ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-9qgh-7pgp-hp7r
Cross-Site Scripting in graylog-web-interface
All versions of `graylog-web-interface` are vulnerable to Cross-Site Scripting (XSS). The package fails to escape output on the `TypeAhead` and `QueryInput` components, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:44:42Z
2020-09-03T17:10:31Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1028'}
null
npm
GHSA-hxcm-v35h-mg2x
Prototype Pollution
A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.
null
2021-02-25T17:25:43Z
2019-06-07T21:12:50Z
HIGH
null
{'CWE-1312'}
{'https://github.com/unshiftio/querystringify/pull/19', 'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'}
null
npm
GHSA-p7j5-4mwm-hv86
Cross-site scripting in TinyMCE
TinyMCE before 4.9.7 and 5.x before 5.1.4 allows XSS in the core parser, the paste plugin, and the visualchars plugin by using the clipboard or APIs to insert content into the editor.
{'CVE-2020-17480'}
2021-05-05T22:23:10Z
2021-05-06T17:28:14Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17480', 'https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}
null
npm
GHSA-xf5p-87ch-gxw2
Regular Expression Denial of Service in marked
Versions of `marked` prior to 0.6.2 and later than 0.3.14 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion. ## Recommendation Upgrade to version 0.6.2 or later.
null
2021-08-04T20:53:01Z
2019-06-05T14:10:03Z
MODERATE
null
{'CWE-400'}
{'https://github.com/markedjs/marked/issues/1070', 'https://snyk.io/vuln/SNYK-JS-MARKED-174116', 'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d', 'https://github.com/markedjs/marked/pull/1460', 'https://www.npmjs.com/advisories/812'}
null
npm
GHSA-f8jj-45fj-44r6
Malicious Package in js-she3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:13:39Z
2020-09-03T23:05:43Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1287'}
null
npm
GHSA-3vjf-82ff-p4r3
Incorrect protocol extraction via \r, \n and \t characters
\r, \n and \t characters in user-input URLs can potentially lead to incorrect protocol extraction when using npm package urijs prior to version 1.19.11. This can lead to XSS when the module is used to prevent passing in malicious javascript: links into HTML or Javascript (see following example): ```` const parse = require('urijs') const express = require('express') const app = express() const port = 3000 input = "ja\r\nvascript:alert(1)" url = parse(input) console.log(url) app.get('/', (req, res) => { if (url.protocol !== "javascript:") {res.send("<iframe src=\'" + input + "\'>CLICK ME!</iframe>")} }) app.listen(port, () => { console.log(`Example app listening on port ${port}`) }) ````
{'CVE-2022-1243'}
2022-04-14T20:13:56Z
2022-04-06T00:01:31Z
HIGH
null
{'CWE-20'}
{'https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1243', 'https://github.com/medialize/uri.js', 'https://github.com/medialize/uri.js/commit/b0c9796aa1a95a85f40924fb18b1e5da3dc8ffae'}
null
npm
GHSA-2877-693q-pj33
OS Command Injection in GenieACS
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
{'CVE-2021-46704'}
2022-03-14T21:30:21Z
2022-03-07T00:00:40Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/genieacs/genieacs', 'https://github.com/genieacs/genieacs/releases/tag/v1.2.8', 'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704'}
null
npm
GHSA-j4f2-536g-r55m
Resource exhaustion in engine.io
Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
{'CVE-2020-36048'}
2021-04-06T22:58:33Z
2022-02-09T22:29:04Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36048', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b', 'https://blog.caller.xyz/socketio-engineio-dos/'}
null
npm
GHSA-8gv6-g7vp-hr34
Hijacked Environment Variables in mysqljs
The `mysqljs` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16047'}
2020-08-31T18:25:17Z
2020-09-01T18:58:47Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16047', 'https://www.npmjs.com/advisories/494', 'https://nodesecurity.io/advisories/494'}
null
npm
GHSA-vr5m-3h59-7jcp
Prototype Pollution in think-helper
### Impact The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. ### Patches `think-helper@1.1.3` patched it, anyone used `think-helper` should upgrade to `>=1.1.3` version. ### References https://cwe.mitre.org/data/definitions/1321.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs) * Email us at [i@imnerd.org](mailto:i@imnerd.org)
{'CVE-2021-32736'}
2021-06-30T17:40:38Z
2021-07-01T17:01:59Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32736', 'https://github.com/thinkjs/think-helper/security/advisories/GHSA-vr5m-3h59-7jcp'}
null
npm
GHSA-992f-wf4w-x36v
Prototype Pollution in merge-objects
All versions of `merge-objects` are vulnerable to Prototype Pollution. ## Recommendation No fix is available for this vulnerability at this time. It is our recommendation to use an alternative package.
null
2020-08-31T18:33:09Z
2020-09-01T21:16:13Z
LOW
null
{'CWE-1321'}
{'https://hackerone.com/reports/310706', 'https://www.npmjs.com/advisories/716'}
null
npm
GHSA-vv52-3mrp-455m
Malicious Package in m-backdoor
All versions of `m-backdoor` contain malicious code. The package downloads a file from a remote server and executes it as a preinstall script. At the time of the release of this advisory the downloaded file only defaces websites by removing elements randomly from the DOM. ## Recommendation Remove the package from your system.
null
2020-08-31T19:01:56Z
2020-09-03T15:53:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1513'}
null
npm
GHSA-54xj-q58h-9x57
Arbitrary File Write in iobroker.admin
Versions of `iobroker.admin` prior to 3.6.12 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended folder in the `/log/` route, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default. ## Recommendation Upgrade to version 3.6.12 or later.
{'CVE-2019-10765'}
2021-10-01T20:14:10Z
2020-09-04T15:24:56Z
CRITICAL
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1346', 'https://snyk.io/vuln/SNYK-JS-IOBROKERADMIN-534634', 'https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10765'}
null
npm
GHSA-3wjm-33mw-h388
Malicious Package in s3asy
Version 0.4.8 of `s3asy` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.4.8 of this module is found installed you will want to replace it with a version before or after 0.4.8. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:46Z
2020-09-01T20:34:14Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/636'}
null
npm
GHSA-3gx7-xhv7-5mx3
Arbitrary Code Execution in eslint-utils
Versions of `eslint-utils` >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The `getStaticValue` does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The `getStringIfConstant` and `getPropertyName` functions are not affected. ## Recommendation Upgrade to version 1.4.1 or later.
{'CVE-2019-15657'}
2021-08-31T21:04:30Z
2019-08-26T16:59:56Z
CRITICAL
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/1118', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15657', 'https://github.com/advisories/GHSA-3gx7-xhv7-5mx3', 'https://github.com/mysticatea/eslint-utils', 'https://github.com/mysticatea/eslint-utils/security/advisories/GHSA-3gx7-xhv7-5mx3', 'https://eslint.org/blog/2019/08/eslint-v6.2.1-released'}
null
npm
GHSA-4vcm-qfxh-p6c3
Directory Traversal in getcityapi.yoehoehne
Affected versions of `getcityapi.yoehoehne` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16192'}
2020-08-31T18:23:09Z
2018-07-23T20:40:29Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-4vcm-qfxh-p6c3', 'https://www.npmjs.com/advisories/438', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/getcityapi.yoehoehne', 'https://nodesecurity.io/advisories/438', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16192'}
null
npm
GHSA-q54r-r9pr-w7qv
XSS in Hexo
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.
{'CVE-2021-25987'}
2021-12-01T16:15:32Z
2021-12-01T18:27:44Z
MODERATE
null
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987', 'https://github.com/hexojs/hexo', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25987', 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}
null
npm
GHSA-w5mp-8p8w-mhh8
Command injection in connection-tester
This affects the package connection-tester before 0.2.1. The injection point is located in line 15 in index.js. Affected versions of this package are vulnerable to Command Injection
{'CVE-2020-7781'}
2021-01-07T22:35:45Z
2020-12-17T21:00:53Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-CONNECTIONTESTER-1048337', 'https://github.com/skoranga/node-connection-tester/pull/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7781'}
null
npm
GHSA-ffxg-xm4w-3wg9
Command Injection in corenlp-js-interface
All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.
{'CVE-2020-28440'}
2020-12-17T22:23:13Z
2020-12-18T18:23:04Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-CORENLPJSINTERFACE-1050435', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28440'}
null
npm
GHSA-fwhp-2hqr-6g72
Downloads Resources over HTTP in pk-app-wonderbox
Affected versions of `pk-app-wonderbox` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pk-app-wonderbox`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10685'}
2021-01-08T18:50:49Z
2019-02-18T23:42:01Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10685', 'https://github.com/advisories/GHSA-fwhp-2hqr-6g72', 'https://www.npmjs.com/advisories/289', 'https://nodesecurity.io/advisories/289'}
null
npm
GHSA-rqwh-c535-j9hw
Downloads Resources over HTTP in js-given
Affected versions of `js-given` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `js-given`. ## Recommendation Update to version 0.0.18 or later.
{'CVE-2016-10638'}
2021-01-08T01:57:52Z
2019-02-18T23:47:09Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-rqwh-c535-j9hw', 'https://www.npmjs.com/advisories/241', 'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)', 'https://nodesecurity.io/advisories/241', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10638'}
null
npm
GHSA-vh6r-g38f-q3w8
Validation bypass in jpv
jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.
{'CVE-2020-17479'}
2021-05-05T22:34:04Z
2021-05-06T17:27:58Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/manvel-khnkoyan/jpv/issues/10', 'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6', 'https://blog.sonatype.com/cve-2020-17479', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17479', 'https://www.npmjs.com/package/jpv'}
null
npm
GHSA-x87g-rgrh-r6g3
Malicious Package in rpc-websocket
Versions of `rpc-websocket` >= 0.7.6 contained malicious code. The package opens a backdoor to a remote server and executes arbitrary commands, effectively acting as a backdoor. ## Recommendation Any computer that has these versions of the package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T17:16:09Z
2020-09-03T17:07:15Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1022'}
null
npm
GHSA-9mjp-gv34-3jcf
Malicious Package in aasync
All versions of `aasync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:55:21Z
2020-09-02T18:37:35Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/844'}
null
npm
GHSA-x268-6jhm-2mx8
Downloads Resources over HTTP in libsbmlsim
Affected versions of `libsbmlsim` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbmlsim`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10675'}
2021-01-08T00:47:49Z
2019-02-18T23:42:22Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/275', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10675', 'https://github.com/advisories/GHSA-x268-6jhm-2mx8', 'https://www.npmjs.com/advisories/275'}
null
npm
GHSA-g64q-3vg8-8f93
Prototype Pollution in subtext
All versions of `subtext` are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. ## Recommendation This package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
null
2021-10-04T20:58:50Z
2020-09-03T15:47:10Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1479'}
null
npm
GHSA-vv6q-9cfw-4c83
Hijacked Environment Variables in smb
The `smb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16079'}
2020-08-31T18:26:11Z
2018-08-29T23:20:27Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/518', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16079', 'https://www.npmjs.com/advisories/518', 'https://github.com/advisories/GHSA-vv6q-9cfw-4c83'}
null
npm
GHSA-4qqc-mp5f-ccv4
Command Injection in bestzip
Versions of `bestzip` prior to 2.1.7 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `zip` function . This may allow attackers to execute arbitrary code in the system as long as the values of `destination` is user-controlled. This only affects users with a native `zip` command available. The following examples demonstrate the issue from the CLI and also programatically: - `bestzip test.zip 'sourcefile; mkdir folder'` - `zip({ source: 'sourcefile', destination: './test.zip; mkdir folder' })`
null
2020-09-02T15:04:08Z
2020-09-02T15:05:51Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1554'}
null
npm
GHSA-r8hm-w5f7-wj39
Cross-site scripting vulnerability in TinyMCE plugins
### Impact A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.10.0 or higher - Disable the `image` and `link` plugins ### Acknowledgements Tiny Technologies would like to thank Yakir6 for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
null
2022-03-03T05:13:05.261265Z
2021-11-02T15:42:52Z
MODERATE
null
{'CWE-79', 'CWE-64'}
{'https://pypi.org/project/django-tinymce/3.4.0/', 'https://github.com/jazzband/django-tinymce/issues/366', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39', 'https://github.com/tinymce/tinymce', 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0'}
null
npm
GHSA-5645-gc7h-98h8
Malicious Package in react-dates-sc
Version 0.3.0 of `react-dates-sc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.3.0 of this module is found installed you will want to replace it with a version before or after 0.3.0. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:42Z
2020-09-01T20:32:07Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/634'}
null
npm
GHSA-2548-q746-x5x6
Code injection in port-killer
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
{'CVE-2021-23359'}
2021-03-22T20:46:47Z
2021-04-13T15:20:49Z
HIGH
null
{'CWE-77', 'CWE-20'}
{'https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23359', 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533'}
null
npm
GHSA-64g7-mvw6-v9qj
Improper Privilege Management in shelljs
### Impact Output from the synchronous version of `shell.exec()` may be visible to other users on the same system. You may be affected if you execute `shell.exec()` in multi-user Mac, Linux, or WSL environments, or if you execute `shell.exec()` as the root user. Other shelljs functions (including the asynchronous version of `shell.exec()`) are not impacted. ### Patches Patched in shelljs 0.8.5 ### Workarounds Recommended action is to upgrade to 0.8.5. ### References https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/ ### For more information If you have any questions or comments about this advisory: * Ask at https://github.com/shelljs/shelljs/issues/1058 * Open an issue at https://github.com/shelljs/shelljs/issues/new
null
2022-01-14T20:50:57Z
2022-01-14T21:09:50Z
MODERATE
null
{'CWE-269'}
{'https://github.com/shelljs/shelljs', 'https://github.com/shelljs/shelljs/security/advisories/GHSA-64g7-mvw6-v9qj', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/'}
null
npm
GHSA-mpcf-4gmh-23w8
Regular Expression Denial of Service in forwarded
Affected versions of `forwarded` are vulnerable to regular expression denial of service when parsing specially crafted user input. ## Recommendation Update to version 0.1.2 or later
{'CVE-2017-16118'}
2020-08-31T18:26:30Z
2018-07-24T20:16:30Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/527', 'http://www.securityfocus.com/bid/104427', 'https://github.com/advisories/GHSA-mpcf-4gmh-23w8', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16118', 'https://nodesecurity.io/advisories/527'}
null
npm
GHSA-pp57-mqmh-44h7
Command Injection in macaddress
All versions of `macaddress` are vulnerable to command injection. For this vulnerability to be exploited an attacker needs to control the `iface` argument to the `one` method. ## Recommendation Update to version 0.2.9 or later.
{'CVE-2018-13797'}
2021-09-16T18:18:02Z
2018-09-06T23:24:21Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/scravy/node-macaddress', 'https://www.npmjs.com/advisories/654', 'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332', 'https://github.com/scravy/node-macaddress/pull/20/', 'https://hackerone.com/reports/319467', 'https://github.com/advisories/GHSA-pp57-mqmh-44h7', 'https://news.ycombinator.com/item?id=17283394', 'https://github.com/scravy/node-macaddress/pull/20', 'https://github.com/scravy/node-macaddress/releases/tag/0.2.9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13797'}
null
npm
GHSA-f52g-6jhx-586p
Denial of Service in handlebars
Affected versions of `handlebars` are vulnerable to Denial of Service. The package's parser may be forced into an endless loop while processing specially-crafted templates. This may allow attackers to exhaust system resources leading to Denial of Service. ## Recommendation Upgrade to version 4.4.5 or later.
null
2020-08-31T18:54:21Z
2020-09-03T23:20:12Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1300'}
null
npm
GHSA-6vrv-94jv-crrg
Context isolation bypass via Promise in Electron
### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `9.0.0-beta.21` * `8.2.4` * `7.2.4` * `6.1.11` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-15096'}
2021-01-07T23:48:19Z
2020-07-07T00:01:05Z
LOW
null
{'CWE-501'}
{'https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15096', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
null
npm
GHSA-92vm-wfm5-mxvv
Timing Attack in cookie-signature
Affected versions of `cookie-signature` are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences. Under favorable network conditions, an attacker can exploit this to guess the secret in no more than `charset*length` guesses, instead of `charset^length` guesses required were the timing attack not present. ## Recommendation Update to 1.0.6 or later.
{'CVE-2016-1000236'}
2021-08-19T16:16:59Z
2020-01-06T18:44:10Z
MODERATE
null
{'CWE-362'}
{'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590', 'https://www.npmjs.com/advisories/134', 'https://www.mail-archive.com/secure-testing-team@lists.alioth.debian.org/msg06583.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000236', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838618', 'https://bugzilla.redhat.com/show_bug.cgi?id=1371409', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000236', 'https://security-tracker.debian.org/tracker/CVE-2016-1000236', 'https://travis-ci.com/nodejs/security-wg/builds/76423102', 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07', 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e'}
null
npm
GHSA-28gr-86hg-r48w
Unauthenticated Remote Command Injection in ep_imageconvert
ep_imageconvert is a plugin for [Etherpad Lite](https://github.com/ether/etherpad-lite). ep_imageconvert <= 0.0.2 is vulnerable to remote command injection. Authentication is not required for remote exploitation. ## Recommendation Update to version 0.0.3 or greater.
{'CVE-2013-3364'}
2021-09-23T19:27:57Z
2020-08-31T22:43:31Z
HIGH
null
{'CWE-77'}
{'https://github.com/redhog/ep_imageconvert', 'https://github.com/redhog/ep_imageconvert/pull/5', 'https://snyk.io/vuln/npm:ep_imageconvert:20130506', 'https://www.npmjs.com/advisories/7', 'https://nvd.nist.gov/vuln/detail/CVE-2013-3364'}
null
npm
GHSA-9qgm-w87q-hx89
Unrestricted Upload of File with Dangerous Type in Strapi
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
{'CVE-2022-27263'}
2022-04-22T21:03:44Z
2022-04-13T00:00:25Z
CRITICAL
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27263', 'https://github.com/strapi/strapi', 'https://www.youtube.com/watch?v=LEeabouqRrg'}
null
npm
GHSA-85g2-29m8-qf2p
Prototype Pollution Vulnerability in object-collider
Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25914'}
2021-03-16T22:49:14Z
2021-03-19T21:18:33Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914', 'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25914'}
null
npm
GHSA-hwhq-3hrj-v6v5
Hijacked Environment Variables in cross-env.js
The `cross-env.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16081'}
2020-08-31T18:26:15Z
2020-09-01T19:00:54Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16081', 'https://nodesecurity.io/advisories/520', 'https://www.npmjs.com/advisories/520'}
null
npm
GHSA-88xx-23mf-rcj2
Malicious Package in bs-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:18:52Z
2020-09-03T22:51:52Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1274'}
null
npm
GHSA-67mp-pcv9-vvq6
Malicious Package in jr-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:35:36Z
2020-09-03T22:57:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1279'}
null
npm
GHSA-r8j5-h5cx-65gg
ReDOS in IS-SVG
A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
{'CVE-2021-29059'}
2021-12-10T19:02:24Z
2021-12-10T19:02:37Z
HIGH
null
{'CWE-770'}
{'https://www.npmjs.com/package/is-svg', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0', 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02', 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js', 'https://github.com/sindresorhus/is-svg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29059', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md'}
null
npm
GHSA-6hr9-4692-fch9
OS Command Injection in effect
effect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.
{'CVE-2020-7624'}
2021-07-28T22:11:47Z
2022-02-10T23:45:54Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/Javascipt/effect/blob/master/helper.js#L24,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7624', 'https://snyk.io/vuln/SNYK-JS-EFFECT-564256'}
null
npm
GHSA-f7g4-fm4c-54m9
Malicious Package in yeoman-genrator
Version 2.0.2 of `yoeman-generator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:45:57Z
2020-09-03T21:06:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1198'}
null
npm
GHSA-jpq3-xf27-5jf2
Prototype Pollution in safe-object2
All versions of package safe-object2 are vulnerable to Prototype Pollution via the setter function.
{'CVE-2020-7726'}
2021-05-04T23:40:42Z
2021-05-06T18:26:42Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-SAFEOBJECT2-598801', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7726'}
null
npm
GHSA-6c37-2rw5-9j7x
Malicious Package in requesst
All versions of `requesst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:04:27Z
2020-09-02T20:25:46Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/857'}
null
npm
GHSA-53jx-4wwh-gcqj
Malicious Package in angular-location-update
Version 0.0.3 of `angular-location-update` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:40:55Z
2020-09-11T21:11:34Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/930'}
null
npm
GHSA-4228-7qvx-f4rq
Injection and Command Injection in devcert
A command injection vulnerability in the `devcert` module may lead to remote code execution when users of the module pass untrusted input to the `certificateFor` function.
{'CVE-2020-8186'}
2021-05-11T17:26:32Z
2021-05-18T01:41:56Z
HIGH
null
{'CWE-74', 'CWE-77', 'CWE-78'}
{'https://hackerone.com/reports/863544', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8186'}
null
npm
GHSA-qccf-q7p4-3q3j
Prototype Pollution in safe-object2
All versions of `safe-object2` are vulnerable to prototype pollution. The `settter()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:32Z
2020-09-04T15:16:42Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1335'}
null
npm
GHSA-wc7q-qpm4-8pqv
Malicious Package in rrequest
All versions of `rrequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:07:12Z
2020-09-02T20:32:10Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/862'}
null
npm
GHSA-3mhm-jvqj-fvhg
Malicious Package in js-sia3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:14:42Z
2020-09-03T23:09:37Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1290'}
null
npm
GHSA-45w5-pvr8-4rh5
Command injection in eslint-fixer
The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted.
{'CVE-2021-26275'}
2021-03-26T22:09:16Z
2021-04-13T15:19:14Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/package/eslint-fixer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26275', 'https://advisory.checkmarx.net/advisory/CX-2021-4774'}
null
npm
GHSA-p94w-42g3-f7h4
Holder can (re)create authentic credentials after receiving a credential in vp-toolkit
### Impact The [`verifyVerifiableCredential()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-credential-signer.ts#L57) method check the cryptographic integrity of the Verifiable Credential, but it does not check if the [`credential.issuer`](https://github.com/rabobank-blockchain/vp-toolkit-models/blob/develop/src/model/verifiable-credential.ts#L129) DID matches the signer of the credential. The **verifier** is impacted by this vulnerability. ### Patches Patch will be available in version 0.2.2. ### Workarounds In case you trust certain issuers for certain credentials as a verifier, trust the issuer&#39;s public key from the `credential.proof.verificationMethod` field. ### References [Github issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13) ### For more information If you have any questions or comments about this advisory: * Discuss in the existing [issue](https://github.com/rabobank-blockchain/vp-toolkit/issues/13) * [Contact me](https://github.com/rabomarnix)
null
2020-02-28T16:38:09Z
2020-03-06T01:16:00Z
HIGH
null
null
{'https://github.com/rabobank-blockchain/vp-toolkit/issues/13', 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-p94w-42g3-f7h4', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'}
null
npm
GHSA-h5vj-f7r9-w564
Entropy Backdoor in text-qrcode
All versions of `text-qrcode` contain malicious code that overwrites the `randomBytes` method for the `crypto` module with a function that generates weak entropy. Instead of generating 32 bytes, the infected randomBytes will generate 3 bytes of entropy and hash them, resulting in a 32 byte value being returned, but one that is easily guessable. ## Recommendation Uninstall `text-qrcode` immediately. If the module was used to generate entropy that is load bearing, all such instances of generated entropy must be replaced. This includes things like bitcoin wallets, private keys, encrypted messages, etc.
null
2021-10-01T13:30:18Z
2020-09-01T21:22:35Z
HIGH
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/738'}
null
npm
GHSA-5q54-8p9j-x74j
Cross-site Scripting in pandao editor.md
pandao Editor.md 1.5.0 allows XSS via the Javas&#99;ript: string.
{'CVE-2019-14517'}
2021-08-17T21:59:57Z
2019-08-23T00:05:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pandao/editor.md/issues/709', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14517'}
null
npm
GHSA-gvm7-8fq3-qjj2
Malicious Package in bs85
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:50:15Z
2020-09-03T19:43:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1378'}
null
npm
GHSA-g3r2-65gc-qpqc
Denial of Service in mqtt-packet
Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application. ## Recommendation Version 3.x: Update to version 3.4.6 or later. Version 4.x: Update to version 4.0.5 or later.
{'CVE-2016-10523'}
2021-01-08T18:50:02Z
2019-02-18T23:38:45Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10523', 'https://github.com/mcollina/mosca/issues/393', 'https://www.npmjs.com/advisories/75', 'https://nodesecurity.io/advisories/75', 'https://github.com/mqttjs/mqtt-packet/pull/8', 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc'}
null
npm
GHSA-4wv4-mgfq-598v
Code injection in nobelprizeparser
Code injection through use of eval.
null
2021-03-12T19:13:27Z
2021-03-12T23:00:19Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286', 'https://www.npmjs.com/package/nobelprizeparser'}
null
npm
GHSA-jxcc-g75x-qgw9
Arbitrary File Write via Archive Extraction (Zip Slip)
This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality.
{'CVE-2021-23391'}
2021-06-08T16:15:33Z
2021-06-08T18:47:18Z
HIGH
null
{'CWE-668', 'CWE-29'}
{'https://github.com/cliftonc/calipso', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23391', 'https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555'}
null
npm
GHSA-m4vv-p6fq-jhqp
Directory Traversal in @vivaxy/here
The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root. It is vulnerable to a directory traversal attack. This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files. Mitigating Factors: If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information. Proof of Concept: ``` curl "http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd" ``` ## Recommendation Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability.
null
2021-09-23T21:48:53Z
2020-09-01T19:04:07Z
HIGH
null
{'CWE-22'}
{'https://github.com/vivaxy/here', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://www.npmjs.com/advisories/557'}
null
npm
GHSA-pm9v-325f-5g74
Malicious Package in saync
All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T21:26:49Z
2020-09-02T21:30:11Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/896'}
null
npm
GHSA-h86x-mv66-gr5q
OS Command Injection in Locutus
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
{'CVE-2020-13619'}
2021-07-26T19:28:18Z
2021-07-26T21:21:43Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13619', 'https://reallinkers.github.io/CVE-2020-13619/', 'https://locutus.io/php/', 'https://www.npmjs.com/package/locutus'}
null
npm
GHSA-wq7q-5v6j-xfv6
Command Injection in picotts
This affects all versions up to and including version 0.1.1 of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23378'}
2021-05-06T22:36:14Z
2021-05-07T16:06:11Z
CRITICAL
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23378', 'https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942398c8b/index.js%23L16'}
null
npm
GHSA-3grc-fgh6-g5gp
Directory Traversal in http_static_simple
Affected versions of `http_static_simple` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16134'}
2020-08-31T18:24:26Z
2018-07-23T22:08:39Z
HIGH
null
{'CWE-22', 'CWE-12'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16134', 'https://www.npmjs.com/advisories/472', 'https://github.com/advisories/GHSA-3grc-fgh6-g5gp', 'https://nodesecurity.io/advisories/472', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple'}
null
npm
GHSA-gvg7-pp82-cff3
Cross-Site Scripting in c3
Affected versions of `c3` are vulnerable to cross-site scripting via improper sanitization of HTML in rendered tooltips. ## Recommendation Update to 0.4.11 or later.
{'CVE-2016-1000240'}
2021-09-23T21:36:05Z
2020-09-01T15:59:11Z
MODERATE
null
{'CWE-79'}
{'https://github.com/c3js/c3', 'https://github.com/c3js/c3/issues/1536', 'https://www.npmjs.com/advisories/138', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000240'}
null
npm
GHSA-73cw-jxmm-qpgh
Path Traversal in localhost-now
All versions of `localhost-now` are vulnerable to path traversal. This vulnerability is a bypass to the path traversal fix introduced in version 1.0.2 Proof of concept: ``` $ curl -v --path-as-is "http://IP:5432/..././..././..././..././..././..././..././..././..././..././etc/passwd" ``` ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
null
2020-08-31T18:31:31Z
2019-06-11T16:40:48Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/655', 'https://hackerone.com/reports/329837', 'https://github.com/DCKT/localhost-now/blob/master/lib/app.js#L17', 'https://www.npmjs.com/advisories/655'}
null
npm
GHSA-xhjx-mfr6-9rr4
Command Injection in samsung-remote
Versions of `samsung-remote` before 1.3.5 are vulnerable to command injection. This vulnerability is exploitable if user input is passed into the `ip` option of the package constructor. ## Recommendation Update to version 1.3.5 or later.
null
2020-08-31T18:33:52Z
2020-09-01T21:20:28Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/465.json', 'https://hackerone.com/reports/394294', 'https://www.npmjs.com/advisories/734'}
null
npm
GHSA-39q4-p535-c852
Uncontrolled Resource Consumption in locutus
The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.
{'CVE-2021-23392'}
2021-06-16T20:02:14Z
2021-06-10T17:25:05Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597', 'https://github.com/locutusjs/locutus/pull/446', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392', 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}
null
npm
GHSA-c2g6-57fp-22wp
Malicious Package in fuffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:14:29Z
2020-09-03T22:48:35Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1271'}
null
npm
GHSA-pjxp-f379-6284
Malicious Package in @fangrong/xoc
Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:24Z
2020-09-03T19:13:27Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1104'}
null
npm
GHSA-hw4r-xr38-hm8j
Downloads Resources over HTTP in unicode-json
Affected versions of `unicode-json` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Install version 2.0.0 or greater.
{'CVE-2016-10610'}
2021-01-08T18:39:28Z
2019-02-18T23:47:59Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/206', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10610', 'https://nodesecurity.io/advisories/206', 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j'}
null
npm
GHSA-9c22-pwxw-p6hx
Initializer reentrancy may lead to double initialization
### Impact Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution. Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor. ### Patches A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Avoid untrusted external calls during initialization. ### References https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006 ### Credits This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
null
2021-12-14T19:22:45Z
2021-12-14T21:47:33Z
LOW
null
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}
null
npm
GHSA-crfx-5phg-hmw9
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2020-08-31T18:41:52Z
2019-06-13T18:59:12Z
HIGH
null
{'CWE-79'}
{'https://github.com/infor-design/enterprise-ng/issues/502', 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1', 'https://www.npmjs.com/advisories/955'}
null
npm
GHSA-q674-xm3x-2926
Uncontrolled Resource Consumption in parse-link-header
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
{'CVE-2021-23490'}
2022-01-07T16:08:29Z
2022-01-06T21:37:02Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783', 'https://github.com/thlorenz/parse-link-header', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490', 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973'}
null
npm
GHSA-p2r2-h92r-w2mg
Directory Traversal in mfrserver
Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16213'}
2020-08-31T18:22:29Z
2020-09-01T18:11:03Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213', 'https://nodesecurity.io/advisories/421', 'https://www.npmjs.com/advisories/421'}
null
npm
GHSA-4q8f-5xxj-946r
Command Injection in addax
Versions of `addax` prior to 1.1.0 are vulnerable to Command Injection. The package does not validate user input on the `presignPath` function which receives input directly from the API endpoint. Exploiting the vulnerability requires authentication. This may allow attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 1.1.0 or later.
null
2020-08-31T18:41:49Z
2020-09-03T02:40:51Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/954'}
null
npm
GHSA-226w-6hhj-69hp
Malicious Package in cal_rd
Version 0.1.1 of `rc_cal` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T20:06:59Z
2020-09-03T19:06:52Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1098'}
null
npm
GHSA-cfwc-xjfp-44jg
Command Injection in gnuplot
All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory: ``` var gnuplot = require('gnuplot'); const title = '"\nset title system("touch testing")\n#'; gnuplot() .set('term png') .set('output "out.png"') .set(`title "${title}"`) .set('xrange [-10:10]') .set('yrange [-2:2]') .set('zeroaxis') .plot('(x/4)**2, sin(x), 1/x') .end(); ``` ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:59:23Z
2020-09-04T17:19:48Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1440'}
null
npm
GHSA-x8rq-rc7x-5fg5
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF)
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses.
{'CVE-2022-0086'}
2022-02-24T18:44:54Z
2022-01-06T22:24:35Z
HIGH
null
{'CWE-918'}
{'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f', 'https://github.com/transloadit/uppy/pull/3403', 'https://github.com/transloadit/uppy/', 'https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122', 'https://github.com/transloadit/uppy/releases/tag/uppy%402.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0086'}
null
npm
GHSA-vcjj-xf2r-mwvc
XSS in knockout
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
{'CVE-2019-14862'}
2022-04-25T23:07:31Z
2020-04-01T15:47:45Z
MODERATE
null
{'CWE-79'}
{'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/knockout/knockout/issues/1244', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14862', 'https://snyk.io/vuln/npm:knockout:20180213', 'https://github.com/knockout/knockout/pull/2345'}
null
npm
GHSA-px4h-xg32-q955
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
{'CVE-2021-33502'}
2021-10-27T17:04:15Z
2021-06-08T23:11:43Z
HIGH
null
{'CWE-400'}
{'https://github.com/sindresorhus/normalize-url', 'https://security.netapp.com/advisory/ntap-20210706-0001/', 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502', 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}
null
npm
GHSA-6x33-pw7p-hmpq
Denial of Service in http-proxy
Versions of `http-proxy` prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an `ERR_HTTP_HEADERS_SENT` unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the `proxyReq.setHeader` function. For a proxy server running on `http://localhost:3000`, the following curl request triggers the unhandled exception: ```curl -XPOST http://localhost:3000 -d "$(python -c 'print("x"*1025)')"``` ## Recommendation Upgrade to version 1.18.1 or later
null
2020-08-31T19:01:05Z
2020-09-04T17:59:49Z
HIGH
null
null
{'https://github.com/http-party/node-http-proxy/pull/1447/files', 'https://www.npmjs.com/advisories/1486'}
null
npm
GHSA-657v-jjf8-83gh
Malicious Package in jsmsha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:37:41Z
2020-09-03T23:14:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1295'}
null
npm
GHSA-vm64-cfqx-3698
Code Injection in jsen
This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so I assume that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a Function.apply();, leading to an Arbitrary Code Execution.
{'CVE-2020-7777'}
2022-02-10T20:18:37Z
2022-02-10T20:18:37Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7777'}
null
npm
GHSA-xp9c-82x8-7f67
Prototype Pollution in Node-Red
### Impact Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. ### Patches The vulnerability is patched in the 1.2.8 release. ### Workarounds A workaround is to ensure only authorised users are able to access the editor url. ### For more information If you have any questions or comments about this advisory: * Email us at [team@nodered.org](mailto:team@nodered.org) ### Acknowledgements Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
{'CVE-2021-21297'}
2021-09-22T13:55:00Z
2021-02-26T16:31:05Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://www.npmjs.com/package/@node-red/runtime', 'https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67', 'https://www.npmjs.com/package/@node-red/editor-api', 'https://github.com/node-red/node-red', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21297'}
null
npm
GHSA-qjmq-8hjr-qcv6
SQL Injection when creating an application with Reactive SQL backend
### Impact SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected. If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default. Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria. ## Impacted applications - Monolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities) - Gateway applications with SQL database (issue will appear only when generating entities) ### Patches Patched in v7.8.1 The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications. If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions. ### Workarounds The problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`. `just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL So be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`. ### Example ```java Criteria criteria = Criteria.where("name").is("foobar';DROP TABLE example;--"); // parameter is user provided input criteria.toString(); // --> "'foobar';DROP TABLE example;--'" ``` ### References [More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269) ### For more information If you have any questions or comments about this advisory: * Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
{'CVE-2022-24815'}
2022-04-18T22:20:12Z
2022-04-07T15:18:05Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24815', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6', 'https://github.com/jhipster/generator-jhipster/issues/18269', 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98', 'https://github.com/jhipster/generator-jhipster'}
null
npm
GHSA-8gwj-8hxc-285w
Prototype Pollution in json-ptr
This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
{'CVE-2021-23509'}
2021-11-08T17:43:16Z
2021-11-08T17:43:27Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509', 'https://github.com/flitbit/json-ptr/pull/42', 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca', 'https://github.com/flitbit/json-ptr'}
null
npm
GHSA-g2q5-5433-rhrf
Embedded malware in rc
The npm package `rc` had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-11-04T18:47:00Z
2021-11-04T16:24:44Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/package/rc', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/dominictarr/rc'}
null
npm
GHSA-58f5-hfqc-jgch
Padding Oracle Attack due to Observable Timing Discrepancy in jose
jose is an npm library providing a number of cryptographic operations. ### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`. Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4) ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29443'}
2021-04-16T23:01:38Z
2021-04-19T14:57:22Z
MODERATE
null
{'CWE-696', 'CWE-203'}
{'https://www.npmjs.com/package/jose', 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}
null
npm
GHSA-7f53-fmmv-mfjv
Regular expression denial of service in react-native
A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.
{'CVE-2020-1920'}
2021-06-10T14:10:51Z
2021-07-20T17:33:28Z
HIGH
null
{'CWE-400'}
{'https://securitylab.github.com/advisories/GHSL-2020-293-redos-react-native/', 'https://github.com/facebook/react-native/releases/tag/v0.64.1', 'https://github.com/facebook/react-native/releases/tag/v0.62.3', 'https://www.npmjs.com/package/react-native', 'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920'}
null
npm
GHSA-2r2c-g63r-vccr
Improper Verification of Cryptographic Signature in `node-forge`
### Impact RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:security@digitalbazaar.com)
{'CVE-2022-24773'}
2022-03-18T23:10:48Z
2022-03-18T23:10:48Z
MODERATE
null
{'CWE-347'}
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773'}
null
npm
GHSA-wg6g-ppvx-927h
Prototype Pollution in cached-path-relative
The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573
{'CVE-2021-23518'}
2022-01-27T14:26:40Z
2022-01-27T14:27:53Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653', 'https://github.com/ashaffer/cached-path-relative', 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23518'}
null
npm
GHSA-mpjf-8cmf-p789
Cross-Site Scripting in jingo
Versions of `jingo` prior to 1.9.2 are vulnerable to Cross-Site Scripting (XSS). If malicious input such as `<script>alert(1)</script>` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text. ## Recommendation Upgrade to version 1.9.2
null
2020-08-31T18:34:28Z
2020-09-01T21:25:46Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/750'}
null
npm
GHSA-h87q-g2wp-47pj
Signatures are mistakenly recognized to be valid in jsrsasign
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
null
2022-02-15T01:51:57Z
2022-02-09T22:41:19Z
MODERATE
null
{'CWE-347'}
{'https://github.com/kjur/jsrsasign/releases/tag/10.2.0', 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/issues/478'}
null
npm
GHSA-hvf8-h2qh-37m9
IPC messages delivered to the wrong frame in Electron
### Impact IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame. If your app does ANY of the following, then it is impacted by this issue: - Uses `remote` - Calls `webContents.sendToFrame` - Calls `event.reply` in an IPC message handler ### Patches This has been fixed in the following versions: - 9.4.0 - 10.2.0 - 11.1.0 - 12.0.0-beta.9 ### Workarounds There are no workarounds for this issue. ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
{'CVE-2020-26272'}
2021-01-28T19:11:05Z
2021-01-28T19:11:34Z
MODERATE
null
{'CWE-668'}
{'https://www.electronjs.org/releases/stable?version=9#9.4.0', 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c', 'https://github.com/electron/electron/releases/tag/v9.4.0', 'https://github.com/electron/electron/pull/26875', 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26272'}
null
npm
GHSA-224h-p7p5-rh85
Directory Traversal in wenluhong1
Affected versions of `wenluhong1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2021-09-23T21:43:28Z
2020-09-01T17:32:26Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/npm:wenluhong1:20170509', 'https://www.npmjs.com/advisories/409', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wenluhong1'}
null
npm
GHSA-hh27-ffr2-f2jc
Open redirect in url-parse
# Overview Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site. # Impact Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
{'CVE-2021-3664'}
2021-08-10T16:06:59Z
2021-08-10T16:07:08Z
MODERATE
null
{'CWE-601'}
{'https://github.com/unshiftio/url-parse/issues/206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3664', 'https://github.com/unshiftio/url-parse/issues/205', 'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0', 'https://github.com/unshiftio/url-parse', 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse'}
null
npm
GHSA-6fjr-m7v6-fpg9
Exfiltrates data on installation in jquey
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `jquey` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16204'}
2021-01-08T19:45:24Z
2018-08-06T21:41:38Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16204', 'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9', 'https://nodesecurity.io/advisories/544', 'https://www.npmjs.com/advisories/544'}
null