ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-9qgh-7pgp-hp7r
|
Cross-Site Scripting in graylog-web-interface
|
All versions of `graylog-web-interface` are vulnerable to Cross-Site Scripting (XSS). The package fails to escape output on the `TypeAhead` and `QueryInput` components, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:44:42Z
|
2020-09-03T17:10:31Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1028'}
| null |
npm
|
GHSA-hxcm-v35h-mg2x
|
Prototype Pollution
|
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
| null |
2021-02-25T17:25:43Z
|
2019-06-07T21:12:50Z
|
HIGH
| null |
{'CWE-1312'}
|
{'https://github.com/unshiftio/querystringify/pull/19', 'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'}
| null |
npm
|
GHSA-p7j5-4mwm-hv86
|
Cross-site scripting in TinyMCE
|
TinyMCE before 4.9.7 and 5.x before 5.1.4 allows XSS in the core parser, the paste plugin, and the visualchars plugin by using the clipboard or APIs to insert content into the editor.
|
{'CVE-2020-17480'}
|
2021-05-05T22:23:10Z
|
2021-05-06T17:28:14Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17480', 'https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}
| null |
npm
|
GHSA-xf5p-87ch-gxw2
|
Regular Expression Denial of Service in marked
|
Versions of `marked` prior to 0.6.2 and later than 0.3.14 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion.
## Recommendation
Upgrade to version 0.6.2 or later.
| null |
2021-08-04T20:53:01Z
|
2019-06-05T14:10:03Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/markedjs/marked/issues/1070', 'https://snyk.io/vuln/SNYK-JS-MARKED-174116', 'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d', 'https://github.com/markedjs/marked/pull/1460', 'https://www.npmjs.com/advisories/812'}
| null |
npm
|
GHSA-f8jj-45fj-44r6
|
Malicious Package in js-she3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:13:39Z
|
2020-09-03T23:05:43Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1287'}
| null |
npm
|
GHSA-3vjf-82ff-p4r3
|
Incorrect protocol extraction via \r, \n and \t characters
|
\r, \n and \t characters in user-input URLs can potentially lead to incorrect protocol extraction when using npm package urijs prior to version 1.19.11.
This can lead to XSS when the module is used to prevent passing in malicious javascript: links into HTML or Javascript (see following example):
````
const parse = require('urijs')
const express = require('express')
const app = express()
const port = 3000
input = "ja\r\nvascript:alert(1)"
url = parse(input)
console.log(url)
app.get('/', (req, res) => {
if (url.protocol !== "javascript:") {res.send("<iframe src=\'" + input + "\'>CLICK ME!</iframe>")}
})
app.listen(port, () => {
console.log(`Example app listening on port ${port}`)
})
````
|
{'CVE-2022-1243'}
|
2022-04-14T20:13:56Z
|
2022-04-06T00:01:31Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1243', 'https://github.com/medialize/uri.js', 'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'}
| null |
npm
|
GHSA-2877-693q-pj33
|
OS Command Injection in GenieACS
|
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
|
{'CVE-2021-46704'}
|
2022-03-14T21:30:21Z
|
2022-03-07T00:00:40Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/genieacs/genieacs', 'https://github.com/genieacs/genieacs/releases/tag/v1.2.8', 'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704'}
| null |
npm
|
GHSA-j4f2-536g-r55m
|
Resource exhaustion in engine.io
|
Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
|
{'CVE-2020-36048'}
|
2021-04-06T22:58:33Z
|
2022-02-09T22:29:04Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36048', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b', 'https://blog.caller.xyz/socketio-engineio-dos/'}
| null |
npm
|
GHSA-8gv6-g7vp-hr34
|
Hijacked Environment Variables in mysqljs
|
The `mysqljs` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16047'}
|
2020-08-31T18:25:17Z
|
2020-09-01T18:58:47Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16047', 'https://www.npmjs.com/advisories/494', 'https://nodesecurity.io/advisories/494'}
| null |
npm
|
GHSA-vr5m-3h59-7jcp
|
Prototype Pollution in think-helper
|
### Impact
The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
### Patches
`think-helper@1.1.3` patched it, anyone used `think-helper` should upgrade to `>=1.1.3` version.
### References
https://cwe.mitre.org/data/definitions/1321.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs)
* Email us at [i@imnerd.org](mailto:i@imnerd.org)
|
{'CVE-2021-32736'}
|
2021-06-30T17:40:38Z
|
2021-07-01T17:01:59Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32736', 'https://github.com/thinkjs/think-helper/security/advisories/GHSA-vr5m-3h59-7jcp'}
| null |
npm
|
GHSA-992f-wf4w-x36v
|
Prototype Pollution in merge-objects
|
All versions of `merge-objects` are vulnerable to Prototype Pollution.
## Recommendation
No fix is available for this vulnerability at this time. It is our recommendation to use an alternative package.
| null |
2020-08-31T18:33:09Z
|
2020-09-01T21:16:13Z
|
LOW
| null |
{'CWE-1321'}
|
{'https://hackerone.com/reports/310706', 'https://www.npmjs.com/advisories/716'}
| null |
npm
|
GHSA-vv52-3mrp-455m
|
Malicious Package in m-backdoor
|
All versions of `m-backdoor` contain malicious code. The package downloads a file from a remote server and executes it as a preinstall script. At the time of the release of this advisory the downloaded file only defaces websites by removing elements randomly from the DOM.
## Recommendation
Remove the package from your system.
| null |
2020-08-31T19:01:56Z
|
2020-09-03T15:53:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1513'}
| null |
npm
|
GHSA-54xj-q58h-9x57
|
Arbitrary File Write in iobroker.admin
|
Versions of `iobroker.admin` prior to 3.6.12 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended folder in the `/log/` route, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default.
## Recommendation
Upgrade to version 3.6.12 or later.
|
{'CVE-2019-10765'}
|
2021-10-01T20:14:10Z
|
2020-09-04T15:24:56Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1346', 'https://snyk.io/vuln/SNYK-JS-IOBROKERADMIN-534634', 'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10765'}
| null |
npm
|
GHSA-3wjm-33mw-h388
|
Malicious Package in s3asy
|
Version 0.4.8 of `s3asy` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.4.8 of this module is found installed you will want to replace it with a version before or after 0.4.8. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:46Z
|
2020-09-01T20:34:14Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/636'}
| null |
npm
|
GHSA-3gx7-xhv7-5mx3
|
Arbitrary Code Execution in eslint-utils
|
Versions of `eslint-utils` >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The `getStaticValue` does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The `getStringIfConstant` and `getPropertyName` functions are not affected.
## Recommendation
Upgrade to version 1.4.1 or later.
|
{'CVE-2019-15657'}
|
2021-08-31T21:04:30Z
|
2019-08-26T16:59:56Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/1118', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15657', 'https://github.com/advisories/GHSA-3gx7-xhv7-5mx3', 'https://github.com/mysticatea/eslint-utils', 'https://github.com/mysticatea/eslint-utils/security/advisories/GHSA-3gx7-xhv7-5mx3', 'https://eslint.org/blog/2019/08/eslint-v6.2.1-released'}
| null |
npm
|
GHSA-4vcm-qfxh-p6c3
|
Directory Traversal in getcityapi.yoehoehne
|
Affected versions of `getcityapi.yoehoehne` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16192'}
|
2020-08-31T18:23:09Z
|
2018-07-23T20:40:29Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-4vcm-qfxh-p6c3', 'https://www.npmjs.com/advisories/438', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne', 'https://nodesecurity.io/advisories/438', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16192'}
| null |
npm
|
GHSA-q54r-r9pr-w7qv
|
XSS in Hexo
|
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.
|
{'CVE-2021-25987'}
|
2021-12-01T16:15:32Z
|
2021-12-01T18:27:44Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987', 'https://github.com/hexojs/hexo', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25987', 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}
| null |
npm
|
GHSA-w5mp-8p8w-mhh8
|
Command injection in connection-tester
|
This affects the package connection-tester before 0.2.1. The injection point is located in line 15 in index.js. Affected versions of this package are vulnerable to Command Injection
|
{'CVE-2020-7781'}
|
2021-01-07T22:35:45Z
|
2020-12-17T21:00:53Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337', 'https://github.com/skoranga/node-connection-tester/pull/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7781'}
| null |
npm
|
GHSA-ffxg-xm4w-3wg9
|
Command Injection in corenlp-js-interface
|
All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.
|
{'CVE-2020-28440'}
|
2020-12-17T22:23:13Z
|
2020-12-18T18:23:04Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28440'}
| null |
npm
|
GHSA-fwhp-2hqr-6g72
|
Downloads Resources over HTTP in pk-app-wonderbox
|
Affected versions of `pk-app-wonderbox` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pk-app-wonderbox`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10685'}
|
2021-01-08T18:50:49Z
|
2019-02-18T23:42:01Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10685', 'https://github.com/advisories/GHSA-fwhp-2hqr-6g72', 'https://www.npmjs.com/advisories/289', 'https://nodesecurity.io/advisories/289'}
| null |
npm
|
GHSA-rqwh-c535-j9hw
|
Downloads Resources over HTTP in js-given
|
Affected versions of `js-given` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `js-given`.
## Recommendation
Update to version 0.0.18 or later.
|
{'CVE-2016-10638'}
|
2021-01-08T01:57:52Z
|
2019-02-18T23:47:09Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-rqwh-c535-j9hw', 'https://www.npmjs.com/advisories/241', 'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)', 'https://nodesecurity.io/advisories/241', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10638'}
| null |
npm
|
GHSA-vh6r-g38f-q3w8
|
Validation bypass in jpv
|
jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.
|
{'CVE-2020-17479'}
|
2021-05-05T22:34:04Z
|
2021-05-06T17:27:58Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/manvel-khnkoyan/jpv/issues/10', 'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6', 'https://blog.sonatype.com/cve-2020-17479', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17479', 'https://www.npmjs.com/package/jpv'}
| null |
npm
|
GHSA-x87g-rgrh-r6g3
|
Malicious Package in rpc-websocket
|
Versions of `rpc-websocket` >= 0.7.6 contained malicious code. The package opens a backdoor to a remote server and executes arbitrary commands, effectively acting as a backdoor.
## Recommendation
Any computer that has these versions of the package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T17:16:09Z
|
2020-09-03T17:07:15Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1022'}
| null |
npm
|
GHSA-9mjp-gv34-3jcf
|
Malicious Package in aasync
|
All versions of `aasync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:55:21Z
|
2020-09-02T18:37:35Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/844'}
| null |
npm
|
GHSA-x268-6jhm-2mx8
|
Downloads Resources over HTTP in libsbmlsim
|
Affected versions of `libsbmlsim` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbmlsim`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10675'}
|
2021-01-08T00:47:49Z
|
2019-02-18T23:42:22Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/275', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10675', 'https://github.com/advisories/GHSA-x268-6jhm-2mx8', 'https://www.npmjs.com/advisories/275'}
| null |
npm
|
GHSA-g64q-3vg8-8f93
|
Prototype Pollution in subtext
|
All versions of `subtext` are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
## Recommendation
This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
| null |
2021-10-04T20:58:50Z
|
2020-09-03T15:47:10Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1479'}
| null |
npm
|
GHSA-vv6q-9cfw-4c83
|
Hijacked Environment Variables in smb
|
The `smb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16079'}
|
2020-08-31T18:26:11Z
|
2018-08-29T23:20:27Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/518', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16079', 'https://www.npmjs.com/advisories/518', 'https://github.com/advisories/GHSA-vv6q-9cfw-4c83'}
| null |
npm
|
GHSA-4qqc-mp5f-ccv4
|
Command Injection in bestzip
|
Versions of `bestzip` prior to 2.1.7 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `zip` function . This may allow attackers to execute arbitrary code in the system as long as the values of `destination` is user-controlled. This only affects users with a native `zip` command available. The following examples demonstrate the issue from the CLI and also programatically:
- `bestzip test.zip 'sourcefile; mkdir folder'`
- `zip({ source: 'sourcefile', destination: './test.zip; mkdir folder' })`
| null |
2020-09-02T15:04:08Z
|
2020-09-02T15:05:51Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1554'}
| null |
npm
|
GHSA-r8hm-w5f7-wj39
|
Cross-site scripting vulnerability in TinyMCE plugins
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.10.0 or higher
- Disable the `image` and `link` plugins
### Acknowledgements
Tiny Technologies would like to thank Yakir6 for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
| null |
2022-03-03T05:13:05.261265Z
|
2021-11-02T15:42:52Z
|
MODERATE
| null |
{'CWE-79', 'CWE-64'}
|
{'https://pypi.org/project/django-tinymce/3.4.0/', 'https://github.com/jazzband/django-tinymce/issues/366', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39', 'https://github.com/tinymce/tinymce', 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0'}
| null |
npm
|
GHSA-5645-gc7h-98h8
|
Malicious Package in react-dates-sc
|
Version 0.3.0 of `react-dates-sc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.3.0 of this module is found installed you will want to replace it with a version before or after 0.3.0. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:42Z
|
2020-09-01T20:32:07Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/634'}
| null |
npm
|
GHSA-2548-q746-x5x6
|
Code injection in port-killer
|
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
|
{'CVE-2021-23359'}
|
2021-03-22T20:46:47Z
|
2021-04-13T15:20:49Z
|
HIGH
| null |
{'CWE-77', 'CWE-20'}
|
{'https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23359', 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533'}
| null |
npm
|
GHSA-64g7-mvw6-v9qj
|
Improper Privilege Management in shelljs
|
### Impact
Output from the synchronous version of `shell.exec()` may be visible to other users on the same system. You may be affected if you execute `shell.exec()` in multi-user Mac, Linux, or WSL environments, or if you execute `shell.exec()` as the root user.
Other shelljs functions (including the asynchronous version of `shell.exec()`) are not impacted.
### Patches
Patched in shelljs 0.8.5
### Workarounds
Recommended action is to upgrade to 0.8.5.
### References
https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/
### For more information
If you have any questions or comments about this advisory:
* Ask at https://github.com/shelljs/shelljs/issues/1058
* Open an issue at https://github.com/shelljs/shelljs/issues/new
| null |
2022-01-14T20:50:57Z
|
2022-01-14T21:09:50Z
|
MODERATE
| null |
{'CWE-269'}
|
{'https://github.com/shelljs/shelljs', 'https://github.com/shelljs/shelljs/security/advisories/GHSA-64g7-mvw6-v9qj', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/'}
| null |
npm
|
GHSA-mpcf-4gmh-23w8
|
Regular Expression Denial of Service in forwarded
|
Affected versions of `forwarded` are vulnerable to regular expression denial of service when parsing specially crafted user input.
## Recommendation
Update to version 0.1.2 or later
|
{'CVE-2017-16118'}
|
2020-08-31T18:26:30Z
|
2018-07-24T20:16:30Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/527', 'http://www.securityfocus.com/bid/104427', 'https://github.com/advisories/GHSA-mpcf-4gmh-23w8', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16118', 'https://nodesecurity.io/advisories/527'}
| null |
npm
|
GHSA-pp57-mqmh-44h7
|
Command Injection in macaddress
|
All versions of `macaddress` are vulnerable to command injection. For this vulnerability to be exploited an attacker needs to control the `iface` argument to the `one` method.
## Recommendation
Update to version 0.2.9 or later.
|
{'CVE-2018-13797'}
|
2021-09-16T18:18:02Z
|
2018-09-06T23:24:21Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/scravy/node-macaddress', 'https://www.npmjs.com/advisories/654', 'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332', 'https://github.com/scravy/node-macaddress/pull/20/', 'https://hackerone.com/reports/319467', 'https://github.com/advisories/GHSA-pp57-mqmh-44h7', 'https://news.ycombinator.com/item?id=17283394', 'https://github.com/scravy/node-macaddress/pull/20', 'https://github.com/scravy/node-macaddress/releases/tag/0.2.9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13797'}
| null |
npm
|
GHSA-f52g-6jhx-586p
|
Denial of Service in handlebars
|
Affected versions of `handlebars` are vulnerable to Denial of Service. The package's parser may be forced into an endless loop while processing specially-crafted templates. This may allow attackers to exhaust system resources leading to Denial of Service.
## Recommendation
Upgrade to version 4.4.5 or later.
| null |
2020-08-31T18:54:21Z
|
2020-09-03T23:20:12Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1300'}
| null |
npm
|
GHSA-6vrv-94jv-crrg
|
Context isolation bypass via Promise in Electron
|
### Impact
Apps using `contextIsolation` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
* `6.1.11`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org)
|
{'CVE-2020-15096'}
|
2021-01-07T23:48:19Z
|
2020-07-07T00:01:05Z
|
LOW
| null |
{'CWE-501'}
|
{'https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15096', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
| null |
npm
|
GHSA-92vm-wfm5-mxvv
|
Timing Attack in cookie-signature
|
Affected versions of `cookie-signature` are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.
Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.
Under favorable network conditions, an attacker can exploit this to guess the secret in no more than `charset*length` guesses, instead of `charset^length` guesses required were the timing attack not present.
## Recommendation
Update to 1.0.6 or later.
|
{'CVE-2016-1000236'}
|
2021-08-19T16:16:59Z
|
2020-01-06T18:44:10Z
|
MODERATE
| null |
{'CWE-362'}
|
{'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590', 'https://www.npmjs.com/advisories/134', 'https://www.mail-archive.com/secure-testing-team@lists.alioth.debian.org/msg06583.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000236', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838618', 'https://bugzilla.redhat.com/show_bug.cgi?id=1371409', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000236', 'https://security-tracker.debian.org/tracker/CVE-2016-1000236', 'https://travis-ci.com/nodejs/security-wg/builds/76423102', 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07', 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e'}
| null |
npm
|
GHSA-28gr-86hg-r48w
|
Unauthenticated Remote Command Injection in ep_imageconvert
|
ep_imageconvert is a plugin for [Etherpad Lite](https://github.com/ether/etherpad-lite). ep_imageconvert <= 0.0.2 is vulnerable to remote command injection.
Authentication is not required for remote exploitation.
## Recommendation
Update to version 0.0.3 or greater.
|
{'CVE-2013-3364'}
|
2021-09-23T19:27:57Z
|
2020-08-31T22:43:31Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/redhog/ep_imageconvert', 'https://github.com/redhog/ep_imageconvert/pull/5', 'https://snyk.io/vuln/npm:ep_imageconvert:20130506', 'https://www.npmjs.com/advisories/7', 'https://nvd.nist.gov/vuln/detail/CVE-2013-3364'}
| null |
npm
|
GHSA-9qgm-w87q-hx89
|
Unrestricted Upload of File with Dangerous Type in Strapi
|
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
|
{'CVE-2022-27263'}
|
2022-04-22T21:03:44Z
|
2022-04-13T00:00:25Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27263', 'https://github.com/strapi/strapi', 'https://www.youtube.com/watch?v=LEeabouqRrg'}
| null |
npm
|
GHSA-85g2-29m8-qf2p
|
Prototype Pollution Vulnerability in object-collider
|
Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25914'}
|
2021-03-16T22:49:14Z
|
2021-03-19T21:18:33Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914', 'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25914'}
| null |
npm
|
GHSA-hwhq-3hrj-v6v5
|
Hijacked Environment Variables in cross-env.js
|
The `cross-env.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16081'}
|
2020-08-31T18:26:15Z
|
2020-09-01T19:00:54Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16081', 'https://nodesecurity.io/advisories/520', 'https://www.npmjs.com/advisories/520'}
| null |
npm
|
GHSA-88xx-23mf-rcj2
|
Malicious Package in bs-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:18:52Z
|
2020-09-03T22:51:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1274'}
| null |
npm
|
GHSA-67mp-pcv9-vvq6
|
Malicious Package in jr-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:35:36Z
|
2020-09-03T22:57:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1279'}
| null |
npm
|
GHSA-r8j5-h5cx-65gg
|
ReDOS in IS-SVG
|
A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
|
{'CVE-2021-29059'}
|
2021-12-10T19:02:24Z
|
2021-12-10T19:02:37Z
|
HIGH
| null |
{'CWE-770'}
|
{'https://www.npmjs.com/package/is-svg', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0', 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02', 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js', 'https://github.com/sindresorhus/is-svg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29059', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md'}
| null |
npm
|
GHSA-6hr9-4692-fch9
|
OS Command Injection in effect
|
effect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.
|
{'CVE-2020-7624'}
|
2021-07-28T22:11:47Z
|
2022-02-10T23:45:54Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/Javascipt/effect/blob/master/helper.js#L24,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7624', 'https://snyk.io/vuln/SNYK-JS-EFFECT-564256'}
| null |
npm
|
GHSA-f7g4-fm4c-54m9
|
Malicious Package in yeoman-genrator
|
Version 2.0.2 of `yoeman-generator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-29T20:45:57Z
|
2020-09-03T21:06:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1198'}
| null |
npm
|
GHSA-jpq3-xf27-5jf2
|
Prototype Pollution in safe-object2
|
All versions of package safe-object2 are vulnerable to Prototype Pollution via the setter function.
|
{'CVE-2020-7726'}
|
2021-05-04T23:40:42Z
|
2021-05-06T18:26:42Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7726'}
| null |
npm
|
GHSA-6c37-2rw5-9j7x
|
Malicious Package in requesst
|
All versions of `requesst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:04:27Z
|
2020-09-02T20:25:46Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/857'}
| null |
npm
|
GHSA-53jx-4wwh-gcqj
|
Malicious Package in angular-location-update
|
Version 0.0.3 of `angular-location-update` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:40:55Z
|
2020-09-11T21:11:34Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/930'}
| null |
npm
|
GHSA-4228-7qvx-f4rq
|
Injection and Command Injection in devcert
|
A command injection vulnerability in the `devcert` module may lead to remote code execution when users of the module pass untrusted input to the `certificateFor` function.
|
{'CVE-2020-8186'}
|
2021-05-11T17:26:32Z
|
2021-05-18T01:41:56Z
|
HIGH
| null |
{'CWE-74', 'CWE-77', 'CWE-78'}
|
{'https://hackerone.com/reports/863544', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8186'}
| null |
npm
|
GHSA-qccf-q7p4-3q3j
|
Prototype Pollution in safe-object2
|
All versions of `safe-object2` are vulnerable to prototype pollution. The `settter()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:32Z
|
2020-09-04T15:16:42Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1335'}
| null |
npm
|
GHSA-wc7q-qpm4-8pqv
|
Malicious Package in rrequest
|
All versions of `rrequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:07:12Z
|
2020-09-02T20:32:10Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/862'}
| null |
npm
|
GHSA-3mhm-jvqj-fvhg
|
Malicious Package in js-sia3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:14:42Z
|
2020-09-03T23:09:37Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1290'}
| null |
npm
|
GHSA-45w5-pvr8-4rh5
|
Command injection in eslint-fixer
|
The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted.
|
{'CVE-2021-26275'}
|
2021-03-26T22:09:16Z
|
2021-04-13T15:19:14Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/package/eslint-fixer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26275', 'https://advisory.checkmarx.net/advisory/CX-2021-4774'}
| null |
npm
|
GHSA-p94w-42g3-f7h4
|
Holder can (re)create authentic credentials after receiving a credential in vp-toolkit
|
### Impact
The [`verifyVerifiableCredential()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-credential-signer.ts#L57) method check the cryptographic integrity of the Verifiable Credential, but it does not check if the [`credential.issuer`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L129) DID matches the signer of the credential.
The **verifier** is impacted by this vulnerability.
### Patches
Patch will be available in version 0.2.2.
### Workarounds
In case you trust certain issuers for certain credentials as a verifier, trust the issuer's public key from the `credential.proof.verificationMethod` field.
### References
[Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13)
### For more information
If you have any questions or comments about this advisory:
* Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13)
* [Contact me](https://github.com/rabomarnix)
| null |
2020-02-28T16:38:09Z
|
2020-03-06T01:16:00Z
|
HIGH
| null | null |
{'https://github.com/rabobank-blockchain/vp-toolkit/issues/13', 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-p94w-42g3-f7h4', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'}
| null |
npm
|
GHSA-h5vj-f7r9-w564
|
Entropy Backdoor in text-qrcode
|
All versions of `text-qrcode` contain malicious code that overwrites the `randomBytes` method for the `crypto` module with a function that generates weak entropy. Instead of generating 32 bytes, the infected randomBytes will generate 3 bytes of entropy and hash them, resulting in a 32 byte value being returned, but one that is easily guessable.
## Recommendation
Uninstall `text-qrcode` immediately. If the module was used to generate entropy that is load bearing, all such instances of generated entropy must be replaced. This includes things like bitcoin wallets, private keys, encrypted messages, etc.
| null |
2021-10-01T13:30:18Z
|
2020-09-01T21:22:35Z
|
HIGH
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/738'}
| null |
npm
|
GHSA-5q54-8p9j-x74j
|
Cross-site Scripting in pandao editor.md
|
pandao Editor.md 1.5.0 allows XSS via the Javascript: string.
|
{'CVE-2019-14517'}
|
2021-08-17T21:59:57Z
|
2019-08-23T00:05:03Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pandao/editor.md/issues/709', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14517'}
| null |
npm
|
GHSA-gvm7-8fq3-qjj2
|
Malicious Package in bs85
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:50:15Z
|
2020-09-03T19:43:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1378'}
| null |
npm
|
GHSA-g3r2-65gc-qpqc
|
Denial of Service in mqtt-packet
|
Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application.
## Recommendation
Version 3.x: Update to version 3.4.6 or later.
Version 4.x: Update to version 4.0.5 or later.
|
{'CVE-2016-10523'}
|
2021-01-08T18:50:02Z
|
2019-02-18T23:38:45Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10523', 'https://github.com/mcollina/mosca/issues/393', 'https://www.npmjs.com/advisories/75', 'https://nodesecurity.io/advisories/75', 'https://github.com/mqttjs/mqtt-packet/pull/8', 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc'}
| null |
npm
|
GHSA-4wv4-mgfq-598v
|
Code injection in nobelprizeparser
|
Code injection through use of eval.
| null |
2021-03-12T19:13:27Z
|
2021-03-12T23:00:19Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286', 'https://www.npmjs.com/package/nobelprizeparser'}
| null |
npm
|
GHSA-jxcc-g75x-qgw9
|
Arbitrary File Write via Archive Extraction (Zip Slip)
|
This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality.
|
{'CVE-2021-23391'}
|
2021-06-08T16:15:33Z
|
2021-06-08T18:47:18Z
|
HIGH
| null |
{'CWE-668', 'CWE-29'}
|
{'https://github.com/cliftonc/calipso', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23391', 'https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555'}
| null |
npm
|
GHSA-m4vv-p6fq-jhqp
|
Directory Traversal in @vivaxy/here
|
The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root.
It is vulnerable to a directory traversal attack.
This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files.
Mitigating Factors:
If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information.
Proof of Concept:
```
curl "http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd"
```
## Recommendation
Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability.
| null |
2021-09-23T21:48:53Z
|
2020-09-01T19:04:07Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/vivaxy/here', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://www.npmjs.com/advisories/557'}
| null |
npm
|
GHSA-pm9v-325f-5g74
|
Malicious Package in saync
|
All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T21:26:49Z
|
2020-09-02T21:30:11Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/896'}
| null |
npm
|
GHSA-h86x-mv66-gr5q
|
OS Command Injection in Locutus
|
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
|
{'CVE-2020-13619'}
|
2021-07-26T19:28:18Z
|
2021-07-26T21:21:43Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13619', 'https://reallinkers.github.io/CVE-2020-13619/', 'https://locutus.io/php/', 'https://www.npmjs.com/package/locutus'}
| null |
npm
|
GHSA-wq7q-5v6j-xfv6
|
Command Injection in picotts
|
This affects all versions up to and including version 0.1.1 of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23378'}
|
2021-05-06T22:36:14Z
|
2021-05-07T16:06:11Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23378', 'https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942398c8b/index.js%23L16'}
| null |
npm
|
GHSA-3grc-fgh6-g5gp
|
Directory Traversal in http_static_simple
|
Affected versions of `http_static_simple` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16134'}
|
2020-08-31T18:24:26Z
|
2018-07-23T22:08:39Z
|
HIGH
| null |
{'CWE-22', 'CWE-12'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16134', 'https://www.npmjs.com/advisories/472', 'https://github.com/advisories/GHSA-3grc-fgh6-g5gp', 'https://nodesecurity.io/advisories/472', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple'}
| null |
npm
|
GHSA-gvg7-pp82-cff3
|
Cross-Site Scripting in c3
|
Affected versions of `c3` are vulnerable to cross-site scripting via improper sanitization of HTML in rendered tooltips.
## Recommendation
Update to 0.4.11 or later.
|
{'CVE-2016-1000240'}
|
2021-09-23T21:36:05Z
|
2020-09-01T15:59:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/c3js/c3', 'https://github.com/c3js/c3/issues/1536', 'https://www.npmjs.com/advisories/138', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000240'}
| null |
npm
|
GHSA-73cw-jxmm-qpgh
|
Path Traversal in localhost-now
|
All versions of `localhost-now` are vulnerable to path traversal. This vulnerability is a bypass to the path traversal fix introduced in version 1.0.2
Proof of concept:
```
$ curl -v --path-as-is "http://IP:5432/..././..././..././..././..././..././..././..././..././..././etc/passwd"
```
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
| null |
2020-08-31T18:31:31Z
|
2019-06-11T16:40:48Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/655', 'https://hackerone.com/reports/329837', 'https://github.com/DCKT/localhost-now/blob/master/lib/app.js#L17', 'https://www.npmjs.com/advisories/655'}
| null |
npm
|
GHSA-xhjx-mfr6-9rr4
|
Command Injection in samsung-remote
|
Versions of `samsung-remote` before 1.3.5 are vulnerable to command injection. This vulnerability is exploitable if user input is passed into the `ip` option of the package constructor.
## Recommendation
Update to version 1.3.5 or later.
| null |
2020-08-31T18:33:52Z
|
2020-09-01T21:20:28Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/465.json', 'https://hackerone.com/reports/394294', 'https://www.npmjs.com/advisories/734'}
| null |
npm
|
GHSA-39q4-p535-c852
|
Uncontrolled Resource Consumption in locutus
|
The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.
|
{'CVE-2021-23392'}
|
2021-06-16T20:02:14Z
|
2021-06-10T17:25:05Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597', 'https://github.com/locutusjs/locutus/pull/446', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392', 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}
| null |
npm
|
GHSA-c2g6-57fp-22wp
|
Malicious Package in fuffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:14:29Z
|
2020-09-03T22:48:35Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1271'}
| null |
npm
|
GHSA-pjxp-f379-6284
|
Malicious Package in @fangrong/xoc
|
Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:24Z
|
2020-09-03T19:13:27Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1104'}
| null |
npm
|
GHSA-hw4r-xr38-hm8j
|
Downloads Resources over HTTP in unicode-json
|
Affected versions of `unicode-json` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Install version 2.0.0 or greater.
|
{'CVE-2016-10610'}
|
2021-01-08T18:39:28Z
|
2019-02-18T23:47:59Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/206', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10610', 'https://nodesecurity.io/advisories/206', 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j'}
| null |
npm
|
GHSA-9c22-pwxw-p6hx
|
Initializer reentrancy may lead to double initialization
|
### Impact
Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call.
Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution.
Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor.
### Patches
A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Avoid untrusted external calls during initialization.
### References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006
### Credits
This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
| null |
2021-12-14T19:22:45Z
|
2021-12-14T21:47:33Z
|
LOW
| null | null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}
| null |
npm
|
GHSA-crfx-5phg-hmw9
|
Cross-Site Scripting in ids-enterprise
|
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later
| null |
2020-08-31T18:41:52Z
|
2019-06-13T18:59:12Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/infor-design/enterprise-ng/issues/502', 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1', 'https://www.npmjs.com/advisories/955'}
| null |
npm
|
GHSA-q674-xm3x-2926
|
Uncontrolled Resource Consumption in parse-link-header
|
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
|
{'CVE-2021-23490'}
|
2022-01-07T16:08:29Z
|
2022-01-06T21:37:02Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783', 'https://github.com/thlorenz/parse-link-header', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490', 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973'}
| null |
npm
|
GHSA-p2r2-h92r-w2mg
|
Directory Traversal in mfrserver
|
Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16213'}
|
2020-08-31T18:22:29Z
|
2020-09-01T18:11:03Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213', 'https://nodesecurity.io/advisories/421', 'https://www.npmjs.com/advisories/421'}
| null |
npm
|
GHSA-4q8f-5xxj-946r
|
Command Injection in addax
|
Versions of `addax` prior to 1.1.0 are vulnerable to Command Injection. The package does not validate user input on the `presignPath` function which receives input directly from the API endpoint. Exploiting the vulnerability requires authentication. This may allow attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.1.0 or later.
| null |
2020-08-31T18:41:49Z
|
2020-09-03T02:40:51Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/954'}
| null |
npm
|
GHSA-226w-6hhj-69hp
|
Malicious Package in cal_rd
|
Version 0.1.1 of `rc_cal` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T20:06:59Z
|
2020-09-03T19:06:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1098'}
| null |
npm
|
GHSA-cfwc-xjfp-44jg
|
Command Injection in gnuplot
|
All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
```
var gnuplot = require('gnuplot');
const title = '"\nset title system("touch testing")\n#';
gnuplot()
.set('term png')
.set('output "out.png"')
.set(`title "${title}"`)
.set('xrange [-10:10]')
.set('yrange [-2:2]')
.set('zeroaxis')
.plot('(x/4)**2, sin(x), 1/x')
.end();
```
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:59:23Z
|
2020-09-04T17:19:48Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1440'}
| null |
npm
|
GHSA-x8rq-rc7x-5fg5
|
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF)
|
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses.
|
{'CVE-2022-0086'}
|
2022-02-24T18:44:54Z
|
2022-01-06T22:24:35Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f', 'https://github.com/transloadit/uppy/pull/3403', 'https://github.com/transloadit/uppy/', 'https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122', 'https://github.com/transloadit/uppy/releases/tag/uppy%402.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0086'}
| null |
npm
|
GHSA-vcjj-xf2r-mwvc
|
XSS in knockout
|
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
|
{'CVE-2019-14862'}
|
2022-04-25T23:07:31Z
|
2020-04-01T15:47:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/knockout/knockout/issues/1244', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14862', 'https://snyk.io/vuln/npm:knockout:20180213', 'https://github.com/knockout/knockout/pull/2345'}
| null |
npm
|
GHSA-px4h-xg32-q955
|
ReDoS in normalize-url
|
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
|
{'CVE-2021-33502'}
|
2021-10-27T17:04:15Z
|
2021-06-08T23:11:43Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/sindresorhus/normalize-url', 'https://security.netapp.com/advisory/ntap-20210706-0001/', 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502', 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}
| null |
npm
|
GHSA-6x33-pw7p-hmpq
|
Denial of Service in http-proxy
|
Versions of `http-proxy` prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an `ERR_HTTP_HEADERS_SENT` unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the `proxyReq.setHeader` function.
For a proxy server running on `http://localhost:3000`, the following curl request triggers the unhandled exception:
```curl -XPOST http://localhost:3000 -d "$(python -c 'print("x"*1025)')"```
## Recommendation
Upgrade to version 1.18.1 or later
| null |
2020-08-31T19:01:05Z
|
2020-09-04T17:59:49Z
|
HIGH
| null | null |
{'https://github.com/http-party/node-http-proxy/pull/1447/files', 'https://www.npmjs.com/advisories/1486'}
| null |
npm
|
GHSA-657v-jjf8-83gh
|
Malicious Package in jsmsha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:37:41Z
|
2020-09-03T23:14:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1295'}
| null |
npm
|
GHSA-vm64-cfqx-3698
|
Code Injection in jsen
|
This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so I assume that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a Function.apply();, leading to an Arbitrary Code Execution.
|
{'CVE-2020-7777'}
|
2022-02-10T20:18:37Z
|
2022-02-10T20:18:37Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7777'}
| null |
npm
|
GHSA-xp9c-82x8-7f67
|
Prototype Pollution in Node-Red
|
### Impact
Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime.
### Patches
The vulnerability is patched in the 1.2.8 release.
### Workarounds
A workaround is to ensure only authorised users are able to access the editor url.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@nodered.org](mailto:team@nodered.org)
### Acknowledgements
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
|
{'CVE-2021-21297'}
|
2021-09-22T13:55:00Z
|
2021-02-26T16:31:05Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://www.npmjs.com/package/@node-red/runtime', 'https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67', 'https://www.npmjs.com/package/@node-red/editor-api', 'https://github.com/node-red/node-red', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21297'}
| null |
npm
|
GHSA-qjmq-8hjr-qcv6
|
SQL Injection when creating an application with Reactive SQL backend
|
### Impact
SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected.
If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default.
Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria.
## Impacted applications
- Monolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities)
- Gateway applications with SQL database (issue will appear only when generating entities)
### Patches
Patched in v7.8.1
The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications.
If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions.
### Workarounds
The problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`.
`just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL
So be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`.
### Example
```java
Criteria criteria = Criteria.where("name").is("foobar';DROP TABLE example;--"); // parameter is user provided input
criteria.toString(); // --> "'foobar';DROP TABLE example;--'"
```
### References
[More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
|
{'CVE-2022-24815'}
|
2022-04-18T22:20:12Z
|
2022-04-07T15:18:05Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24815', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6', 'https://github.com/jhipster/generator-jhipster/issues/18269', 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98', 'https://github.com/jhipster/generator-jhipster'}
| null |
npm
|
GHSA-8gwj-8hxc-285w
|
Prototype Pollution in json-ptr
|
This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
|
{'CVE-2021-23509'}
|
2021-11-08T17:43:16Z
|
2021-11-08T17:43:27Z
|
MODERATE
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509', 'https://github.com/flitbit/json-ptr/pull/42', 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca', 'https://github.com/flitbit/json-ptr'}
| null |
npm
|
GHSA-g2q5-5433-rhrf
|
Embedded malware in rc
|
The npm package `rc` had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-11-04T18:47:00Z
|
2021-11-04T16:24:44Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/package/rc', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/dominictarr/rc'}
| null |
npm
|
GHSA-58f5-hfqc-jgch
|
Padding Oracle Attack due to Observable Timing Discrepancy in jose
|
jose is an npm library providing a number of cryptographic operations.
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`.
Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4)
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
|
{'CVE-2021-29443'}
|
2021-04-16T23:01:38Z
|
2021-04-19T14:57:22Z
|
MODERATE
| null |
{'CWE-696', 'CWE-203'}
|
{'https://www.npmjs.com/package/jose', 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}
| null |
npm
|
GHSA-7f53-fmmv-mfjv
|
Regular expression denial of service in react-native
|
A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.
|
{'CVE-2020-1920'}
|
2021-06-10T14:10:51Z
|
2021-07-20T17:33:28Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://securitylab.github.com/advisories/GHSL-2020-293-redos-react-native/', 'https://github.com/facebook/react-native/releases/tag/v0.64.1', 'https://github.com/facebook/react-native/releases/tag/v0.62.3', 'https://www.npmjs.com/package/react-native', 'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920'}
| null |
npm
|
GHSA-2r2c-g63r-vccr
|
Improper Verification of Cryptographic Signature in `node-forge`
|
### Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:security@digitalbazaar.com)
|
{'CVE-2022-24773'}
|
2022-03-18T23:10:48Z
|
2022-03-18T23:10:48Z
|
MODERATE
| null |
{'CWE-347'}
|
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773'}
| null |
npm
|
GHSA-wg6g-ppvx-927h
|
Prototype Pollution in cached-path-relative
|
The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573
|
{'CVE-2021-23518'}
|
2022-01-27T14:26:40Z
|
2022-01-27T14:27:53Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653', 'https://github.com/ashaffer/cached-path-relative', 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23518'}
| null |
npm
|
GHSA-mpjf-8cmf-p789
|
Cross-Site Scripting in jingo
|
Versions of `jingo` prior to 1.9.2 are vulnerable to Cross-Site Scripting (XSS). If malicious input such as `<script>alert(1)</script>` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text.
## Recommendation
Upgrade to version 1.9.2
| null |
2020-08-31T18:34:28Z
|
2020-09-01T21:25:46Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/750'}
| null |
npm
|
GHSA-h87q-g2wp-47pj
|
Signatures are mistakenly recognized to be valid in jsrsasign
|
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
| null |
2022-02-15T01:51:57Z
|
2022-02-09T22:41:19Z
|
MODERATE
| null |
{'CWE-347'}
|
{'https://github.com/kjur/jsrsasign/releases/tag/10.2.0', 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/issues/478'}
| null |
npm
|
GHSA-hvf8-h2qh-37m9
|
IPC messages delivered to the wrong frame in Electron
|
### Impact
IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame.
If your app does ANY of the following, then it is impacted by this issue:
- Uses `remote`
- Calls `webContents.sendToFrame`
- Calls `event.reply` in an IPC message handler
### Patches
This has been fixed in the following versions:
- 9.4.0
- 10.2.0
- 11.1.0
- 12.0.0-beta.9
### Workarounds
There are no workarounds for this issue.
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
|
{'CVE-2020-26272'}
|
2021-01-28T19:11:05Z
|
2021-01-28T19:11:34Z
|
MODERATE
| null |
{'CWE-668'}
|
{'https://www.electronjs.org/releases/stable?version=9#9.4.0', 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c', 'https://github.com/electron/electron/releases/tag/v9.4.0', 'https://github.com/electron/electron/pull/26875', 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26272'}
| null |
npm
|
GHSA-224h-p7p5-rh85
|
Directory Traversal in wenluhong1
|
Affected versions of `wenluhong1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2021-09-23T21:43:28Z
|
2020-09-01T17:32:26Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/npm:wenluhong1:20170509', 'https://www.npmjs.com/advisories/409', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wenluhong1'}
| null |
npm
|
GHSA-hh27-ffr2-f2jc
|
Open redirect in url-parse
|
# Overview
Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.
# Impact
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
|
{'CVE-2021-3664'}
|
2021-08-10T16:06:59Z
|
2021-08-10T16:07:08Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/unshiftio/url-parse/issues/206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3664', 'https://github.com/unshiftio/url-parse/issues/205', 'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0', 'https://github.com/unshiftio/url-parse', 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse'}
| null |
npm
|
GHSA-6fjr-m7v6-fpg9
|
Exfiltrates data on installation in jquey
|
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `jquey` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16204'}
|
2021-01-08T19:45:24Z
|
2018-08-06T21:41:38Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16204', 'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9', 'https://nodesecurity.io/advisories/544', 'https://www.npmjs.com/advisories/544'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.