in async
A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method.
{'CVE-2021-43138'}
2022-04-14T17:42:10Z
2022-04-07T00:00:17Z
HIGH
null
{'CWE-1321'}
{'https://github.com/caolan/async/blob/master/lib/internal/iterator.js', 'https://jsfiddle.net/oz5twjd9/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43138', 'https://github.com/caolan/async/blob/v2.6.4/CHANGELOG.md#v264', 'https://github.com/caolan/async', 'https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2', 'https://github.com/caolan/async/blob/master/lib/mapValuesLimit.js', 'https://github.com/caolan/async/pull/1828', 'https://github.com/caolan/async/commit/e1ecdbf79264f9ab488c7799f4c76996d5dca66d'}
null
npm
GHSA-4vfj-c2xf-8r48
Directory Traversal in looppake
Affected versions of `looppake` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16169'}
2020-08-31T18:22:07Z
2018-07-23T20:45:20Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/412', 'https://www.npmjs.com/advisories/412', 'https://github.com/advisories/GHSA-4vfj-c2xf-8r48', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16169', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/looppake'}
null
npm
GHSA-f7vx-j8mp-3h2x
Insufficient Verification of Data Authenticity in Eclipse Theia
In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is "Mini-Browser", published as "@theia/mini-browser" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without restrictions on the requesters origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.
{'CVE-2019-17636'}
2021-03-29T22:11:05Z
2021-04-13T15:18:01Z
HIGH
null
{'CWE-345'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17636', 'https://github.com/eclipse-theia/theia/pull/7205', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747', 'https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf'}
null
npm
GHSA-cfhh-xgwq-5r67
Sudden swap of user auth tokens in Volto
### Impact Due to the usage of an outdated version of the react-cookie library, under the circumstances of given a server high load, it is possible that a user could get his/her auth cookie replaced with the auth cookie from another user, effectively giving him full access to the other users account and privileges. A proven exploit for this vulnerability does not exist, since the exact requisites for it to happen have not been fully clarified, and the attempts to reproduce it under testing conditions have been unsuccessful, but it still can happen randomly and unintentionally in the wild. ### Patches The patch and fix is present in Volto 15.0.0-alpha.0 (or later). See PR: https://github.com/plone/volto/pull/3051. We recommend upgrading to the final release of Volto 15 as soon as possible if running an affected version. See the upgrade guide https://6-dev-docs.plone.org/volto/upgrade-guide/index.html#upgrading-to-volto-15-x-x ### Workarounds It is possible to create a fix by manually upgrading the react-cookie package to 4.1.1 and then overriding all Volto components that use this library as in https://github.com/plone/volto/pull/3051. As this is substantial work, an update to the Volto 15 is recommended. The upgrade steps for going from Volto 14 to Volto 15 are quite easy and do not involve any complexity. Please take a look at the upgrade guide: https://6-dev-docs.plone.org/volto/upgrade-guide/index.html#upgrading-to-volto-15-x-x ### For more information If you have any questions or comments about this advisory: * Open an issue in [volto](https://github.com/plone/volto/issues) * Email us at [security@plone.org](mailto:security@plone.org)
{'CVE-2022-24740'}
2022-03-28T22:30:25Z
2022-03-14T22:15:19Z
MODERATE
null
{'CWE-287'}
{'https://github.com/plone/volto/pull/3051', 'https://github.com/plone/volto', 'https://github.com/plone/volto/security/advisories/GHSA-cfhh-xgwq-5r67', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24740'}
null
npm
GHSA-w7jx-j77m-wp65
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs. This impacts all users who are using TinyMCE 5.5.1 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.6.0 by improved URL sanitization logic. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.6.0 or higher - Manually sanitize `iframe`, `object` and `embed` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter). - Disable `iframe`, `object`, and `embed` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting. #### Example: Sanitizing using a node filter ```js editor.parser.addNodeFilter('iframe,object,embed', function(nodes) { nodes.forEach(function(node) { if (node.attributes) { node.attributes.forEach(function(attr) { var name = attr.name; var value = attr.value; // Sanitize the attribute value here or remove it entirely var sanitizedValue = ...; node.attr(name, santizedValue); }); } }); }); ``` #### Example: Using invalid_elements ```js invalid_elements: 'iframe,object,embed' ``` ### Acknowledgements Tiny Technologies would like to thank Aaron Bishop at SecurityMetrics for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2021-01-06T19:27:46Z
2021-01-06T19:27:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-w7jx-j77m-wp65', 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes', 'https://www.npmjs.com/package/tinymce'}
null
npm
GHSA-rrqm-p222-8ph2
Prototype Pollution in Dynamoose
### Impact In Dynamoose versions 2.0.0-2.6.0 there was a prototype pollution vulnerability in the internal utility method [`lib/utils/object/set.ts`](https://github.com/dynamoose/dynamoose/blob/master/lib/utils/object/set.ts). This method is used throughout the codebase for various operations throughout Dynamoose. We have not seen any evidence of this vulnerability being exploited. We do not believe this issue impacts v1.x.x since this method was added as part of the v2 rewrite. This vulnerability also impacts v2.x.x beta/alpha versions. ### Patches v2.7.0 includes a patch for this vulnerability. ### Workarounds We are unaware of any workarounds to patch this vulnerability other than upgrading to v2.7.0 or greater. ### References - Patch commit hash: 324c62b4709204955931a187362f8999805b1d8e ### For more information If you have any questions or comments about this advisory: * [Contact me](https://charlie.fish/contact) * [Read our Security Policy](https://github.com/dynamoose/dynamoose/blob/master/SECURITY.md) ### Credit - GitHub CodeQL Code Scanning
{'CVE-2021-21304'}
2021-08-23T22:30:48Z
2021-02-08T17:44:01Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21304', 'https://github.com/dynamoose/dynamoose/releases/tag/v2.7.0', 'https://github.com/dynamoose/dynamoose', 'https://github.com/dynamoose/dynamoose/security/advisories/GHSA-rrqm-p222-8ph2', 'https://www.npmjs.com/package/dynamoose', 'https://github.com/dynamoose/dynamoose/commit/324c62b4709204955931a187362f8999805b1d8e'}
null
npm
GHSA-vv7g-pjw9-4qj9
Malicious Package in scrytsy
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:24:14Z
2020-09-03T17:03:56Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1408'}
null
npm
GHSA-rmmc-8cqj-hfp3
Authentication Bypass in otpauth
Versions of `otpauth` prior to 3.2.8 are vulnerable to Authentication Bypass. The package's `totp.validate()` function may return positive values for single digit tokens even if they are invalid. This may allow attackers to bypass the OTP authentication by providing single digit tokens. ## Recommendation Upgrade to version 3.2.8 or later.
null
2020-08-31T18:46:51Z
2020-09-03T18:24:43Z
HIGH
null
{'CWE-287'}
{'https://www.npmjs.com/advisories/1087'}
null
npm
GHSA-w7fj-336r-vw49
Cross-Site Scripting vulnerability in @backstage/plugin-auth-backend
### Impact This vulnerability allows a malicious actor to trick another user into visiting a vulnerable URL that executes an XSS attack. This attack can potentially allow the attacker to exfiltrate access tokens or other secrets from the user's browser. The default CSP does prevent this attack, but it is expected that some deployments have these policies disabled due to incompatibilities. ### Patches This is vulnerability is patched in version `0.4.9` of `@backstage/plugin-auth-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-43776'}
2021-12-01T14:35:30Z
2021-12-01T18:29:21Z
HIGH
null
{'CWE-79'}
{'https://github.com/backstage/backstage/security/advisories/GHSA-w7fj-336r-vw49', 'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/tree/master/plugins/auth-backend', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43776'}
null
npm
GHSA-jqh7-w5pr-cr56
Cross-site scripting in koa-shopify-auth
A cross-site scripting vulnerability exists in koa-shopify-auth v3.1.61-v3.1.62 that allows an attacker to inject JS payloads into the `shop` parameter on the `/shopify/auth/enable_cookies` endpoint.
{'CVE-2020-8176'}
2021-05-11T18:29:58Z
2021-05-17T21:01:22Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Shopify/quilt/pull/1455', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8176', 'https://hackerone.com/reports/881409'}
null
npm
GHSA-m7p2-ghfh-pjvx
Vulnerability in crunch function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36380'}
2022-05-04T03:44:50Z
2021-11-01T19:18:51Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36380', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/shenzhim/aaptjs'}
null
npm
GHSA-5mrr-rgp6-x4gr
Command Injection in marsdb
All versions of `marsdb` are vulnerable to Command Injection. In the `DocumentMatcher` class, selectors on `$where` clauses are passed to a Function constructor unsanitized. This allows attackers to run arbitrary commands in the system when the function is executed. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:48:01Z
2020-09-03T19:39:05Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/bkimminich/juice-shop/issues/1173', 'https://www.npmjs.com/advisories/1122'}
null
npm
GHSA-f9mq-jph6-9mhm
Arbitrary file read via window-open IPC in Electron
### Impact The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open. ### Workarounds Ensure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `options` is not something you expect. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-4075'}
2021-01-07T23:48:36Z
2020-07-07T00:01:13Z
MODERATE
null
{'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4075', 'https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
null
npm
GHSA-2fqv-h3r5-m4vf
Cross Site Scripting (XSS) in plotly.js
Affected versions of `plotly.js` are vulnerable to cross-site scripting if an attacker can convince a user to visit a malicious plot on a site using this package. ## Recommendation Update to 1.16.0 or later.
{'CVE-2017-1000006'}
2021-08-30T21:12:50Z
2017-10-24T18:33:35Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/145', 'https://acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/', 'http://help.plot.ly/security-advisories/2016-08-08-plotlyjs-xss-advisory/', 'https://github.com/advisories/GHSA-2fqv-h3r5-m4vf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000006'}
null
npm
GHSA-jpg7-6c9f-7q54
Directory Traversal in datachannel-client
Affected versions of `datachannel-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16121'}
2020-08-31T18:21:31Z
2018-07-23T23:15:21Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-jpg7-6c9f-7q54', 'https://nodesecurity.io/advisories/391', 'https://www.npmjs.com/advisories/391', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/datachannel-client', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16121'}
null
npm
GHSA-5j3g-jfq3-7jwx
Arbitrary JavaScript Execution in bassmaster
A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval. ## Recommendation Update to bassmaster version 1.5.2 or greater.
{'CVE-2014-7205'}
2021-09-01T22:16:02Z
2017-10-24T18:33:36Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7205', 'https://nodesecurity.io/advisories/bassmaster_js_injection', 'https://www.npmjs.com/advisories/1', 'https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4', 'https://github.com/hapijs/bassmaster', 'https://www.exploit-db.com/exploits/40689/', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96730', 'http://www.securityfocus.com/bid/70180', 'http://www.openwall.com/lists/oss-security/2014/09/30/10', 'https://github.com/advisories/GHSA-5j3g-jfq3-7jwx'}
null
npm
GHSA-gjm5-83cw-p3p2
Prototype Pollution in extend2
The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge.
{'CVE-2021-23568'}
2022-01-11T18:11:48Z
2022-01-12T22:59:13Z
HIGH
null
{'CWE-1321'}
{'https://github.com/eggjs/extend2/pull/2', 'https://snyk.io/vuln/SNYK-JS-EXTEND2-2320315', 'https://github.com/eggjs/extend2', 'https://github.com/eggjs/extend2/commit/aa332a59116c8398976434b57ea477c6823054f8', 'https://github.com/eggjs/extend2/blob/master/index.js%23L50-L60', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23568'}
null
npm
GHSA-mg3m-f475-28hv
Path Traversal in @backstage/plugin-scaffolder-backend
### Impact A malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance. This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents. ### Patches This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`. ### Workarounds This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-43783'}
2021-11-29T20:22:25Z
2021-12-01T18:28:51Z
HIGH
null
{'CWE-22'}
{'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/security/advisories/GHSA-mg3m-f475-28hv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43783', 'https://github.com/backstage/backstage/commit/f9352ab606367cd9efc6ff048915c70ed3013b7f'}
null
npm
GHSA-hfq9-rfpv-j8r8
Command Injection in pidusage
Affected versions of `pidusage` pass unsanitized input to `child_process.exec()`, resulting in arbitrary code execution in the `ps` method. This package is vulnerable to this PoC on Darwin, SunOS, FreeBSD, and AIX. Windows and Linux are not vulnerable. ## Proof of Concept ``` var pid = require('pidusage'); pid.stat('1 && /usr/local/bin/python'); ``` ## Recommendation Update to version 1.1.5 or later.
{'CVE-2017-16034'}
2021-09-23T21:42:30Z
2020-09-01T16:49:19Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/356', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16034'}
null
npm
GHSA-7j52-6fjp-58gr
Inconsistent storage layout for ERC2771ContextUpgradeable
### Impact The storage layout of the ERC2771ContextUpgradeable is not constant between versions. - versions `4.0.0`, `4.1.0` and `4.2.0`, the contract has a length of 51 slots. - since `4.3.0`, the contract has a length of 50 slots - future versions will continue using 50 slots. This difference in layout could result in breaking upgrades if someone upgrades from an affected version to a non-affected version. It is thus recommended to be extremely careful when upgrading from a contract that uses ERC2771ContextUpgradeable `<4.3.0` to a newer version that uses `>=4.3.0`. We've assessed the instances of this contract found on chain (with publicly verified source code) and notified the corresponding teams of the risk that an upgrade could cause. ### Workarounds Potentially breaking upgrades would be caught by the OpenZeppelin Upgrades Plugins for Hardhat and Truffle. It is recommended to use this tooling for all your upgrades. If you need to upgrade to a newer version of the Upgradeable Contracts library, we recommend copying the previous implementation ERC2771ContextUpgradeable (available in the `release-4.2` branch) and packaging it with your code. ### Reference https://github.com/OpenZeppelin/openzeppelin-transpiler/pull/86 ### For more information If you have any questions, comments, or need assistance regarding this advisory, email us at [security@openzeppelin.com](mailto:security@openzeppelin.com). To submit security reports please use [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
null
2022-03-14T23:22:27Z
2022-03-14T23:22:27Z
LOW
null
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-7j52-6fjp-58gr', 'https://github.com/OpenZeppelin/openzeppelin-transpiler/pull/86'}
null
npm
GHSA-vxwf-pprx-wc25
Directory Traversal in citypredict.whauwiller
Affected versions of `citypredict.whauwiller` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16104'}
2020-08-31T18:20:41Z
2018-07-24T00:10:03Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/370', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16104', 'https://github.com/advisories/GHSA-vxwf-pprx-wc25', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/citypredict.whauwiller', 'https://www.npmjs.com/advisories/370'}
null
npm
GHSA-339j-hqgx-qrrx
Prototype Pollution
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.
{'CVE-2021-23395'}
2021-06-16T20:12:32Z
2021-06-21T17:13:06Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-NEDB-1305279', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23395'}
null
npm
GHSA-7hvm-29rf-2gf2
Downloads Resources over HTTP in node-air-sdk
Affected versions of `node-air-sdk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-air-sdk`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10647'}
2021-01-14T15:57:55Z
2020-09-01T16:08:58Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10647', 'https://www.npmjs.com/advisories/250', 'https://nodesecurity.io/advisories/250'}
null
npm
GHSA-2hqf-qqmq-pgpp
Malicious Package in commander-js
All versions of `commander-js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads an arbitrary file and executes its contents as a post-install script. ## Recommendation This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
null
2021-10-01T13:30:38Z
2020-09-02T15:48:16Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/763'}
null
npm
GHSA-cvxm-f295-x957
Prototype Pollution in merge-recursive
All versions of `merge-recursive` are vulnerable to Prototype Pollution. When malicious user input is merged with another object it allows the attacker to modify the prototype of Object via `__proto__` causing the addition or modification of an existing property. Proof of concept: ``` var merge = require('merge-recursive').recursive; var malicious_payload = '{"__proto__":{"oops":"It works !"}}'; var a = {}; console.log("Before : " + a.oops); merge({}, JSON.parse(malicious_payload)); console.log("After : " + a.oops); ``` ## Recommendation There is currently no fix available.
{'CVE-2018-3751'}
2021-09-09T20:57:04Z
2018-09-18T13:46:06Z
CRITICAL
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/715', 'https://github.com/advisories/GHSA-cvxm-f295-x957', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3751', 'https://hackerone.com/reports/311337'}
null
npm
GHSA-v5hp-35hw-cw5x
XSS in client rendered block templates in rendr
Affected versions of `rendr` are vulnerable to cross-site scripting when client side rendering is done inside a `_block`. Server side rendering is not affected and is properly escaped. ## Recommendation Update to version 1.1.4 or later.
{'CVE-2016-1000230'}
2021-09-23T21:32:40Z
2020-09-01T15:33:10Z
HIGH
null
{'CWE-79'}
{'https://github.com/rendrjs/rendr/pull/513', 'https://github.com/rendrjs/rendr-handlebars/pull/61', 'https://github.com/rendrjs/rendr-handlebars', 'https://www.npmjs.com/advisories/128', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000230'}
null
npm
GHSA-6v7p-j23v-4xmw
Downloads Resources over HTTP in robot-js
Affected versions of `robot-js` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `robot-js`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10608'}
2021-01-08T21:06:12Z
2019-02-18T23:48:03Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10608', 'https://github.com/advisories/GHSA-6v7p-j23v-4xmw', 'https://www.npmjs.com/advisories/201', 'https://nodesecurity.io/advisories/201'}
null
npm
GHSA-q5wr-fvpq-p67g
Integer Overflow in png-img
An integer overflow in the PngImg::InitStorage_() function of png-img before 3.1.0 leads to an under-allocation of heap memory and subsequently an exploitable heap-based buffer overflow when loading a crafted PNG file.
{'CVE-2020-28248'}
2021-07-26T18:09:11Z
2021-12-10T17:23:30Z
HIGH
null
{'CWE-190', 'CWE-787'}
{'https://github.com/gemini-testing/png-img', 'https://securitylab.github.com/advisories/GHSL-2020-142-gemini-png-img', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28248', 'https://github.com/gemini-testing/png-img/commit/14ac462a32ca4b3b78f56502ac976d5b0222ce3d', 'https://github.com/gemini-testing/png-img/compare/v3.0.0...v3.1.0'}
null
npm
GHSA-vhhw-xjvf-wprr
Command Injection in @graphql-tools/git-loader
This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection.
{'CVE-2021-23326'}
2021-01-22T18:52:27Z
2021-01-29T18:13:14Z
MODERATE
null
{'CWE-77'}
{'https://github.com/ardatan/graphql-tools/commit/6a966beee8ca8b2f4adfe93318b96e4a5c501eac', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23326', 'https://github.com/ardatan/graphql-tools/pull/2470', 'https://advisory.checkmarx.net/advisory/CX-2020-4300', 'https://github.com/ardatan/graphql-tools/releases/tag/%40graphql-tools%2Fgit-loader%406.2.6', 'https://snyk.io/vuln/SNYK-JS-GRAPHQLTOOLSGITLOADER-1062543'}
null
npm
GHSA-6gp3-h3jj-prx4
Prototype pollution in class-transformer
class-transformer through 0.2.3 is vulnerable to Prototype Pollution. The 'classToPlainFromExist' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7637'}
2022-04-28T17:58:13Z
2020-04-07T15:47:40Z
MODERATE
null
{'CWE-915'}
{'https://github.com/typestack/class-transformer/blob/a650d9f490573443f62508bc063b857bcd5e2525/src/ClassTransformer.ts#L29-L31,', 'https://github.com/typestack/class-transformer', 'https://snyk.io/vuln/SNYK-JS-CLASSTRANSFORMER-564431', 'https://github.com/typestack/class-transformer/commit/8f04eb9db02de708f1a20f6f2d2bb309b2fed01e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7637'}
null
npm
GHSA-mp55-2274-4pj8
Malicious Package in buffer-xgr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:03:38Z
2020-09-03T21:54:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1244'}
null
npm
GHSA-7f59-x49p-v8mq
Cross-Site Scripting in swagger-ui
Affected versions of `swagger-ui` are vulnerable to cross-site scripting in both the `consumes` and `produces` parameters of the swagger JSON document for a given API. Additionally, `swagger-ui` allows users to load arbitrary swagger JSON documents via the query string parameter `url`, allowing an attacker to exploit this attack against any user that the attacker can convince to visit a crafted link. ## Proof of Concept ``` http://<USER_HOSTNAME>/swagger-ui/index.html?url=http://<MALICIOUS_HOSTNAME>/malicious-swagger-file.json ```` ## Recommendation Update to version 2.2.1 or later.
{'CVE-2016-1000226'}
2021-09-23T21:29:50Z
2020-09-01T15:28:45Z
CRITICAL
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/123', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000226', 'https://github.com/swagger-api/swagger-ui/issues/1866', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/pull/1867'}
null
npm
GHSA-j5c2-hm46-wp5c
Privilege escalation: all users can access Admin-level API keys
### Impact An error in the implementation of the limits service in 4.0.0 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability. Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.9.4. Immediate action should be taken to secure your site - see patches & workarounds below. It is highly recommended to regenerate all API keys after patching or applying the workaround below. ### Patches Fixed in 4.10.0, all 4.x sites should upgrade as soon as possible. ### Workarounds - Disable all non-Administrator accounts to prevent API access. ### For more information If you have any questions or comments about this advisory: * email us at security@ghost.org --- Credits: Aden Yap Chuen Zhen, BAE Systems Applied Intelligence (Malaysia)
{'CVE-2021-39192'}
2021-09-03T20:23:05Z
2021-07-22T19:43:16Z
MODERATE
null
{'CWE-269', 'CWE-200'}
{'https://github.com/TryGhost/Ghost', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39192', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-j5c2-hm46-wp5c', 'https://github.com/TryGhost/Ghost/releases/tag/v4.10.0'}
null
npm
GHSA-89q5-mj78-pw5w
Cross-site Scripting in pekeupload
This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed.
{'CVE-2021-23673'}
2021-11-29T14:53:13Z
2021-12-02T17:52:26Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23673', 'https://snyk.io/vuln/SNYK-JS-PEKEUPLOAD-1584360', 'https://github.com/moxiecode/plupload', 'https://github.com/moxiecode/plupload/blob/120cc0b5dd3373d7181fd11b06ac2557c890d3f0/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226'}
null
npm
GHSA-vg44-fw64-cpjx
Incorrect Account Used for Signing
### Impact Anybody using this library to sign with a BIP44 account other than the first account may be affected. If a user is signing with the first account (i.e. the account at index `0`), or with the legacy MEW/MyCrypto HD path, they are not affected. The vulnerability impacts cases where the user signs a personal message or transaction without first adding the account. This includes cases where the user has already added the account in a previous session (i.e. they added the account, reset the application, then signed something). The serialization/deserialization process does restore a previously added account, but it doesn&#39;t restore the index instructing the keyring to use that account for signing. As a result, after serializing then deserializing the keyring state, the account at index `0` is always used for signing even if it isn&#39;t the current account. ### Patches This has been patched ([#14](https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14)) in version &gt;=0.2.1 of [`eth-ledger-bridge-keyring`](https://www.npmjs.com/package/eth-ledger-bridge-keyring), and in version &gt;=0.2.2 of [`@metamask/eth-ledger-bridge-keyring`](https://www.npmjs.com/package/@metamask/eth-ledger-bridge-keyring). Users are encouraged to migrate to the new package name. ### Workarounds To work around this problem without updating, you should remove then re-add the account before use. As long as the account was added during the lifetime of that process, signing with that account should work correctly. ### For more information If you have any questions or comments about this advisory: * Open an issue in [MetaMask/eth-ledger-bridge-keyring on GitHub](https://github.com/MetaMask/eth-ledger-bridge-keyring) * Email the MetaMask team at [hello@metamask.io](mailto:hello@metamask.io)
null
2021-08-23T14:40:05Z
2020-03-24T15:08:59Z
HIGH
null
{'CWE-287'}
{'https://github.com/MetaMask/eth-ledger-bridge-keyring/commit/f32e529d13a53e55f558d903534d631846dc26ce', 'https://www.npmjs.com/advisories/1498', 'https://github.com/MetaMask/eth-ledger-bridge-keyring/security/advisories/GHSA-vg44-fw64-cpjx', 'https://www.npmjs.com/advisories/1497', 'https://github.com/advisories/GHSA-vg44-fw64-cpjx', 'https://snyk.io/vuln/SNYK-JS-ETHLEDGERBRIDGEKEYRING-561121', 'https://github.com/MetaMask/eth-ledger-bridge-keyring/pull/14'}
null
npm
GHSA-v7cp-5326-54fh
Path Traversal in bruteser
Versions of `bruteser` prior to 0.1.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 0.1.0 or later.
null
2020-08-31T18:43:34Z
2020-09-03T16:45:15Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/999', 'https://hackerone.com/reports/342066'}
null
npm
GHSA-prfq-f66g-43mp
Information disclosure through error object in auth0.js
## Overview Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered. If the error object is exposed or logged without modification, the application risks password exposure. ## Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using Auth0.js version between 8.0.0 and 9.13.1(inclusive). - You store or display error objects without filtering. ## How to fix that? Developers should upgrade auth0.js to version 9.13.2 or later where user inputted passwords are masked in errors. If upgrading is not possible, a temporary fix may include not storing the error object or displaying it publicly without modification. ## Will this update impact my users? This fix patches the Auth0.js and may require changes in application code due to password no longer available in error object, but it will not impact your users, their current state, or any existing sessions.
{'CVE-2020-5263'}
2021-01-08T20:23:16Z
2020-04-10T18:19:10Z
HIGH
null
{'CWE-522'}
{'https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5263', 'https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d710828'}
null
npm
GHSA-6663-c963-2gqg
DoS due to excessively large websocket message in ws
Affected versions of `ws` do not appropriately limit the size of incoming websocket payloads, which may result in a denial of service condition when the node process crashes after receiving a large payload. ## Recommendation Update to version 1.1.1 or later. Alternatively, set the `maxpayload` option for the `ws` server to a value smaller than 256MB.
{'CVE-2016-10542'}
2020-08-31T18:11:28Z
2019-02-18T23:58:35Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/120', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10542', 'https://github.com/nodejs/node/issues/7388', 'https://github.com/advisories/GHSA-6663-c963-2gqg', 'https://nodesecurity.io/advisories/120'}
null
npm
GHSA-v756-4whv-48vc
Code Injection in cd-messenger
cd-messenger through 2.7.26 is vulnerable to Arbitrary Code Execution. User input provided to the `color` argument executed by the `eval` function resulting in code execution.
{'CVE-2020-7675'}
2021-07-29T18:13:50Z
2021-05-17T21:00:24Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7675', 'https://snyk.io/vuln/SNYK-JS-CDMESSENGER-571493'}
null
npm
GHSA-x4jg-mjrx-434g
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### References For more information, please see ["Bleichenbacher's RSA signature forgery based on implementation error"](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/) by Hal Finney. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:security@digitalbazaar.com)
{'CVE-2022-24772'}
2022-03-30T20:07:56Z
2022-03-18T23:10:28Z
HIGH
null
{'CWE-347'}
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24772', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g'}
null
npm
GHSA-rrc9-gqf8-8rwg
Prototype Pollution via file load in aws-sdk and @aws-sdk/shared-ini-file-loader
This affects the package @aws-sdk/shared-ini-file-loader before 1.0.0-rc.9; the package aws-sdk before 2.814.0. If an attacker submits a malicious INI file to an application that parses it with loadSharedConfigFiles , they will pollute the prototype on the application. This can be exploited further depending on the context.
{'CVE-2020-28472'}
2021-04-06T20:37:10Z
2021-11-16T21:26:43Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304', 'https://github.com/aws/aws-sdk-js/pull/3585/commits/7d72aff2a941173733fcb6741b104cd83d3bc611', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425', 'https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424', 'https://github.com/aws/aws-sdk-js-v3/commit/a209082dff913939672bb069964b33aa4c5409a9'}
null
npm
GHSA-22j5-38qv-pxx7
Hijacked Environment Variables in sqliter
The `sqliter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16051'}
2020-08-31T18:25:08Z
2018-07-23T20:50:04Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/490', 'https://github.com/advisories/GHSA-22j5-38qv-pxx7', 'https://nodesecurity.io/advisories/490', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16051'}
null
npm
GHSA-884w-698f-927f
Arbitrary File Write via Archive Extraction in unzipper
Versions of `unzipper` before 0.8.13 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example). ## Recommendation Update to version 0.3.18 or later.
{'CVE-2018-1002203'}
2020-08-31T18:32:31Z
2018-07-27T17:06:50Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/snyk/zip-slip-vulnerability', 'https://snyk.io/vuln/npm:unzipper:20180415', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002203', 'https://github.com/ZJONSSON/node-unzipper/commit/2220ddd5b58f6252069a4f99f9475441ad0b50cd', 'https://www.npmjs.com/advisories/680', 'https://hackerone.com/reports/362119', 'https://github.com/ZJONSSON/node-unzipper/pull/59', 'https://github.com/advisories/GHSA-884w-698f-927f'}
null
npm
GHSA-9cq4-mhmr-84gm
Malicious Package in jasmin
Version 0.0.3 of `jasmin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.3 of this module is found installed you will want to replace it with a version before or after 0.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:30Z
2020-09-01T20:26:49Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/629'}
null
npm
GHSA-hgch-jjmr-gp7w
Sandbox Breakout / Arbitrary Code Execution in safer-eval
Versions of `safer-eval` before 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. ## Recommendation Upgrade to version 1.3.2.
{'CVE-2019-10760'}
2021-07-27T22:20:29Z
2019-10-17T18:27:30Z
CRITICAL
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/787', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10760', 'https://github.com/commenthol/safer-eval/commit/1c29f6a6e304fb650c05056e217e457a0d2cc3c5', 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-473029'}
null