ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-vc6r-4x6g-mmqc
|
Path Traversal in m-server
|
Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server.
## Recommendation
Update to version 1.4.2 or later.
| null |
2020-08-31T18:33:45Z
|
2019-06-11T16:16:23Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json', 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a', 'https://hackerone.com/reports/319795', 'https://www.npmjs.com/advisories/731'}
| null |
npm
|
GHSA-wqhw-frpx-5mmp
|
Command Injection in tomato
|
All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:36:09Z
|
2020-09-02T16:01:33Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/797'}
| null |
npm
|
GHSA-6qh5-wx38-q92g
|
Directory Traversal in ltt.js
|
Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2020-08-31T18:22:04Z
|
2019-05-30T17:15:59Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js', 'https://www.npmjs.com/advisories/411'}
| null |
npm
|
GHSA-vfp9-gwrh-wq9g
|
Path Traversal in crud-file-server
|
Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 0.9.0 or later.
|
{'CVE-2018-3733'}
|
2020-08-31T18:43:44Z
|
2018-07-18T21:20:19Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3733', 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82', 'https://www.npmjs.com/advisories/1003', 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g', 'https://hackerone.com/reports/310690'}
| null |
npm
|
GHSA-r2rg-683g-ff96
|
Malicious Package in axios-http
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:11:07Z
|
2020-09-03T19:40:12Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1123'}
| null |
npm
|
GHSA-v86x-f47q-f7f4
|
Unauthorized File Access in atompm
|
Versions of `atompm` prior to 0.8.2 are vulnerable to Unauthorized File Access. The package fails to sanitize relative paths in the URL for file downloads, allowing attackers to download arbitrary files from the system.
## Recommendation
Upgrade to version 0.8.2 or later.
| null |
2020-08-31T18:42:01Z
|
2020-09-11T21:09:24Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://www.npmjs.com/advisories/959'}
| null |
npm
|
GHSA-3f97-rj68-2pjf
|
Malicious Package in buffe2-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:57:28Z
|
2020-09-03T21:48:35Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1238'}
| null |
npm
|
GHSA-89gv-h8wf-cg8r
|
Hostname spoofing via backslashes in URL
|
### Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect.
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Example URL: `https:/\/\/\expected-example.com/path`
Escaped string: `https:/\\/\\/\\expected-example.com/path` (JavaScript strings must escape backslash)
Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html).
### Patches
Version 1.19.7 is patched against all known payload variants.
### References
https://github.com/medialize/URI.js/releases/tag/v1.19.7 (fix for this particular bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for related bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass)
[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling)
### For more information
If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
### Reporter credit
[ready-research](https://github.com/ready-research) via https://huntr.dev/
|
{'CVE-2021-3647'}
|
2021-07-19T16:38:54Z
|
2021-07-19T21:22:36Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://huntr.dev/bounties/1625558772840-medialize/URI.js', 'https://github.com/medialize/URI.js/security/advisories/GHSA-89gv-h8wf-cg8r', 'https://github.com/medialize/URI.js/releases/tag/v1.19.6', 'https://github.com/medialize/URI.js/releases/tag/v1.19.7', 'https://github.com/medialize/URI.js/releases/tag/v1.19.3', 'https://github.com/medialize/URI.js/pull/233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3647', 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'}
| null |
npm
|
GHSA-pmgv-94f5-6w7w
|
Malicious Package in eact
|
All versions of `eact` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:03:02Z
|
2020-09-02T20:21:30Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/853'}
| null |
npm
|
GHSA-r578-pj6f-r4ff
|
Auto-merging Person Records Compromised
|
### Impact
New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events).
### Patches
We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details.
### Workarounds
If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class.
```js
create = async (profile) => {
const rockUpdateFields = this.mapApollosFieldsToRock(profile);
// auto-merge functionality is compromised
// we are creating a new user and patching them with profile details
const id = await this.post('/People', {
Gender: 0, // required by Rock. Listed first so it can be overridden.
IsSystem: false, // required by rock
});
await this.patch(`/People/${id}`, {
...rockUpdateFields,
});
return id;
};
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [support@apollos.app](mailto:support@apollos.app)
|
{'CVE-2021-32691'}
|
2021-06-16T21:25:21Z
|
2021-06-21T17:07:47Z
|
HIGH
| null |
{'CWE-287', 'CWE-303'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32691', 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0', 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2', 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}
| null |
npm
|
GHSA-vf8q-pw7h-r2x2
|
Malicious Package in epress
|
Version 4.13.2 of `epress` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-30T22:03:15Z
|
2020-09-11T21:15:54Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/925'}
| null |
npm
|
GHSA-mhxg-pr3j-v9gr
|
Malicious Package in colne
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:59:03Z
|
2020-09-03T19:41:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1386'}
| null |
npm
|
GHSA-f9wg-5f46-cjmw
|
NextAuth.js default redirect callback vulnerable to open redirects
|
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your `callbacks` option:
```js
// async redirect(url, baseUrl) { // v3
async redirect({ url, baseUrl }) { // v4
// Allows relative callback URLs
if (url.startsWith("/")) return new URL(url, baseUrl).toString()
// Allows callback URLs on the same origin
else if (new URL(url).origin === baseUrl) return url
return baseUrl
}
```
If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
|
{'CVE-2022-24858'}
|
2022-04-22T20:49:09Z
|
2022-04-22T20:49:09Z
|
MODERATE
| null |
{'CWE-290', 'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24858', 'https://github.com/nextauthjs/next-auth', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw', 'https://next-auth.js.org/getting-started/upgrade-v4', 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50', 'https://next-auth.js.org/configuration/callbacks#redirect-callback', 'https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.2'}
| null |
npm
|
GHSA-8qh7-xw58-3ww7
|
Malicious Package in radic-util
|
Version 1.0.2 of `radic-util` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:22Z
|
2020-09-11T21:25:37Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/942'}
| null |
npm
|
GHSA-wr66-vrwm-5g5x
|
Denial of Service Vulnerability in next.js
|
### Impact
Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality.
- **Affected:** All of the following must be true to be affected by this CVE
- Next.js versions above v12.0.0
- Using next start or a custom server
- Using the built-in i18n support
- **Not affected:**
- Deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js.
### Patches
A patch has been released, `next@12.0.9`, that mitigates this issue. We recommend all affected users upgrade as soon as possible.
### Workarounds
We recommend upgrading whether you can reproduce or not although you can ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until you upgrade.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [next](https://github.com/vercel/next.js)
* Email us at [security@vercel.com](mailto:security@vercel.com)
|
{'CVE-2022-21721'}
|
2022-02-07T21:17:29Z
|
2022-01-28T23:09:22Z
|
MODERATE
| null |
{'CWE-400', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21721', 'https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x', 'https://github.com/vercel/next.js/releases/tag/v12.0.9', 'https://github.com/vercel/next.js/pull/33503', 'https://github.com/vercel/next.js'}
| null |
npm
|
GHSA-mq9h-cwc2-6j5r
|
Malicious Package in midway-dataproxy
|
All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:21Z
|
2020-09-03T17:42:27Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1056'}
| null |
npm
|
GHSA-qhf6-vqq9-q2p7
|
Directory Traversal in gaoxiaotingtingting
|
Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16108'}
|
2020-08-31T18:20:57Z
|
2020-09-01T16:58:58Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/377', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108', 'https://nodesecurity.io/advisories/377', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}
| null |
npm
|
GHSA-qpjp-7rp2-9c3f
|
Moderate severity vulnerability that affects validator
|
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
|
{'CVE-2013-7451'}
|
2021-09-16T20:03:05Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451', 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f'}
| null |
npm
|
GHSA-fpm5-vv97-jfwg
|
Uncontrolled Resource Consumption in firebase
|
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
|
{'CVE-2020-7765'}
|
2021-04-15T21:39:07Z
|
2021-05-18T01:57:24Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7765', 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada', 'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324', 'https://github.com/firebase/firebase-js-sdk/pull/4001'}
| null |
npm
|
GHSA-cr67-78jr-j94p
|
Local File Inclusion in domokeeper
|
All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:46:25Z
|
2020-09-03T18:14:47Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/1075'}
| null |
npm
|
GHSA-73rg-x683-m3qw
|
Buffer overflow in canvas
|
A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image.
|
{'CVE-2020-8215'}
|
2021-05-06T23:33:05Z
|
2021-05-07T16:05:16Z
|
HIGH
| null |
{'CWE-120'}
|
{'https://hackerone.com/reports/315037', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://www.npmjs.com/package/canvas', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215'}
| null |
npm
|
GHSA-8w57-jfpm-945m
|
Denial of Service in http-proxy-agent
|
Versions of `http-proxy-agent` before 2.1.0 are vulnerable to denial of service and uninitialized memory leak when unsanitized options are passed to `Buffer`.
## Recommendation
Update to version 2.1.0 or later.
| null |
2020-08-31T18:29:40Z
|
2019-06-11T16:16:07Z
|
HIGH
| null | null |
{'https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80', 'https://hackerone.com/reports/321631', 'https://nodesecurity.io/advisories/607', 'https://www.npmjs.com/advisories/607'}
| null |
npm
|
GHSA-8vmc-g99q-xj94
|
Directory Traversal in dcdcdcdcdc
|
Affected versions of `dcdcdcdcdc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16190'}
|
2020-08-31T18:23:11Z
|
2020-09-01T18:23:52Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc', 'https://nodesecurity.io/advisories/439', 'https://www.npmjs.com/advisories/439', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16190'}
| null |
npm
|
GHSA-ch82-gqh6-9xj9
|
Prototype Pollution in get-setter
|
All versions of `get-setter` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:25Z
|
2020-09-04T15:13:19Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1332'}
| null |
npm
|
GHSA-wp2p-q35g-3rjj
|
Malicious Package in soket.io
|
All versions of `soket.io` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:21Z
|
2020-09-01T21:13:01Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/686'}
| null |
npm
|
GHSA-m647-5wf9-3jp3
|
OS Command Injection in closure-compiler-stream
|
closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument "options" of the exports function in "index.js" can be controlled by users without any sanitization.
|
{'CVE-2020-7603'}
|
2021-07-28T18:53:03Z
|
2021-05-07T16:16:06Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7603'}
| null |
npm
|
GHSA-6fh5-8wq8-w3wr
|
Prototype Pollution in unflatten
|
All versions of `unflatten` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:18Z
|
2020-09-04T15:09:55Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1329'}
| null |
npm
|
GHSA-cwp7-92h5-82wx
|
Downloads Resources over HTTP in haxe-dev
|
Affected versions of `haxe-dev` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe-dev`.
## Recommendation
This package is actively maintained, yet after 2 years, the maintainer has not provided a patch for the vulnerability. This likely means that the maintainer has decided to accept the risk, and this vulnerability will never be patched.
Because of this, the best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10637'}
|
2021-01-08T18:55:35Z
|
2019-02-18T23:47:10Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-cwp7-92h5-82wx', 'https://nodesecurity.io/advisories/237', 'https://www.npmjs.com/advisories/237', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10637'}
| null |
npm
|
GHSA-725f-3pw7-rq6x
|
Malicious Package in 8.9.4
|
Versions 1.0.2, 1.0.3, 1.0.4 and 1.0.5 of `8.9.4` contain malicious code as a preinstall script. The package reads the system's SSH keys but does not upload it to a remote server.
## Recommendation
Remove the package from your environment. There is no evidence of further compromise at the moment.
| null |
2021-09-29T20:46:52Z
|
2020-09-03T21:09:47Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1201'}
| null |
npm
|
GHSA-q4qq-fm7q-cwp5
|
Multiple XSS Filter Bypasses in validator
|
Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter.
## Proof of Concept
Various inputs that could bypass the filter were discovered:
Improper parsing of nested tags:
```
<s <onmouseover="alert(1)"> <;s onmouseover="alert(1)">This is a test</s>
```
Incomplete filtering of javascript: URIs:
```
<a href="javascriptJ a V a S c R iPt::alert(1)" "<s>">test</a>
```
UI Redressing:
```
<div style="z-index: 9999999; background-color: green; width: 100%; height: 100%">
<h1>You have won</h1>Please click the link and enter your login details:
<a href="http://example.com/">http://good.com</a>
</div>
```
Bypass via Nested Forbidden Strings:
```
<scrRedirecRedirect 302t 302ipt type="text/javascript">prompt(1);</scrRedirecRedirect 302t 302ipt>
```
Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of.
## Recommendation
If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed.
|
{'CVE-2013-7454'}
|
2021-09-16T19:30:36Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/', 'https://nodesecurity.io/advisories/41', 'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454', 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html', 'https://www.npmjs.com/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-gf8q-jrpm-jvxq
|
URL parsing in node-forge could lead to undesired behavior.
|
### Impact
The regex used for the `forge.util.parseUrl` API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior.
### Patches
`forge.util.parseUrl` and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API.
### Workarounds
Ensure code does not directly or indirectly call `forge.util.parseUrl` with untrusted input.
### References
- https://www.huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at support@digitalbazaar.com
| null |
2022-01-07T22:20:43Z
|
2022-01-08T00:22:02Z
|
LOW
| null | null |
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq', 'https://github.com/digitalbazaar/forge/'}
| null |
npm
|
GHSA-vxf5-wxwp-m7g9
|
Open Redirect in Next.js
|
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when `pages/_error.js` was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain.
### Impact
- **Affected:** Users of Next.js between `10.0.5` and `10.2.0`
- **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` without `getInitialProps`
- **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` and `next export`
- **Not affected**: Deployments on Vercel ([vercel.com](https://vercel.com)) are not affected
- **Not affected:** Deployments **with** `pages/404.js`
- Note that versions prior to 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
We recommend upgrading to the latest version of Next.js to improve the overall security of your application.
### Patches
https://github.com/vercel/next.js/releases/tag/v11.1.0
|
{'CVE-2021-37699'}
|
2022-04-28T20:32:19Z
|
2021-08-12T14:51:14Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/vercel/next.js', 'https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37699', 'https://github.com/vercel/next.js/releases/tag/v11.1.0'}
| null |
npm
|
GHSA-gfv4-2vhm-486m
|
Hijacked Environment Variables in node-fabric
|
The `node-fabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16052'}
|
2020-08-31T18:25:06Z
|
2018-07-23T20:50:10Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/489', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16052', 'https://github.com/advisories/GHSA-gfv4-2vhm-486m', 'https://www.npmjs.com/advisories/489'}
| null |
npm
|
GHSA-jqfh-8hw5-fqjr
|
Improper Handling of Exceptional Conditions in detect-character-encoding
|
### Impact
In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash.
### Patches
The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to detect-character-encoding. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const bodyParser = require("body-parser");
const detectCharacterEncoding = require("detect-character-encoding");
const app = express();
app.use(bodyParser.raw());
app.post("/", (req, res) => {
const charsetMatch = detectCharacterEncoding(req.body);
res.end(charsetMatch.encoding);
});
app.listen(3000);
```
`printf "\xAA" | curl --request POST --header "Content-Type: application/octet-stream" --data-binary @- http://localhost:3000` crashes the server.
|
{'CVE-2021-39157'}
|
2021-10-21T14:15:03Z
|
2021-08-25T14:44:48Z
|
HIGH
| null |
{'CWE-755'}
|
{'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39157', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/issues/15', 'https://github.com/sonicdoe/detect-character-encoding'}
| null |
npm
|
GHSA-28xx-8j99-m32j
|
Malicious Package in nginxbeautifier
|
Version 1.0.14 of `nginxbeautifier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.14 of this module is found installed you will want to replace it with a version before or after 1.0.14. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-10-01T13:11:55Z
|
2020-09-01T20:37:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/639'}
| null |
npm
|
GHSA-5pq8-2q24-mj3p
|
Downloads Resources over HTTP in fis-parser-sass-bin
|
Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10660'}
|
2021-01-08T19:48:52Z
|
2019-02-18T23:45:03Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/269', 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p', 'https://nodesecurity.io/advisories/269', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660'}
| null |
npm
|
GHSA-qgmg-gppg-76g5
|
Inefficient Regular Expression Complexity in validator.js
|
validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3765'}
|
2021-11-03T14:46:00Z
|
2021-11-03T17:34:45Z
|
MODERATE
| null |
{'CWE-1333'}
|
{'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js', 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}
| null |
npm
|
GHSA-446m-mv8f-q348
|
Regular Expression Denial of Service in moment
|
Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings.
## Recommendation
Update to version 2.19.3 or later.
|
{'CVE-2017-18214'}
|
2021-08-31T21:44:15Z
|
2018-03-05T18:35:09Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.tenable.com/security/tns-2019-02', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18214', 'https://www.npmjs.com/advisories/532', 'https://github.com/advisories/GHSA-446m-mv8f-q348', 'https://github.com/moment/moment/issues/4163', 'https://nodesecurity.io/advisories/532', 'https://github.com/moment/moment', 'https://github.com/moment/moment/pull/4326'}
| null |
npm
|
GHSA-c4fm-46gm-4469
|
Malicious Package in sparkies
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:28:30Z
|
2020-09-03T20:00:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1141'}
| null |
npm
|
GHSA-hgwm-pv9h-q5m7
|
Potential XSS in jQuery dependency in Mirador
|
### Impact
Mirador users less than v3.0.0 (alpha-rc) versions that have an unpatched jQuery. When adopters update jQuery they will find some of Mirador functionality to be broken.
### Patches
Mirador adopters should update to v3.0.0, no updates exist for v2.x releases.
### Workarounds
Yes, Mirador users could fork and create their own custom build of Mirador and make the bug fixes themselves.
### References
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://jquery.com/upgrade-guide/3.5/
| null |
2021-10-04T21:19:55Z
|
2020-09-18T18:03:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/ProjectMirador/mirador/security/advisories/GHSA-hgwm-pv9h-q5m7', 'https://github.com/ProjectMirador/mirador'}
| null |
npm
|
GHSA-wr2c-ppj9-f2fv
|
Downloads Resources over HTTP in webdrvr
|
Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10601'}
|
2021-01-08T01:15:00Z
|
2019-02-18T23:33:54Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/193', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601', 'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv', 'https://www.npmjs.com/advisories/193'}
| null |
npm
|
GHSA-h372-w3xp-2jg3
|
Directory Traversal in section2.madisonjbrooks12
|
Affected versions of `section2.madisonjbrooks12` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16172'}
|
2020-08-31T18:24:17Z
|
2020-09-01T18:54:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/468', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16172', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12', 'https://nodesecurity.io/advisories/468'}
| null |
npm
|
GHSA-hv9c-qwqg-qj3v
|
Remote Code Execution in electron
|
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code execution.
More information to determine if you are impacted can be found on the [electron blog](https://electronjs.org/blog/web-preferences-fix).
## Recommendation
Upgrade Electron to >=3.0.0-beta.7, >=2.0.8, >=1.8.8, or >=1.7.16."
|
{'CVE-2018-15685'}
|
2021-09-14T17:29:34Z
|
2018-08-23T19:12:08Z
|
HIGH
| null |
{'CWE-1188'}
|
{'https://electronjs.org/blog/web-preferences-fix', 'https://www.npmjs.com/advisories/732', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15685', 'https://www.contrastsecurity.com/security-influencers/cve-2018-15685', 'https://www.exploit-db.com/exploits/45272/', 'https://github.com/advisories/GHSA-hv9c-qwqg-qj3v'}
| null |
npm
|
GHSA-5v7r-jg9r-vq44
|
Insecure Cryptography Algorithm in simple-crypto-js
|
Versions of `simple-crypto-js` prior to 2.3.0 use AES-CBC with PKCS#7 padding, which is vulnerable to padding oracle attacks. This may allow attackers to break the encryption and access sensitive data.
## Recommendation
Upgrade to version 2.3.0 or later.
| null |
2021-09-29T20:08:01Z
|
2020-09-03T21:19:46Z
|
MODERATE
| null |
{'CWE-327'}
|
{'https://www.npmjs.com/advisories/1220', 'https://github.com/danang-id/simple-crypto-js/issues/12', 'https://snyk.io/vuln/SNYK-JS-SIMPLECRYPTOJS-544027', 'https://robertheaton.com/2013/07/29/padding-oracle-attack/', 'https://github.com/danang-id/simple-crypto-js'}
| null |
npm
|
GHSA-2wrq-wmqf-8vcc
|
Downloads Resources over HTTP in operadriver
|
operadriver is a Opera Driver for Selenium.
operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
Update to version 0.2.3 or later.
|
{'CVE-2016-10565'}
|
2020-08-31T18:14:19Z
|
2019-02-18T23:35:48Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/196', 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10565', 'https://nodesecurity.io/advisories/196'}
| null |
npm
|
GHSA-xj6f-x7jm-85ff
|
Downloads Resources over HTTP in openframe-ascii-image
|
Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10690'}
|
2021-01-08T00:00:45Z
|
2019-02-18T23:41:54Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-xj6f-x7jm-85ff', 'https://www.npmjs.com/advisories/298', 'https://nodesecurity.io/advisories/298', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10690'}
| null |
npm
|
GHSA-ph58-4vrj-w6hr
|
XSS vulnerability that affects bootstrap
|
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
|
{'CVE-2018-20677'}
|
2021-07-26T21:49:18Z
|
2019-01-17T13:57:56Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/pull/27047', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/advisories/GHSA-ph58-4vrj-w6hr', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628', 'https://github.com/twbs/bootstrap/issues/27045', 'https://access.redhat.com/errata/RHSA-2019:1456'}
| null |
npm
|
GHSA-255r-pghp-r5wh
|
Malicious Package in hdeky
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:02:17Z
|
2020-09-03T17:05:34Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1398'}
| null |
npm
|
GHSA-735c-r4vc-6gm9
|
Downloads Resources over HTTP in bionode-sra
|
Affected versions of `bionode-sra` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10613'}
|
2021-09-16T20:41:21Z
|
2019-02-18T23:56:45Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10613', 'https://nodesecurity.io/advisories/211', 'https://www.npmjs.com/advisories/211', 'https://github.com/bionode/bionode-sra'}
| null |
npm
|
GHSA-4gw3-8f77-f72c
|
Regular expression denial of service in codemirror
|
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2.
The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
|
{'CVE-2020-7760'}
|
2021-04-21T17:29:09Z
|
2021-05-10T18:46:27Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445', 'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb', 'https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447', 'https://www.npmjs.com/package/codemirror', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760', 'https://www.debian.org/security/2020/dsa-4789', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448'}
| null |
npm
|
GHSA-6m4r-cgm3-6q7q
|
Cross-Site Scripting in status-board
|
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderJsDashboard()` function concatenates the `safeDashboard` variable to the HTTP response message with insufficient sanitization. If this variable is controlled by user input it may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15478'}
|
2021-08-17T22:30:43Z
|
2019-09-23T18:32:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460293', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15478', 'https://github.com/jameswlane/status-board/pull/949', 'https://github.com/jameswlane/status-board/pull/949/files', 'https://www.npmjs.com/advisories/1151'}
| null |
npm
|
GHSA-hg2p-2cvq-4ppv
|
Cross-site scripting in lazysizes
|
lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: data-vimeo, data-vimeoparams, data-youtube and data-ytparams which can be abused to inject malicious JavaScript.
|
{'CVE-2020-7642'}
|
2021-05-25T20:08:07Z
|
2021-12-10T20:06:23Z
|
LOW
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642', 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
| null |
npm
|
GHSA-f89g-whpf-6q9m
|
Cross-Site Scripting in i18next
|
Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability.
## Proof of Concept
```
var init = i18n.init({debug: true}, function(){
var test = i18n.t('__firstName__ __lastName__', {
escapeInterpolation: true,
firstName: '__lastNameHTML__',
lastName: '<script>',
});
console.log(test);
});
// equals "<script> <script>"
```
## Recommendation
Update to version 1.10.3 or later.
|
{'CVE-2017-16008'}
|
2020-08-31T18:19:21Z
|
2018-11-09T17:46:56Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/325', 'https://github.com/i18next/i18next/pull/443', 'https://www.npmjs.com/advisories/325', 'https://github.com/advisories/GHSA-f89g-whpf-6q9m', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16008'}
| null |
npm
|
GHSA-3fw8-66wf-pr7m
|
methodOverride Middleware Reflected Cross-Site Scripting in connect
|
Connect is a stack of middleware that is executed in order in each request.
The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override".
Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser.
###Example:
```
~ curl "localhost:3000" -d "_method=<script src=http://nodesecurity.io/xss.js></script>"
Cannot <SCRIPT SRC=HTTP://NODESECURITY.IO/XSS.JS></SCRIPT> /
```
## Recommendation
Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.
|
{'CVE-2013-7370'}
|
2021-04-07T19:56:51Z
|
2020-08-31T22:41:27Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://github.com/senchalabs/connect/issues/831', 'https://access.redhat.com/security/cve/cve-2013-7370', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7370', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370', 'https://security-tracker.debian.org/tracker/CVE-2013-7370', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'http://www.openwall.com/lists/oss-security/2014/04/21/2', 'https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135', 'https://www.npmjs.com/advisories/3'}
| null |
npm
|
GHSA-7c82-mp33-r854
|
Cross-site scripting in bootstrap-select
|
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
|
{'CVE-2019-20921'}
|
2021-04-22T23:22:11Z
|
2021-05-07T16:47:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767', 'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://www.npmjs.com/advisories/1522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921', 'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457'}
| null |
npm
|
GHSA-4mv4-gmmf-q382
|
Cross-Site Scripting in datatables
|
Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php.
## Recommendation
Update to a version greater than 1.10.8.
|
{'CVE-2015-6584'}
|
2021-09-23T19:26:58Z
|
2020-08-31T22:42:29Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/5', 'http://seclists.org/fulldisclosure/2015/Sep/37', 'http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html', 'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/', 'https://github.com/DataTables/DataTables/issues/602', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6584', 'http://www.securityfocus.com/archive/1/archive/1/536437/100/0/threaded', 'https://github.com/DataTables/DataTables', 'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d', 'http://www.securityfocus.com/archive/1/536437/100/0/threaded'}
| null |
npm
|
GHSA-5cp4-xmrw-59wf
|
XSS via JQLite DOM manipulation functions in AngularJS
|
### Summary
XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`.
### Description
JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`.
One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218).
If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM.
This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/).
### Proof of concept
```javascript
const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`
```
Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is.
As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute.
```javascript
angular.element(document).append(inertPayload);
```
This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`.
### Patches
The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2).
### Workarounds
Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended.
### References
https://github.com/advisories/GHSA-mhp6-pxh8-r675
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058
| null |
2021-10-08T21:25:58Z
|
2020-08-05T21:47:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/angular/angular.js', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/', 'https://github.com/advisories/GHSA-mhp6-pxh8-r675', 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf'}
| null |
npm
|
GHSA-3f99-hvg4-qjwj
|
Insecure random number generation in keypair
|
## Description and Impact
A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim. We recommend replacing any RSA keys that were generated using keypair version 1.0.3 or earlier.
## Fix
* The [bug](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) in the pseudo-random number generator is fixed in commit [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18).
* If the crypto module is available, it is used instead of the pseudo-random number generator. Also fixed in [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18)
## Additional Details
The specific [line](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) with the flaw is:
```javascript
b.putByte(String.fromCharCode(next & 0xFF))
```
The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is
```javascript
util.ByteBuffer.prototype.putByte = function(b) {
this.data += String.fromCharCode(b);
};
```
Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. This results in most of the buffer containing zeros. An example generated buffer:
(Note: truncated for brevity)
```
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x04\x00\x00\x00....\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
```
Since it is masking with 0xFF, approximately 97% of the bytes are converted to zeros. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion.
## Credit
This issue was reported to GitHub Security Lab by Ross Wheeler of Axosoft. It was discovered by Axosoft engineer Dan Suceava, who noticed that [keypair](https://github.com/juliangruber/keypair) was regularly generating duplicate RSA keys. GitHub security engineer [@vcsjones (Kevin Jones)](https://github.com/vcsjones) independently investigated the problem and identified the cause and source code location of the bug.
|
{'CVE-2021-41117'}
|
2021-10-11T18:36:36Z
|
2021-10-11T17:09:05Z
|
HIGH
| null |
{'CWE-335'}
|
{'https://github.com/juliangruber/keypair/releases/tag/v1.0.4', 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/', 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj', 'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18', 'https://github.com/juliangruber/keypair', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41117'}
| null |
npm
|
GHSA-hxcc-f52p-wc94
|
Insecure serialization leading to RCE in serialize-javascript
|
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack.
|
{'CVE-2020-7660'}
|
2021-09-23T18:50:59Z
|
2020-08-11T17:21:13Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd', 'https://github.com/yahoo/serialize-javascript', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'}
| null |
npm
|
GHSA-cvx3-pqmj-x57x
|
Downloads Resources over HTTP in scalajs-standalone-bin
|
Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10634'}
|
2021-01-08T18:56:11Z
|
2019-02-18T23:47:13Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-cvx3-pqmj-x57x', 'https://nodesecurity.io/advisories/231', 'https://www.npmjs.com/advisories/231', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}
| null |
npm
|
GHSA-27g8-r9vw-765x
|
Private Field data leak
|
This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control.
This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information.
### Impact
Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted.
### Patches
None, at this time
### Workarounds
None, at this time
### References
None
### For more information
For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published.
If needed, you can email us at keystone@thinkmill.com.au
|
{'CVE-2021-32624'}
|
2021-05-25T20:20:03Z
|
2021-05-27T18:39:03Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/keystonejs/keystone-5/security/advisories/GHSA-27g8-r9vw-765x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32624'}
| null |
npm
|
GHSA-xr53-m937-jr9c
|
Cross-Site Scripting in ngx-md
|
Versions of `ngx-md` prior to 6.0.3 are vulnerable to Cross-Site Scripting. Links are not properly restricted to http/https and can contain JavaScript which may lead to arbitrary code execution. Markdown input such as `[Click Me](javascript:alert('Injected!'%29)` is rendered as a `Click Me` link that executes JavaScript.
## Recommendation
Upgrade to version 6.0.3 or later.
| null |
2021-10-04T21:05:25Z
|
2020-09-03T15:49:14Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1485', 'https://github.com/dimpu/ngx-md/issues/129', 'https://github.com/dimpu/ngx-md'}
| null |
npm
|
GHSA-hgpf-97c5-74fc
|
Regular expression denial of service in @absolunet/kafe
|
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.
|
{'CVE-2020-7761'}
|
2021-04-19T23:43:02Z
|
2021-05-10T19:08:29Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/package/@absolunet/kafe', 'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403', 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761'}
| null |
npm
|
GHSA-cwcx-rxgc-cmw3
|
Prototype pollution in 101
|
Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25943'}
|
2021-05-25T20:45:15Z
|
2021-05-17T20:57:40Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25943', 'https://github.com/tjmehta/101/blob/d87f63ce2a4cbdc476e8287abd78327c3144d646/set.js#L52', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943'}
| null |
npm
|
GHSA-p3jx-g34v-q56j
|
Malicious Package in j3-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:31:54Z
|
2020-09-03T22:54:02Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1276'}
| null |
npm
|
GHSA-fgfj-rj24-mj7q
|
Malicious Package in kraken-api
|
Version 0.1.8 of `kraken-api` contains malicious code as a postinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2020-08-31T18:40:22Z
|
2020-09-02T21:47:08Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/914'}
| null |
npm
|
GHSA-v3px-6cc8-f8j3
|
Path traversal in servey
|
A path traversal vulnerability in servey versions prior to 3.3.2 allows an attacker to read content of any arbitrary file.
|
{'CVE-2020-8214'}
|
2021-05-07T15:07:41Z
|
2021-05-07T15:56:19Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8214', 'https://hackerone.com/reports/355501'}
| null |
npm
|
GHSA-3fc5-9x9m-vqc4
|
Privilege Escalation in express-cart
|
Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users.
## Recommendation
Update to version 1.1.6 or later.
| null |
2021-08-04T21:25:59Z
|
2019-06-03T17:31:32Z
|
CRITICAL
| null | null |
{'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b', 'https://www.npmjs.com/advisories/730', 'https://snyk.io/vuln/npm:express-cart:20180712', 'https://hackerone.com/reports/343626', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json'}
| null |
npm
|
GHSA-mc23-976p-j42x
|
Low severity vulnerability that affects xterm
|
A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters, aka "Xterm Remote Code Execution Vulnerability." This affects xterm.js.
|
{'CVE-2019-0542'}
|
2020-06-16T21:45:48Z
|
2019-01-14T16:19:55Z
|
LOW
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0542', 'https://github.com/advisories/GHSA-mc23-976p-j42x'}
| null |
npm
|
GHSA-487w-pqcm-63hq
|
Command injection in buns
|
There is a command injection vulnerability in all versions of package buns. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule).
|
{'CVE-2020-7794'}
|
2021-01-12T23:52:20Z
|
2021-01-13T18:22:13Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7794', 'https://snyk.io/vuln/SNYK-JS-BUNS-1050389'}
| null |
npm
|
GHSA-6g6m-m6h5-w9gf
|
Authorization bypass in express-jwt
|
### Overview
Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration.
When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
You are using express-jwt
AND
You do not have **algorithms** configured in your express-jwt configuration.
AND
You are using libraries such as jwks-rsa as the **secret**.
### How to fix that?
Specify **algorithms** in the express-jwt configuration. The following is an example of a proper configuration
```
const checkJwt = jwt({
secret: jwksRsa.expressJwtSecret({
rateLimit: true,
jwksRequestsPerMinute: 5,
jwksUri: `https://${DOMAIN}/.well-known/jwks.json`
}),
// Validate the audience and the issuer.
audience: process.env.AUDIENCE,
issuer: `https://${DOMAIN}/`,
// restrict allowed algorithms
algorithms: ['RS256']
});
```
### Will this update impact my users?
The fix provided in patch will not affect your users if you specified the algorithms allowed. The patch now makes **algorithms** a required configuration.
### Credit
IST Group
|
{'CVE-2020-15084'}
|
2021-01-07T23:49:22Z
|
2020-06-30T16:05:24Z
|
HIGH
| null |
{'CWE-285'}
|
{'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15084', 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf'}
| null |
npm
|
GHSA-g53w-52xc-2j85
|
Cross-Site Scripting in react
|
Affected versions of `react` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize input used to create keys. This may allow attackers to execute arbitrary JavaScript if a key is generated from user input.
## Recommendation
If you are using `react` 0.5.x, upgrade to version 0.5.2 or later.
If you are using `react` 0.4.x, upgrade to version 0.4.2 or later.
|
{'CVE-2013-7035'}
|
2021-10-04T19:11:02Z
|
2020-09-04T16:52:57Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1420', 'https://github.com/facebook/react', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7035', 'https://snyk.io/vuln/npm:react:20131217', 'https://reactjs.org/blog/2013/12/18/react-v0.5.2-v0.4.2.html'}
| null |
npm
|
GHSA-gm9x-q798-hmr4
|
Command Injection in git-tags-remote
|
All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled.
The following proof-of-concept creates a file in `/tmp`:
```
const gitTagsRemote = require('git-tags-remote');
gitTagsRemote.get('https://github.com/sh0ji/git-tags-remote.git; echo "Injection Success" > /tmp/command-injection.test')
.then(tags => console.log(tags));
```
| null |
2021-09-23T17:26:33Z
|
2020-07-29T14:53:40Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/sh0ji/git-tags-remote/issues/58', 'https://github.com/sh0ji/git-tags-remote', 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c', 'https://www.npmjs.com/advisories/1517'}
| null |
npm
|
GHSA-4q79-fch7-g78q
|
Downloads Resources over HTTP in grunt-webdriver-qunit
|
Affected versions of `grunt-webdriver-qunit` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-webdriver-qunit`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10606'}
|
2021-01-08T19:54:30Z
|
2019-02-18T23:48:11Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/207', 'https://nodesecurity.io/advisories/207', 'https://github.com/advisories/GHSA-4q79-fch7-g78q', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10606'}
| null |
npm
|
GHSA-pmw4-jgxx-pcq9
|
File System Bounds Escape
|
### Impact
Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`.
### Background
When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function.

### Patches
None at the moment.
### Workarounds
There are no workarounds for windows servers. Hosting the server on a different OS mitigates the issue.
### References
Issues:
https://github.com/autovance/ftp-srv/issues/167
https://github.com/autovance/ftp-srv/issues/225
### For more information
If you have any questions or comments about this advisory:
Open an issue at https://github.com/autovance/ftp-srv.
Please email us directly; security@autovance.com.
|
{'CVE-2020-26299'}
|
2021-02-11T17:04:52Z
|
2021-02-10T18:11:34Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3', 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9', 'https://www.npmjs.com/package/ftp-srv', 'https://github.com/autovance/ftp-srv/issues/225', 'https://github.com/autovance/ftp-srv/issues/167', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26299', 'https://github.com/autovance/ftp-srv/pull/224'}
| null |
npm
|
GHSA-6xg2-cf6h-x4v8
|
Malicious Package in buffer-por
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:58:54Z
|
2020-09-03T21:53:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1243'}
| null |
npm
|
GHSA-8pww-pp5r-rff8
|
Path Traversal in marscode
|
This affects all versionsup to and including version 1.0.1-0 of package marscode. There is no path sanitization in the path provided at fs.readFile in index.js.
|
{'CVE-2020-7681'}
|
2021-05-06T23:16:18Z
|
2021-05-07T16:06:03Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-MARSCODE-590122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7681'}
| null |
npm
|
GHSA-4hm7-73ch-vm59
|
Malicious Package in buffer-8or
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:58:16Z
|
2020-09-03T21:49:43Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1241'}
| null |
npm
|
GHSA-gg2g-m5wc-vccq
|
Rebuild-bot workflow may allow unauthorised repository modifications
|
### Impact
`projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the "main" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the "main" repository.
The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made).
Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch.
### Patches
The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow.
### Workarounds
The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue.
### References
The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem.
[1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests
|
{'CVE-2021-21423'}
|
2021-04-16T22:53:30Z
|
2021-04-06T18:36:40Z
|
HIGH
| null |
{'CWE-527'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21423', 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643', 'https://www.npmjs.com/package/projen', 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}
| null |
npm
|
GHSA-c4w7-xm78-47vh
|
Prototype Pollution in y18n
|
### Overview
The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution.
### POC
```
const y18n = require('y18n')();
y18n.setLocale('__proto__');
y18n.updateLocale({polluted: true});
console.log(polluted); // true
```
### Recommendation
Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.
|
{'CVE-2020-7774'}
|
2022-04-20T19:14:17Z
|
2021-03-29T16:05:12Z
|
HIGH
| null |
{'CWE-915', 'CWE-20'}
|
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7774', 'https://github.com/yargs/y18n/issues/96', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25', 'https://github.com/yargs/y18n/pull/108', 'https://github.com/yargs/y18n'}
| null |
npm
|
GHSA-8wgc-jjvv-cv6v
|
Improper Authorization in loopback
|
Vulnerable versions of `loopback` may allow attackers to create Authentication Tokens on behalf of other users due to Improper Authorization. If the AccessToken model is publicly exposed, an attacker can create Authorization Tokens for any user as long as they know the target's `userId`. This will allow the attacker to access the user's data and their privileges.
## Recommendation
For loopback 2.x, upgrade to version 2.40.0 or later
For loopback 3.x, upgrade to version 3.22.0 or later
| null |
2021-09-27T15:44:08Z
|
2020-09-02T15:54:52Z
|
HIGH
| null |
{'CWE-285'}
|
{'https://loopback.io/doc/en/lb3/Security-advisory-08-08-2018.html]', 'https://www.npmjs.com/advisories/771', 'https://loopback.io/doc/en/lb2/Security-advisory-08-08-2018.html]', 'https://github.com/strongloop/loopback'}
| null |
npm
|
GHSA-79qm-h35f-hr77
|
OS Command Injection in compile-sass
|
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function "setupCleanupOnExit(cssPath)" within "dist/index.js" is executed as part of the "rm" command without any sanitization.
|
{'CVE-2019-10799'}
|
2022-01-04T19:48:58Z
|
2021-04-13T15:23:13Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/eiskalteschatten/compile-sass', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799', 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2', 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804', 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}
| null |
npm
|
GHSA-588m-9qg5-35pq
|
Reverse Tabnabbing in quill
|
Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-28T22:06:18Z
|
2020-09-03T17:19:09Z
|
MODERATE
| null |
{'CWE-1022'}
|
{'https://github.com/quilljs/quill/pull/2674', 'https://github.com/quilljs/quill', 'https://github.com/quilljs/quill/issues/2438', 'https://www.npmjs.com/advisories/1039'}
| null |
npm
|
GHSA-h232-fpqx-mqgr
|
Malicious Package in log-symboles
|
Version 2.1.0 of `log-symboles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-29T20:45:11Z
|
2020-09-03T21:03:15Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1195'}
| null |
npm
|
GHSA-m57p-p67h-mq74
|
Command Injection Vulnerability in systeminformation
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency()
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
|
{'CVE-2020-26274'}
|
2020-12-16T19:24:51Z
|
2020-12-16T19:25:00Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-m57p-p67h-mq74', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26274', 'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99', 'https://www.npmjs.com/package/systeminformation', 'https://www.npmjs.com/advisories/1590'}
| null |
npm
|
GHSA-6fcr-9h9g-23fq
|
Denial of Service in ipfs-bitswap
|
Versions of `ipfs-bitswap` prior to 0.24.1 are vulnerable to Denial of Service (DoS). The package put unwanted blocks in the blockstore, which could be used to exhaust system resources in specific conditions.
## Recommendation
Upgrade to version 0.24.1 or later.
| null |
2021-09-27T22:31:00Z
|
2020-09-02T21:50:51Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-IPFSBITSWAP-174847', 'https://github.com/ipfs/js-ipfs-bitswap', 'https://www.npmjs.com/advisories/916', 'https://github.com/ipfs/js-ipfs-bitswap/pull/194'}
| null |
npm
|
GHSA-j4mr-9xw3-c9jx
|
Out-of-bounds Read in base64-url
|
Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input.
## Recommendation
Update to version 2.0.0 or later.
| null |
2020-08-31T18:31:43Z
|
2019-05-31T23:47:01Z
|
HIGH
| null |
{'CWE-125'}
|
{'https://www.npmjs.com/advisories/660', 'https://nodesecurity.io/advisories/660', 'https://hackerone.com/reports/321692'}
| null |
npm
|
GHSA-rp65-9cf3-cjxr
|
Inefficient Regular Expression Complexity in nth-check
|
nth-check is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3803'}
|
2021-09-20T20:47:27Z
|
2021-09-20T20:47:31Z
|
MODERATE
| null |
{'CWE-1333'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3803', 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0', 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726', 'https://github.com/fb55/nth-check'}
| null |
npm
|
GHSA-c4rh-4376-gff4
|
Improper certificate management in AWS IoT Device SDK v2
|
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.
|
{'CVE-2021-40830'}
|
2022-03-03T05:13:15.678455Z
|
2021-11-24T21:12:04Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
| null |
npm
|
GHSA-q3gh-5r98-j4h3
|
RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign
|
### Impact
Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature.
- If you are not use RSA-PSS signature validation, this vulnerability is not affected.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
### Patches
Users using RSA-PSS signature validation should upgrade to 8.0.17.
### Workarounds
Reject RSA-PSS signatures with unnecessary prepending zeros.
### References
https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3
[https://github.com/kjur/jsrsasign/issues/438](https://github.com/kjur/jsrsasign/issues/438)
https://nvd.nist.gov/vuln/detail/CVE-2020-14968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968
https://vuldb.com/?id.157125
https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS
|
{'CVE-2020-14968'}
|
2021-10-06T21:44:41Z
|
2020-06-26T16:26:50Z
|
CRITICAL
| null |
{'CWE-119'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14968', 'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99', 'https://vuldb.com/?id.157125', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968', 'https://www.npmjs.com/advisories/1541', 'https://github.com/kjur/jsrsasign/issues/438', 'https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS', 'https://www.npmjs.com/package/jsrsasign', 'https://kjur.github.io/jsrsasign/', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}
| null |
npm
|
GHSA-59x8-7wx6-4hj9
|
Malicious Package in secure_identity_login_module
|
All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:01:35Z
|
2020-09-03T17:47:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1063'}
| null |
npm
|
GHSA-f7f4-hqp2-7prc
|
Improper Input Validation in sails-hook-sockets
|
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
|
{'CVE-2018-21036'}
|
2021-09-22T21:11:20Z
|
2020-07-24T20:10:21Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e', 'http://www.openwall.com/lists/oss-security/2020/07/19/1', 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md', 'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036', 'https://github.com/balderdashy/sails-hook-sockets'}
| null |
npm
|
GHSA-9q9m-m2f6-jr5q
|
Malicious Package in chak
|
All versions of `chak` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:03:17Z
|
2020-09-02T20:22:34Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/854'}
| null |
npm
|
GHSA-25jw-gcfj-283j
|
Directory Traversal in 360class.jansenhm
|
Affected versions of `360class.jansenhm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16186'}
|
2020-08-31T18:23:32Z
|
2020-09-01T18:27:04Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16186', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm', 'https://nodesecurity.io/advisories/448', 'https://www.npmjs.com/advisories/448'}
| null |
npm
|
GHSA-jp4x-w63m-7wgm
|
Prototype Pollution in hoek
|
Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution.
The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property.
This can be demonstrated like so:
```javascript
var Hoek = require('hoek');
var malicious_payload = '{"__proto__":{"oops":"It works !"}}';
var a = {};
console.log("Before : " + a.oops);
Hoek.merge({}, JSON.parse(malicious_payload));
console.log("After : " + a.oops);
```
This type of attack can be used to overwrite existing properties causing a potential denial of service.
## Recommendation
Update to version 4.2.1, 5.0.3 or later.
|
{'CVE-2018-3728'}
|
2020-08-31T18:28:02Z
|
2018-04-26T15:25:17Z
|
MODERATE
| null |
{'CWE-471'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3728', 'https://github.com/advisories/GHSA-jp4x-w63m-7wgm', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://nodesecurity.io/advisories/566', 'https://snyk.io/vuln/npm:hoek:20180212', 'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee', 'https://www.npmjs.com/advisories/566', 'http://www.securityfocus.com/bid/103108', 'https://access.redhat.com/errata/RHSA-2018:1264', 'https://hackerone.com/reports/310439'}
| null |
npm
|
GHSA-9gr3-7897-pp7m
|
XSS in Image Optimization API for Next.js
|
### Impact
- **Affected:** All of the following must be true to be affected
- Next.js between version 10.0.0 and 11.1.0
- The `next.config.js` file has [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) array assigned
- The image host assigned in [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) allows user-provided SVG
- **Not affected**: The `next.config.js` file has [`images.loader`](https://nextjs.org/docs/basic-features/image-optimization#loader) assigned to something other than default
- **Not affected**: Deployments on [Vercel](https://vercel.com) are not affected
### Patches
[Next.js v11.1.1](https://github.com/vercel/next.js/releases/tag/v11.1.1)
|
{'CVE-2021-39178'}
|
2021-08-31T20:01:51Z
|
2021-09-01T18:24:22Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39178', 'https://github.com/vercel/next.js/releases/tag/v11.1.1', 'https://github.com/vercel/next.js'}
| null |
npm
|
GHSA-v85c-hgq5-7pfw
|
Arbitrary Command Injection
|
This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23399'}
|
2021-07-02T16:59:00Z
|
2021-06-29T18:26:05Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/rolangom/wincred/blob/3fd39186ee32add9c12046cdccf2765d19565335/index.ts%23L20', 'https://snyk.io/vuln/SNYK-JS-WINCRED-1078538', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23399'}
| null |
npm
|
GHSA-c3hq-7mxh-mqxf
|
Sandbox Breakout / Arbitrary Code Execution in lighter-vm
|
All versions of `lighter-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:54:55Z
|
2020-09-04T14:59:50Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1317'}
| null |
npm
|
GHSA-26q7-g57v-mxcp
|
HTML Injection in shout
|
Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting.
## Recommendation
Update to version 0.50.0 or later.
|
{'CVE-2017-16043'}
|
2020-08-31T18:19:13Z
|
2018-11-07T00:28:11Z
|
MODERATE
| null |
{'CWE-80'}
|
{'https://www.npmjs.com/advisories/322', 'https://github.com/erming/shout/pull/344', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043', 'https://github.com/advisories/GHSA-26q7-g57v-mxcp', 'https://nodesecurity.io/advisories/322'}
| null |
npm
|
GHSA-hhrp-qm88-xjr3
|
Moderate severity vulnerability that affects valine
|
An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.
|
{'CVE-2018-19289'}
|
2021-09-14T17:21:10Z
|
2018-11-21T22:19:41Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-hhrp-qm88-xjr3', 'https://github.com/xCss/Valine/issues/127', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289', 'https://github.com/xCss/Valine'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.