ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-vc6r-4x6g-mmqc
Path Traversal in m-server
Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server. ## Recommendation Update to version 1.4.2 or later.
null
2020-08-31T18:33:45Z
2019-06-11T16:16:23Z
MODERATE
null
{'CWE-22'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json', 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a', 'https://hackerone.com/reports/319795', 'https://www.npmjs.com/advisories/731'}
null
npm
GHSA-wqhw-frpx-5mmp
Command Injection in tomato
All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:36:09Z
2020-09-02T16:01:33Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/797'}
null
npm
GHSA-6qh5-wx38-q92g
Directory Traversal in ltt.js
Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2020-08-31T18:22:04Z
2019-05-30T17:15:59Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js', 'https://www.npmjs.com/advisories/411'}
null
npm
GHSA-vfp9-gwrh-wq9g
Path Traversal in crud-file-server
Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 0.9.0 or later.
{'CVE-2018-3733'}
2020-08-31T18:43:44Z
2018-07-18T21:20:19Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3733', 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82', 'https://www.npmjs.com/advisories/1003', 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g', 'https://hackerone.com/reports/310690'}
null
npm
GHSA-r2rg-683g-ff96
Malicious Package in axios-http
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:11:07Z
2020-09-03T19:40:12Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1123'}
null
npm
GHSA-v86x-f47q-f7f4
Unauthorized File Access in atompm
Versions of `atompm` prior to 0.8.2 are vulnerable to Unauthorized File Access. The package fails to sanitize relative paths in the URL for file downloads, allowing attackers to download arbitrary files from the system. ## Recommendation Upgrade to version 0.8.2 or later.
null
2020-08-31T18:42:01Z
2020-09-11T21:09:24Z
HIGH
null
{'CWE-200'}
{'https://www.npmjs.com/advisories/959'}
null
npm
GHSA-3f97-rj68-2pjf
Malicious Package in buffe2-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:57:28Z
2020-09-03T21:48:35Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1238'}
null
npm
GHSA-89gv-h8wf-cg8r
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. Example URL: `https:/\/\/\expected-example.com/path` Escaped string: `https:/\\/\\/\\expected-example.com/path` (JavaScript strings must escape backslash) Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html). ### Patches Version 1.19.7 is patched against all known payload variants. ### References https://github.com/medialize/URI.js/releases/tag/v1.19.7 (fix for this particular bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for related bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass) [PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling) ### For more information If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js ### Reporter credit [ready-research](https://github.com/ready-research) via https://huntr.dev/
{'CVE-2021-3647'}
2021-07-19T16:38:54Z
2021-07-19T21:22:36Z
MODERATE
null
{'CWE-601'}
{'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://huntr.dev/bounties/1625558772840-medialize/URI.js', 'https://github.com/medialize/URI.js/security/advisories/GHSA-89gv-h8wf-cg8r', 'https://github.com/medialize/URI.js/releases/tag/v1.19.6', 'https://github.com/medialize/URI.js/releases/tag/v1.19.7', 'https://github.com/medialize/URI.js/releases/tag/v1.19.3', 'https://github.com/medialize/URI.js/pull/233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3647', 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'}
null
npm
GHSA-pmgv-94f5-6w7w
Malicious Package in eact
All versions of `eact` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:03:02Z
2020-09-02T20:21:30Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/853'}
null
npm
GHSA-r578-pj6f-r4ff
Auto-merging Person Records Compromised
### Impact New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). ### Patches We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details. ### Workarounds If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class. ```js create = async (profile) => { const rockUpdateFields = this.mapApollosFieldsToRock(profile); // auto-merge functionality is compromised // we are creating a new user and patching them with profile details const id = await this.post('/People', { Gender: 0, // required by Rock. Listed first so it can be overridden. IsSystem: false, // required by rock }); await this.patch(`/People/${id}`, { ...rockUpdateFields, }); return id; }; ``` ### For more information If you have any questions or comments about this advisory: * Email us at [support@apollos.app](mailto:support@apollos.app)
{'CVE-2021-32691'}
2021-06-16T21:25:21Z
2021-06-21T17:07:47Z
HIGH
null
{'CWE-287', 'CWE-303'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32691', 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0', 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2', 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}
null
npm
GHSA-vf8q-pw7h-r2x2
Malicious Package in epress
Version 4.13.2 of `epress` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-30T22:03:15Z
2020-09-11T21:15:54Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/925'}
null
npm
GHSA-mhxg-pr3j-v9gr
Malicious Package in colne
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:03Z
2020-09-03T19:41:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1386'}
null
npm
GHSA-f9wg-5f46-cjmw
NextAuth.js default redirect callback vulnerable to open redirects
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your `callbacks` option: ```js // async redirect(url, baseUrl) { // v3 async redirect({ url, baseUrl }) { // v4 // Allows relative callback URLs if (url.startsWith("/")) return new URL(url, baseUrl).toString() // Allows callback URLs on the same origin else if (new URL(url).origin === baseUrl) return url return baseUrl } ``` If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
{'CVE-2022-24858'}
2022-04-22T20:49:09Z
2022-04-22T20:49:09Z
MODERATE
null
{'CWE-290', 'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24858', 'https://github.com/nextauthjs/next-auth', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw', 'https://next-auth.js.org/getting-started/upgrade-v4', 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50', 'https://next-auth.js.org/configuration/callbacks#redirect-callback', 'https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.2'}
null
npm
GHSA-8qh7-xw58-3ww7
Malicious Package in radic-util
Version 1.0.2 of `radic-util` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:22Z
2020-09-11T21:25:37Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/942'}
null
npm
GHSA-wr66-vrwm-5g5x
Denial of Service Vulnerability in next.js
### Impact Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality. - **Affected:** All of the following must be true to be affected by this CVE - Next.js versions above v12.0.0 - Using next start or a custom server - Using the built-in i18n support - **Not affected:** - Deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js. ### Patches A patch has been released, `next@12.0.9`, that mitigates this issue. We recommend all affected users upgrade as soon as possible. ### Workarounds We recommend upgrading whether you can reproduce or not although you can ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until you upgrade. ### For more information If you have any questions or comments about this advisory: * Open an issue in [next](https://github.com/vercel/next.js) * Email us at [security@vercel.com](mailto:security@vercel.com)
{'CVE-2022-21721'}
2022-02-07T21:17:29Z
2022-01-28T23:09:22Z
MODERATE
null
{'CWE-400', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21721', 'https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x', 'https://github.com/vercel/next.js/releases/tag/v12.0.9', 'https://github.com/vercel/next.js/pull/33503', 'https://github.com/vercel/next.js'}
null
npm
GHSA-mq9h-cwc2-6j5r
Malicious Package in midway-dataproxy
All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:21Z
2020-09-03T17:42:27Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1056'}
null
npm
GHSA-qhf6-vqq9-q2p7
Directory Traversal in gaoxiaotingtingting
Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16108'}
2020-08-31T18:20:57Z
2020-09-01T16:58:58Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/377', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108', 'https://nodesecurity.io/advisories/377', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}
null
npm
GHSA-qpjp-7rp2-9c3f
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
{'CVE-2013-7451'}
2021-09-16T20:03:05Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://nodesecurity.io/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451', 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f'}
null
npm
GHSA-fpm5-vv97-jfwg
Uncontrolled Resource Consumption in firebase
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
{'CVE-2020-7765'}
2021-04-15T21:39:07Z
2021-05-18T01:57:24Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7765', 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada', 'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324', 'https://github.com/firebase/firebase-js-sdk/pull/4001'}
null
npm
GHSA-cr67-78jr-j94p
Local File Inclusion in domokeeper
All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:46:25Z
2020-09-03T18:14:47Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1075'}
null
npm
GHSA-73rg-x683-m3qw
Buffer overflow in canvas
A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image.
{'CVE-2020-8215'}
2021-05-06T23:33:05Z
2021-05-07T16:05:16Z
HIGH
null
{'CWE-120'}
{'https://hackerone.com/reports/315037', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://www.npmjs.com/package/canvas', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215'}
null
npm
GHSA-8w57-jfpm-945m
Denial of Service in http-proxy-agent
Versions of `http-proxy-agent` before 2.1.0 are vulnerable to denial of service and uninitialized memory leak when unsanitized options are passed to `Buffer`. ## Recommendation Update to version 2.1.0 or later.
null
2020-08-31T18:29:40Z
2019-06-11T16:16:07Z
HIGH
null
null
{'https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80', 'https://hackerone.com/reports/321631', 'https://nodesecurity.io/advisories/607', 'https://www.npmjs.com/advisories/607'}
null
npm
GHSA-8vmc-g99q-xj94
Directory Traversal in dcdcdcdcdc
Affected versions of `dcdcdcdcdc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16190'}
2020-08-31T18:23:11Z
2020-09-01T18:23:52Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc', 'https://nodesecurity.io/advisories/439', 'https://www.npmjs.com/advisories/439', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16190'}
null
npm
GHSA-ch82-gqh6-9xj9
Prototype Pollution in get-setter
All versions of `get-setter` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:25Z
2020-09-04T15:13:19Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1332'}
null
npm
GHSA-wp2p-q35g-3rjj
Malicious Package in soket.io
All versions of `soket.io` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:29:21Z
2020-09-01T21:13:01Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/686'}
null
npm
GHSA-m647-5wf9-3jp3
OS Command Injection in closure-compiler-stream
closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument "options" of the exports function in "index.js" can be controlled by users without any sanitization.
{'CVE-2020-7603'}
2021-07-28T18:53:03Z
2021-05-07T16:16:06Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7603'}
null
npm
GHSA-6fh5-8wq8-w3wr
Prototype Pollution in unflatten
All versions of `unflatten` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:18Z
2020-09-04T15:09:55Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1329'}
null
npm
GHSA-cwp7-92h5-82wx
Downloads Resources over HTTP in haxe-dev
Affected versions of `haxe-dev` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe-dev`. ## Recommendation This package is actively maintained, yet after 2 years, the maintainer has not provided a patch for the vulnerability. This likely means that the maintainer has decided to accept the risk, and this vulnerability will never be patched. Because of this, the best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10637'}
2021-01-08T18:55:35Z
2019-02-18T23:47:10Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-cwp7-92h5-82wx', 'https://nodesecurity.io/advisories/237', 'https://www.npmjs.com/advisories/237', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10637'}
null
npm
GHSA-725f-3pw7-rq6x
Malicious Package in 8.9.4
Versions 1.0.2, 1.0.3, 1.0.4 and 1.0.5 of `8.9.4` contain malicious code as a preinstall script. The package reads the system's SSH keys but does not upload it to a remote server. ## Recommendation Remove the package from your environment. There is no evidence of further compromise at the moment.
null
2021-09-29T20:46:52Z
2020-09-03T21:09:47Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1201'}
null
npm
GHSA-q4qq-fm7q-cwp5
Multiple XSS Filter Bypasses in validator
Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter. ## Proof of Concept Various inputs that could bypass the filter were discovered: Improper parsing of nested tags: ``` <s <onmouseover="alert(1)"> <;s onmouseover="alert(1)">This is a test</s> ``` Incomplete filtering of javascript: URIs: ``` <a href="javascriptJ a V a S c R iPt::alert(1)" "<s>">test</a> ``` UI Redressing: ``` <div style="z-index: 9999999; background-color: green; width: 100%; height: 100%"> <h1>You have won</h1>Please click the link and enter your login details: <a href="http://example.com/">http://good.com</a> </div> ``` Bypass via Nested Forbidden Strings: ``` <scrRedirecRedirect 302t 302ipt type="text/javascript">prompt(1);</scrRedirecRedirect 302t 302ipt> ``` Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of. ## Recommendation If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed.
{'CVE-2013-7454'}
2021-09-16T19:30:36Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/', 'https://nodesecurity.io/advisories/41', 'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454', 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html', 'https://www.npmjs.com/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-gf8q-jrpm-jvxq
URL parsing in node-forge could lead to undesired behavior.
### Impact The regex used for the `forge.util.parseUrl` API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior. ### Patches `forge.util.parseUrl` and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API. ### Workarounds Ensure code does not directly or indirectly call `forge.util.parseUrl` with untrusted input. ### References - https://www.huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at support@digitalbazaar.com
null
2022-01-07T22:20:43Z
2022-01-08T00:22:02Z
LOW
null
null
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq', 'https://github.com/digitalbazaar/forge/'}
null
npm
GHSA-vxf5-wxwp-m7g9
Open Redirect in Next.js
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when `pages/_error.js` was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. ### Impact - **Affected:** Users of Next.js between `10.0.5` and `10.2.0` - **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` without `getInitialProps` - **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` and `next export` - **Not affected**: Deployments on Vercel ([vercel.com](https://vercel.com)) are not affected - **Not affected:** Deployments **with** `pages/404.js` - Note that versions prior to 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. We recommend upgrading to the latest version of Next.js to improve the overall security of your application. ### Patches https://github.com/vercel/next.js/releases/tag/v11.1.0
{'CVE-2021-37699'}
2022-04-28T20:32:19Z
2021-08-12T14:51:14Z
MODERATE
null
{'CWE-601'}
{'https://github.com/vercel/next.js', 'https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37699', 'https://github.com/vercel/next.js/releases/tag/v11.1.0'}
null
npm
GHSA-gfv4-2vhm-486m
Hijacked Environment Variables in node-fabric
The `node-fabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16052'}
2020-08-31T18:25:06Z
2018-07-23T20:50:10Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/489', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16052', 'https://github.com/advisories/GHSA-gfv4-2vhm-486m', 'https://www.npmjs.com/advisories/489'}
null
npm
GHSA-jqfh-8hw5-fqjr
Improper Handling of Exceptional Conditions in detect-character-encoding
### Impact In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. ### Patches The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to detect-character-encoding. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const bodyParser = require("body-parser"); const detectCharacterEncoding = require("detect-character-encoding"); const app = express(); app.use(bodyParser.raw()); app.post("/", (req, res) => { const charsetMatch = detectCharacterEncoding(req.body); res.end(charsetMatch.encoding); }); app.listen(3000); ``` `printf "\xAA" | curl --request POST --header "Content-Type: application/octet-stream" --data-binary @- http://localhost:3000` crashes the server.
{'CVE-2021-39157'}
2021-10-21T14:15:03Z
2021-08-25T14:44:48Z
HIGH
null
{'CWE-755'}
{'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39157', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/issues/15', 'https://github.com/sonicdoe/detect-character-encoding'}
null
npm
GHSA-28xx-8j99-m32j
Malicious Package in nginxbeautifier
Version 1.0.14 of `nginxbeautifier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.14 of this module is found installed you will want to replace it with a version before or after 1.0.14. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-10-01T13:11:55Z
2020-09-01T20:37:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/639'}
null
npm
GHSA-5pq8-2q24-mj3p
Downloads Resources over HTTP in fis-parser-sass-bin
Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10660'}
2021-01-08T19:48:52Z
2019-02-18T23:45:03Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/269', 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p', 'https://nodesecurity.io/advisories/269', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660'}
null
npm
GHSA-qgmg-gppg-76g5
Inefficient Regular Expression Complexity in validator.js
validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3765'}
2021-11-03T14:46:00Z
2021-11-03T17:34:45Z
MODERATE
null
{'CWE-1333'}
{'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js', 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}
null
npm
GHSA-446m-mv8f-q348
Regular Expression Denial of Service in moment
Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings. ## Recommendation Update to version 2.19.3 or later.
{'CVE-2017-18214'}
2021-08-31T21:44:15Z
2018-03-05T18:35:09Z
HIGH
null
{'CWE-400'}
{'https://www.tenable.com/security/tns-2019-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18214', 'https://www.npmjs.com/advisories/532', 'https://github.com/advisories/GHSA-446m-mv8f-q348', 'https://github.com/moment/moment/issues/4163', 'https://nodesecurity.io/advisories/532', 'https://github.com/moment/moment', 'https://github.com/moment/moment/pull/4326'}
null
npm
GHSA-c4fm-46gm-4469
Malicious Package in sparkies
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:28:30Z
2020-09-03T20:00:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1141'}
null
npm
GHSA-hgwm-pv9h-q5m7
Potential XSS in jQuery dependency in Mirador
### Impact Mirador users less than v3.0.0 (alpha-rc) versions that have an unpatched jQuery. When adopters update jQuery they will find some of Mirador functionality to be broken. ### Patches Mirador adopters should update to v3.0.0, no updates exist for v2.x releases. ### Workarounds Yes, Mirador users could fork and create their own custom build of Mirador and make the bug fixes themselves. ### References https://github.com/advisories/GHSA-gxr4-xjj5-5px2 https://github.com/advisories/GHSA-jpcq-cgw6-v4j6 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/
null
2021-10-04T21:19:55Z
2020-09-18T18:03:29Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ProjectMirador/mirador/security/advisories/GHSA-hgwm-pv9h-q5m7', 'https://github.com/ProjectMirador/mirador'}
null
npm
GHSA-wr2c-ppj9-f2fv
Downloads Resources over HTTP in webdrvr
Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10601'}
2021-01-08T01:15:00Z
2019-02-18T23:33:54Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/193', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601', 'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv', 'https://www.npmjs.com/advisories/193'}
null
npm
GHSA-h372-w3xp-2jg3
Directory Traversal in section2.madisonjbrooks12
Affected versions of `section2.madisonjbrooks12` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16172'}
2020-08-31T18:24:17Z
2020-09-01T18:54:34Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/468', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16172', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12', 'https://nodesecurity.io/advisories/468'}
null
npm
GHSA-hv9c-qwqg-qj3v
Remote Code Execution in electron
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code execution. More information to determine if you are impacted can be found on the [electron blog](https://electronjs.org/blog/web-preferences-fix). ## Recommendation Upgrade Electron to >=3.0.0-beta.7, >=2.0.8, >=1.8.8, or >=1.7.16."
{'CVE-2018-15685'}
2021-09-14T17:29:34Z
2018-08-23T19:12:08Z
HIGH
null
{'CWE-1188'}
{'https://electronjs.org/blog/web-preferences-fix', 'https://www.npmjs.com/advisories/732', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15685', 'https://www.contrastsecurity.com/security-influencers/cve-2018-15685', 'https://www.exploit-db.com/exploits/45272/', 'https://github.com/advisories/GHSA-hv9c-qwqg-qj3v'}
null
npm
GHSA-5v7r-jg9r-vq44
Insecure Cryptography Algorithm in simple-crypto-js
Versions of `simple-crypto-js` prior to 2.3.0 use AES-CBC with PKCS#7 padding, which is vulnerable to padding oracle attacks. This may allow attackers to break the encryption and access sensitive data. ## Recommendation Upgrade to version 2.3.0 or later.
null
2021-09-29T20:08:01Z
2020-09-03T21:19:46Z
MODERATE
null
{'CWE-327'}
{'https://www.npmjs.com/advisories/1220', 'https://github.com/danang-id/simple-crypto-js/issues/12', 'https://snyk.io/vuln/SNYK-JS-SIMPLECRYPTOJS-544027', 'https://robertheaton.com/2013/07/29/padding-oracle-attack/', 'https://github.com/danang-id/simple-crypto-js'}
null
npm
GHSA-2wrq-wmqf-8vcc
Downloads Resources over HTTP in operadriver
operadriver is a Opera Driver for Selenium. operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation Update to version 0.2.3 or later.
{'CVE-2016-10565'}
2020-08-31T18:14:19Z
2019-02-18T23:35:48Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/196', 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10565', 'https://nodesecurity.io/advisories/196'}
null
npm
GHSA-xj6f-x7jm-85ff
Downloads Resources over HTTP in openframe-ascii-image
Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10690'}
2021-01-08T00:00:45Z
2019-02-18T23:41:54Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-xj6f-x7jm-85ff', 'https://www.npmjs.com/advisories/298', 'https://nodesecurity.io/advisories/298', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10690'}
null
npm
GHSA-ph58-4vrj-w6hr
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
{'CVE-2018-20677'}
2021-07-26T21:49:18Z
2019-01-17T13:57:56Z
MODERATE
null
{'CWE-79'}
{'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/pull/27047', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/advisories/GHSA-ph58-4vrj-w6hr', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628', 'https://github.com/twbs/bootstrap/issues/27045', 'https://access.redhat.com/errata/RHSA-2019:1456'}
null
npm
GHSA-255r-pghp-r5wh
Malicious Package in hdeky
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:02:17Z
2020-09-03T17:05:34Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1398'}
null
npm
GHSA-735c-r4vc-6gm9
Downloads Resources over HTTP in bionode-sra
Affected versions of `bionode-sra` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync). Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10613'}
2021-09-16T20:41:21Z
2019-02-18T23:56:45Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10613', 'https://nodesecurity.io/advisories/211', 'https://www.npmjs.com/advisories/211', 'https://github.com/bionode/bionode-sra'}
null
npm
GHSA-4gw3-8f77-f72c
Regular expression denial of service in codemirror
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
{'CVE-2020-7760'}
2021-04-21T17:29:09Z
2021-05-10T18:46:27Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445', 'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb', 'https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447', 'https://www.npmjs.com/package/codemirror', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760', 'https://www.debian.org/security/2020/dsa-4789', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448'}
null
npm
GHSA-6m4r-cgm3-6q7q
Cross-Site Scripting in status-board
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderJsDashboard()` function concatenates the `safeDashboard` variable to the HTTP response message with insufficient sanitization. If this variable is controlled by user input it may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15478'}
2021-08-17T22:30:43Z
2019-09-23T18:32:54Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460293', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15478', 'https://github.com/jameswlane/status-board/pull/949', 'https://github.com/jameswlane/status-board/pull/949/files', 'https://www.npmjs.com/advisories/1151'}
null
npm
GHSA-hg2p-2cvq-4ppv
Cross-site scripting in lazysizes
lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: data-vimeo, data-vimeoparams, data-youtube and data-ytparams which can be abused to inject malicious JavaScript.
{'CVE-2020-7642'}
2021-05-25T20:08:07Z
2021-12-10T20:06:23Z
LOW
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642', 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
null
npm
GHSA-f89g-whpf-6q9m
Cross-Site Scripting in i18next
Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability. ## Proof of Concept ``` var init = i18n.init({debug: true}, function(){ var test = i18n.t('__firstName__ __lastName__', { escapeInterpolation: true, firstName: '__lastNameHTML__', lastName: '<script>', }); console.log(test); }); // equals "<script> &lt;script&gt;" ``` ## Recommendation Update to version 1.10.3 or later.
{'CVE-2017-16008'}
2020-08-31T18:19:21Z
2018-11-09T17:46:56Z
MODERATE
null
{'CWE-79'}
{'https://nodesecurity.io/advisories/325', 'https://github.com/i18next/i18next/pull/443', 'https://www.npmjs.com/advisories/325', 'https://github.com/advisories/GHSA-f89g-whpf-6q9m', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16008'}
null
npm
GHSA-3fw8-66wf-pr7m
methodOverride Middleware Reflected Cross-Site Scripting in connect
Connect is a stack of middleware that is executed in order in each request. The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override". Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser. ###Example: ``` ~ curl "localhost:3000" -d "_method=<script src=http://nodesecurity.io/xss.js></script>" Cannot <SCRIPT SRC=HTTP://NODESECURITY.IO/XSS.JS></SCRIPT> / ``` ## Recommendation Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.
{'CVE-2013-7370'}
2021-04-07T19:56:51Z
2020-08-31T22:41:27Z
LOW
null
{'CWE-79'}
{'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://github.com/senchalabs/connect/issues/831', 'https://access.redhat.com/security/cve/cve-2013-7370', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7370', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370', 'https://security-tracker.debian.org/tracker/CVE-2013-7370', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'http://www.openwall.com/lists/oss-security/2014/04/21/2', 'https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135', 'https://www.npmjs.com/advisories/3'}
null
npm
GHSA-7c82-mp33-r854
Cross-site scripting in bootstrap-select
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
{'CVE-2019-20921'}
2021-04-22T23:22:11Z
2021-05-07T16:47:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767', 'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://www.npmjs.com/advisories/1522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921', 'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457'}
null
npm
GHSA-4mv4-gmmf-q382
Cross-Site Scripting in datatables
Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php. ## Recommendation Update to a version greater than 1.10.8.
{'CVE-2015-6584'}
2021-09-23T19:26:58Z
2020-08-31T22:42:29Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/5', 'http://seclists.org/fulldisclosure/2015/Sep/37', 'http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html', 'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/', 'https://github.com/DataTables/DataTables/issues/602', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6584', 'http://www.securityfocus.com/archive/1/archive/1/536437/100/0/threaded', 'https://github.com/DataTables/DataTables', 'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d', 'http://www.securityfocus.com/archive/1/536437/100/0/threaded'}
null
npm
GHSA-5cp4-xmrw-59wf
XSS via JQLite DOM manipulation functions in AngularJS
### Summary XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`. ### Description JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`. One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218). If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM. This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/). ### Proof of concept ```javascript const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`  ``` Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is. As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute. ```javascript angular.element(document).append(inertPayload); ``` This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`. ### Patches The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2). ### Workarounds Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended. ### References https://github.com/advisories/GHSA-mhp6-pxh8-r675 https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://snyk.io/vuln/SNYK-JS-ANGULAR-570058
null
2021-10-08T21:25:58Z
2020-08-05T21:47:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/angular/angular.js', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/', 'https://github.com/advisories/GHSA-mhp6-pxh8-r675', 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf'}
null
npm
GHSA-3f99-hvg4-qjwj
Insecure random number generation in keypair
## Description and Impact A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim. We recommend replacing any RSA keys that were generated using keypair version 1.0.3 or earlier. ## Fix * The [bug](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) in the pseudo-random number generator is fixed in commit [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18). * If the crypto module is available, it is used instead of the pseudo-random number generator. Also fixed in [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18) ## Additional Details The specific [line](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) with the flaw is: ```javascript b.putByte(String.fromCharCode(next & 0xFF)) ``` The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is ```javascript util.ByteBuffer.prototype.putByte = function(b) { this.data += String.fromCharCode(b); }; ``` Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. This results in most of the buffer containing zeros. An example generated buffer: (Note: truncated for brevity) ``` \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x04\x00\x00\x00....\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ``` Since it is masking with 0xFF, approximately 97% of the bytes are converted to zeros. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion. ## Credit This issue was reported to GitHub Security Lab by Ross Wheeler of Axosoft. It was discovered by Axosoft engineer Dan Suceava, who noticed that [keypair](https://github.com/juliangruber/keypair) was regularly generating duplicate RSA keys. GitHub security engineer [@vcsjones (Kevin Jones)](https://github.com/vcsjones) independently investigated the problem and identified the cause and source code location of the bug.
{'CVE-2021-41117'}
2021-10-11T18:36:36Z
2021-10-11T17:09:05Z
HIGH
null
{'CWE-335'}
{'https://github.com/juliangruber/keypair/releases/tag/v1.0.4', 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/', 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj', 'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18', 'https://github.com/juliangruber/keypair', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41117'}
null
npm
GHSA-hxcc-f52p-wc94
Insecure serialization leading to RCE in serialize-javascript
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack.
{'CVE-2020-7660'}
2021-09-23T18:50:59Z
2020-08-11T17:21:13Z
HIGH
null
{'CWE-502'}
{'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd', 'https://github.com/yahoo/serialize-javascript', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'}
null
npm
GHSA-cvx3-pqmj-x57x
Downloads Resources over HTTP in scalajs-standalone-bin
Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10634'}
2021-01-08T18:56:11Z
2019-02-18T23:47:13Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-cvx3-pqmj-x57x', 'https://nodesecurity.io/advisories/231', 'https://www.npmjs.com/advisories/231', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}
null
npm
GHSA-27g8-r9vw-765x
Private Field data leak
This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information. ### Impact Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted. ### Patches None, at this time ### Workarounds None, at this time ### References None ### For more information For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published. If needed, you can email us at keystone@thinkmill.com.au
{'CVE-2021-32624'}
2021-05-25T20:20:03Z
2021-05-27T18:39:03Z
HIGH
null
{'CWE-200'}
{'https://github.com/keystonejs/keystone-5/security/advisories/GHSA-27g8-r9vw-765x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32624'}
null
npm
GHSA-xr53-m937-jr9c
Cross-Site Scripting in ngx-md
Versions of `ngx-md` prior to 6.0.3 are vulnerable to Cross-Site Scripting. Links are not properly restricted to http/https and can contain JavaScript which may lead to arbitrary code execution. Markdown input such as `[Click Me](javascript:alert('Injected!'%29)` is rendered as a `Click Me` link that executes JavaScript. ## Recommendation Upgrade to version 6.0.3 or later.
null
2021-10-04T21:05:25Z
2020-09-03T15:49:14Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1485', 'https://github.com/dimpu/ngx-md/issues/129', 'https://github.com/dimpu/ngx-md'}
null
npm
GHSA-hgpf-97c5-74fc
Regular expression denial of service in @absolunet/kafe
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.
{'CVE-2020-7761'}
2021-04-19T23:43:02Z
2021-05-10T19:08:29Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/package/@absolunet/kafe', 'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403', 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761'}
null
npm
GHSA-cwcx-rxgc-cmw3
Prototype pollution in 101
Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25943'}
2021-05-25T20:45:15Z
2021-05-17T20:57:40Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25943', 'https://github.com/tjmehta/101/blob/d87f63ce2a4cbdc476e8287abd78327c3144d646/set.js#L52', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943'}
null
npm
GHSA-p3jx-g34v-q56j
Malicious Package in j3-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:31:54Z
2020-09-03T22:54:02Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1276'}
null
npm
GHSA-fgfj-rj24-mj7q
Malicious Package in kraken-api
Version 0.1.8 of `kraken-api` contains malicious code as a postinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2020-08-31T18:40:22Z
2020-09-02T21:47:08Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/914'}
null
npm
GHSA-v3px-6cc8-f8j3
Path traversal in servey
A path traversal vulnerability in servey versions prior to 3.3.2 allows an attacker to read content of any arbitrary file.
{'CVE-2020-8214'}
2021-05-07T15:07:41Z
2021-05-07T15:56:19Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8214', 'https://hackerone.com/reports/355501'}
null
npm
GHSA-3fc5-9x9m-vqc4
Privilege Escalation in express-cart
Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users. ## Recommendation Update to version 1.1.6 or later.
null
2021-08-04T21:25:59Z
2019-06-03T17:31:32Z
CRITICAL
null
null
{'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b', 'https://www.npmjs.com/advisories/730', 'https://snyk.io/vuln/npm:express-cart:20180712', 'https://hackerone.com/reports/343626', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json'}
null
npm
GHSA-mc23-976p-j42x
Low severity vulnerability that affects xterm
A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters, aka "Xterm Remote Code Execution Vulnerability." This affects xterm.js.
{'CVE-2019-0542'}
2020-06-16T21:45:48Z
2019-01-14T16:19:55Z
LOW
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0542', 'https://github.com/advisories/GHSA-mc23-976p-j42x'}
null
npm
GHSA-487w-pqcm-63hq
Command injection in buns
There is a command injection vulnerability in all versions of package buns. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule).
{'CVE-2020-7794'}
2021-01-12T23:52:20Z
2021-01-13T18:22:13Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7794', 'https://snyk.io/vuln/SNYK-JS-BUNS-1050389'}
null
npm
GHSA-6g6m-m6h5-w9gf
Authorization bypass in express-jwt
### Overview Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration. When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: You are using express-jwt AND You do not have **algorithms** configured in your express-jwt configuration. AND You are using libraries such as jwks-rsa as the **secret**. ### How to fix that? Specify **algorithms** in the express-jwt configuration. The following is an example of a proper configuration ``` const checkJwt = jwt({ secret: jwksRsa.expressJwtSecret({ rateLimit: true, jwksRequestsPerMinute: 5, jwksUri: `https://${DOMAIN}/.well-known/jwks.json` }), // Validate the audience and the issuer. audience: process.env.AUDIENCE, issuer: `https://${DOMAIN}/`, // restrict allowed algorithms algorithms: ['RS256'] }); ``` ### Will this update impact my users? The fix provided in patch will not affect your users if you specified the algorithms allowed. The patch now makes **algorithms** a required configuration. ### Credit IST Group
{'CVE-2020-15084'}
2021-01-07T23:49:22Z
2020-06-30T16:05:24Z
HIGH
null
{'CWE-285'}
{'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15084', 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf'}
null
npm
GHSA-g53w-52xc-2j85
Cross-Site Scripting in react
Affected versions of `react` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize input used to create keys. This may allow attackers to execute arbitrary JavaScript if a key is generated from user input. ## Recommendation If you are using `react` 0.5.x, upgrade to version 0.5.2 or later. If you are using `react` 0.4.x, upgrade to version 0.4.2 or later.
{'CVE-2013-7035'}
2021-10-04T19:11:02Z
2020-09-04T16:52:57Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1420', 'https://github.com/facebook/react', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7035', 'https://snyk.io/vuln/npm:react:20131217', 'https://reactjs.org/blog/2013/12/18/react-v0.5.2-v0.4.2.html'}
null
npm
GHSA-gm9x-q798-hmr4
Command Injection in git-tags-remote
All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled. The following proof-of-concept creates a file in `/tmp`: ``` const gitTagsRemote = require('git-tags-remote'); gitTagsRemote.get('https://github.com/sh0ji/git-tags-remote.git; echo "Injection Success" > /tmp/command-injection.test') .then(tags => console.log(tags)); ```
null
2021-09-23T17:26:33Z
2020-07-29T14:53:40Z
HIGH
null
{'CWE-78'}
{'https://github.com/sh0ji/git-tags-remote/issues/58', 'https://github.com/sh0ji/git-tags-remote', 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c', 'https://www.npmjs.com/advisories/1517'}
null
npm
GHSA-4q79-fch7-g78q
Downloads Resources over HTTP in grunt-webdriver-qunit
Affected versions of `grunt-webdriver-qunit` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-webdriver-qunit`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10606'}
2021-01-08T19:54:30Z
2019-02-18T23:48:11Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/207', 'https://nodesecurity.io/advisories/207', 'https://github.com/advisories/GHSA-4q79-fch7-g78q', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10606'}
null
npm
GHSA-pmw4-jgxx-pcq9
File System Bounds Escape
### Impact Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`. ### Background When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function. ![Screen Shot 2020-12-15 at 6 42 52 PM](https://user-images.githubusercontent.com/3375444/102293941-5a75fb80-3f05-11eb-9d71-0c190a8dcc75.png) ### Patches None at the moment. ### Workarounds There are no workarounds for windows servers. Hosting the server on a different OS mitigates the issue. ### References Issues: https://github.com/autovance/ftp-srv/issues/167 https://github.com/autovance/ftp-srv/issues/225 ### For more information If you have any questions or comments about this advisory: Open an issue at https://github.com/autovance/ftp-srv. Please email us directly; security@autovance.com.
{'CVE-2020-26299'}
2021-02-11T17:04:52Z
2021-02-10T18:11:34Z
MODERATE
null
{'CWE-22'}
{'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3', 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9', 'https://www.npmjs.com/package/ftp-srv', 'https://github.com/autovance/ftp-srv/issues/225', 'https://github.com/autovance/ftp-srv/issues/167', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26299', 'https://github.com/autovance/ftp-srv/pull/224'}
null
npm
GHSA-6xg2-cf6h-x4v8
Malicious Package in buffer-por
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:58:54Z
2020-09-03T21:53:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1243'}
null
npm
GHSA-8pww-pp5r-rff8
Path Traversal in marscode
This affects all versionsup to and including version 1.0.1-0 of package marscode. There is no path sanitization in the path provided at fs.readFile in index.js.
{'CVE-2020-7681'}
2021-05-06T23:16:18Z
2021-05-07T16:06:03Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-MARSCODE-590122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7681'}
null
npm
GHSA-4hm7-73ch-vm59
Malicious Package in buffer-8or
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:58:16Z
2020-09-03T21:49:43Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1241'}
null
npm
GHSA-gg2g-m5wc-vccq
Rebuild-bot workflow may allow unauthorised repository modifications
### Impact `projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the "main" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the "main" repository. The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made). Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch. ### Patches The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow. ### Workarounds The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue. ### References The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem. [1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests
{'CVE-2021-21423'}
2021-04-16T22:53:30Z
2021-04-06T18:36:40Z
HIGH
null
{'CWE-527'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21423', 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643', 'https://www.npmjs.com/package/projen', 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}
null
npm
GHSA-c4w7-xm78-47vh
Prototype Pollution in y18n
### Overview The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. ### POC ``` const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true ``` ### Recommendation Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.
{'CVE-2020-7774'}
2022-04-20T19:14:17Z
2021-03-29T16:05:12Z
HIGH
null
{'CWE-915', 'CWE-20'}
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7774', 'https://github.com/yargs/y18n/issues/96', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25', 'https://github.com/yargs/y18n/pull/108', 'https://github.com/yargs/y18n'}
null
npm
GHSA-8wgc-jjvv-cv6v
Improper Authorization in loopback
Vulnerable versions of `loopback` may allow attackers to create Authentication Tokens on behalf of other users due to Improper Authorization. If the AccessToken model is publicly exposed, an attacker can create Authorization Tokens for any user as long as they know the target's `userId`. This will allow the attacker to access the user's data and their privileges. ## Recommendation For loopback 2.x, upgrade to version 2.40.0 or later For loopback 3.x, upgrade to version 3.22.0 or later
null
2021-09-27T15:44:08Z
2020-09-02T15:54:52Z
HIGH
null
{'CWE-285'}
{'https://loopback.io/doc/en/lb3/Security-advisory-08-08-2018.html]', 'https://www.npmjs.com/advisories/771', 'https://loopback.io/doc/en/lb2/Security-advisory-08-08-2018.html]', 'https://github.com/strongloop/loopback'}
null
npm
GHSA-79qm-h35f-hr77
OS Command Injection in compile-sass
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function &quot;setupCleanupOnExit(cssPath)&quot; within &quot;dist/index.js&quot; is executed as part of the &quot;rm&quot; command without any sanitization.
{'CVE-2019-10799'}
2022-01-04T19:48:58Z
2021-04-13T15:23:13Z
HIGH
null
{'CWE-78'}
{'https://github.com/eiskalteschatten/compile-sass', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799', 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2', 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804', 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}
null
npm
GHSA-588m-9qg5-35pq
Reverse Tabnabbing in quill
Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T22:06:18Z
2020-09-03T17:19:09Z
MODERATE
null
{'CWE-1022'}
{'https://github.com/quilljs/quill/pull/2674', 'https://github.com/quilljs/quill', 'https://github.com/quilljs/quill/issues/2438', 'https://www.npmjs.com/advisories/1039'}
null
npm
GHSA-h232-fpqx-mqgr
Malicious Package in log-symboles
Version 2.1.0 of `log-symboles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:45:11Z
2020-09-03T21:03:15Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1195'}
null
npm
GHSA-m57p-p67h-mq74
Command Injection Vulnerability in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency() ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
{'CVE-2020-26274'}
2020-12-16T19:24:51Z
2020-12-16T19:25:00Z
MODERATE
null
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-m57p-p67h-mq74', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26274', 'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99', 'https://www.npmjs.com/package/systeminformation', 'https://www.npmjs.com/advisories/1590'}
null
npm
GHSA-6fcr-9h9g-23fq
Denial of Service in ipfs-bitswap
Versions of `ipfs-bitswap` prior to 0.24.1 are vulnerable to Denial of Service (DoS). The package put unwanted blocks in the blockstore, which could be used to exhaust system resources in specific conditions. ## Recommendation Upgrade to version 0.24.1 or later.
null
2021-09-27T22:31:00Z
2020-09-02T21:50:51Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-IPFSBITSWAP-174847', 'https://github.com/ipfs/js-ipfs-bitswap', 'https://www.npmjs.com/advisories/916', 'https://github.com/ipfs/js-ipfs-bitswap/pull/194'}
null
npm
GHSA-j4mr-9xw3-c9jx
Out-of-bounds Read in base64-url
Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input. ## Recommendation Update to version 2.0.0 or later.
null
2020-08-31T18:31:43Z
2019-05-31T23:47:01Z
HIGH
null
{'CWE-125'}
{'https://www.npmjs.com/advisories/660', 'https://nodesecurity.io/advisories/660', 'https://hackerone.com/reports/321692'}
null
npm
GHSA-rp65-9cf3-cjxr
Inefficient Regular Expression Complexity in nth-check
nth-check is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3803'}
2021-09-20T20:47:27Z
2021-09-20T20:47:31Z
MODERATE
null
{'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3803', 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0', 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726', 'https://github.com/fb55/nth-check'}
null
npm
GHSA-c4rh-4376-gff4
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.
{'CVE-2021-40830'}
2022-03-03T05:13:15.678455Z
2021-11-24T21:12:04Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
null
npm
GHSA-q3gh-5r98-j4h3
RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign
### Impact Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature. - If you are not use RSA-PSS signature validation, this vulnerability is not affected. - Risk to accept a forged or crafted message to be signed is low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. ### Patches Users using RSA-PSS signature validation should upgrade to 8.0.17. ### Workarounds Reject RSA-PSS signatures with unnecessary prepending zeros. ### References https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3 [https://github.com/kjur/jsrsasign/issues/438](https://github.com/kjur/jsrsasign/issues/438) https://nvd.nist.gov/vuln/detail/CVE-2020-14968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968 https://vuldb.com/?id.157125 https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS
{'CVE-2020-14968'}
2021-10-06T21:44:41Z
2020-06-26T16:26:50Z
CRITICAL
null
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14968', 'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99', 'https://vuldb.com/?id.157125', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968', 'https://www.npmjs.com/advisories/1541', 'https://github.com/kjur/jsrsasign/issues/438', 'https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS', 'https://www.npmjs.com/package/jsrsasign', 'https://kjur.github.io/jsrsasign/', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}
null
npm
GHSA-59x8-7wx6-4hj9
Malicious Package in secure_identity_login_module
All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:01:35Z
2020-09-03T17:47:52Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1063'}
null
npm
GHSA-f7f4-hqp2-7prc
Improper Input Validation in sails-hook-sockets
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
{'CVE-2018-21036'}
2021-09-22T21:11:20Z
2020-07-24T20:10:21Z
HIGH
null
{'CWE-20'}
{'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e', 'http://www.openwall.com/lists/oss-security/2020/07/19/1', 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md', 'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036', 'https://github.com/balderdashy/sails-hook-sockets'}
null
npm
GHSA-9q9m-m2f6-jr5q
Malicious Package in chak
All versions of `chak` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:03:17Z
2020-09-02T20:22:34Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/854'}
null
npm
GHSA-25jw-gcfj-283j
Directory Traversal in 360class.jansenhm
Affected versions of `360class.jansenhm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16186'}
2020-08-31T18:23:32Z
2020-09-01T18:27:04Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16186', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm', 'https://nodesecurity.io/advisories/448', 'https://www.npmjs.com/advisories/448'}
null
npm
GHSA-jp4x-w63m-7wgm
Prototype Pollution in hoek
Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution. The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property. This can be demonstrated like so: ```javascript var Hoek = require('hoek'); var malicious_payload = '{"__proto__":{"oops":"It works !"}}'; var a = {}; console.log("Before : " + a.oops); Hoek.merge({}, JSON.parse(malicious_payload)); console.log("After : " + a.oops); ``` This type of attack can be used to overwrite existing properties causing a potential denial of service. ## Recommendation Update to version 4.2.1, 5.0.3 or later.
{'CVE-2018-3728'}
2020-08-31T18:28:02Z
2018-04-26T15:25:17Z
MODERATE
null
{'CWE-471'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3728', 'https://github.com/advisories/GHSA-jp4x-w63m-7wgm', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://nodesecurity.io/advisories/566', 'https://snyk.io/vuln/npm:hoek:20180212', 'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee', 'https://www.npmjs.com/advisories/566', 'http://www.securityfocus.com/bid/103108', 'https://access.redhat.com/errata/RHSA-2018:1264', 'https://hackerone.com/reports/310439'}
null
npm
GHSA-9gr3-7897-pp7m
XSS in Image Optimization API for Next.js
### Impact - **Affected:** All of the following must be true to be affected - Next.js between version 10.0.0 and 11.1.0 - The `next.config.js` file has [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) array assigned - The image host assigned in [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) allows user-provided SVG - **Not affected**: The `next.config.js` file has [`images.loader`](https://nextjs.org/docs/basic-features/image-optimization#loader) assigned to something other than default - **Not affected**: Deployments on [Vercel](https://vercel.com) are not affected ### Patches [Next.js v11.1.1](https://github.com/vercel/next.js/releases/tag/v11.1.1)
{'CVE-2021-39178'}
2021-08-31T20:01:51Z
2021-09-01T18:24:22Z
HIGH
null
{'CWE-79'}
{'https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39178', 'https://github.com/vercel/next.js/releases/tag/v11.1.1', 'https://github.com/vercel/next.js'}
null
npm
GHSA-v85c-hgq5-7pfw
Arbitrary Command Injection
This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23399'}
2021-07-02T16:59:00Z
2021-06-29T18:26:05Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/rolangom/wincred/blob/3fd39186ee32add9c12046cdccf2765d19565335/index.ts%23L20', 'https://snyk.io/vuln/SNYK-JS-WINCRED-1078538', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23399'}
null
npm
GHSA-c3hq-7mxh-mqxf
Sandbox Breakout / Arbitrary Code Execution in lighter-vm
All versions of `lighter-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:54:55Z
2020-09-04T14:59:50Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1317'}
null
npm
GHSA-26q7-g57v-mxcp
HTML Injection in shout
Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting. ## Recommendation Update to version 0.50.0 or later.
{'CVE-2017-16043'}
2020-08-31T18:19:13Z
2018-11-07T00:28:11Z
MODERATE
null
{'CWE-80'}
{'https://www.npmjs.com/advisories/322', 'https://github.com/erming/shout/pull/344', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043', 'https://github.com/advisories/GHSA-26q7-g57v-mxcp', 'https://nodesecurity.io/advisories/322'}
null
npm
GHSA-hhrp-qm88-xjr3
Moderate severity vulnerability that affects valine
An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.
{'CVE-2018-19289'}
2021-09-14T17:21:10Z
2018-11-21T22:19:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-hhrp-qm88-xjr3', 'https://github.com/xCss/Valine/issues/127', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289', 'https://github.com/xCss/Valine'}
null