ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-36vc-cw62-fqvr
Hijacked Environment Variables in shadowsock
The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16078'}
2020-08-31T18:26:08Z
2018-08-27T19:07:23Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/517', 'https://nodesecurity.io/advisories/517', 'https://github.com/advisories/GHSA-36vc-cw62-fqvr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078'}
null
npm
GHSA-gvpx-9459-w3mj
Cross-Site Scripting in @ckeditor/ckeditor5-link
Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 10.0.1 or later.
{'CVE-2018-11093'}
2021-09-13T13:35:54Z
2018-05-23T20:37:46Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ckeditor/ckeditor5-link', 'https://github.com/advisories/GHSA-gvpx-9459-w3mj', 'https://snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LINK-72892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093', 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/', 'https://github.com/ckeditor/ckeditor5-link/blob/master/CHANGELOG.md#1001-2018-05-22', 'https://www.npmjs.com/advisories/1154'}
null
npm
GHSA-6cf8-qhqj-vjqm
Prototype pollution in total.js
There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
{'CVE-2020-28495'}
2021-02-03T07:46:44Z
2021-02-05T20:43:19Z
HIGH
null
{'CWE-400'}
{'https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28495', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6617', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671', 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff', 'https://www.npmjs.com/package/total.js'}
null
npm
GHSA-crf7-fvjx-863q
Path Traversal in zero
Versions of `zero` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation Upgrade to version 1.0.6 or later.
null
2020-08-31T18:44:37Z
2020-09-03T17:09:26Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1025'}
null
npm
GHSA-hjxc-462x-x77j
TOCTOU Race Condition in Yarn
The package integrity validation in yarn &lt; 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It&#39;s not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0.
{'CVE-2019-15608'}
2021-04-08T22:21:40Z
2022-02-09T22:49:38Z
MODERATE
null
{'CWE-367'}
{'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608', 'https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190', 'https://hackerone.com/reports/703138'}
null
npm
GHSA-2p69-gxpm-5469
Downloads Resources over HTTP in alto-saxophone
Affected versions of `alto-saxophone` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `alto-saxophone`. ## Recommendation Update to version 2.25.1 or later.
{'CVE-2016-10694'}
2021-01-08T20:06:55Z
2018-07-31T22:34:45Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10694', 'https://www.npmjs.com/advisories/172', 'https://github.com/advisories/GHSA-2p69-gxpm-5469', 'https://nodesecurity.io/advisories/172'}
null
npm
GHSA-5x7p-gm79-383m
Malicious Package in regenraotr
All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:28:51Z
2020-09-01T21:11:57Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/684'}
null
npm
GHSA-2cf5-4w76-r9qv
Arbitrary Code Execution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.5.2 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). The following template can be used to demonstrate the vulnerability: ```{{#with "constructor"}} {{#with split as |a|}} {{pop (push "alert('Vulnerable Handlebars JS');")}} {{#with (concat (lookup join (slice 0 1)))}} {{#each (slice 2 3)}} {{#with (apply 0 a)}} {{.}} {{/with}} {{/each}} {{/with}} {{/with}} {{/with}}``` ## Recommendation Upgrade to version 3.0.8, 4.5.2 or later.
null
2020-08-31T18:54:52Z
2020-09-04T14:57:38Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1316'}
null
npm
GHSA-649c-x44h-4q7v
Low severity vulnerability that affects public
A XSS vulnerability was found in module public <0.1.4 that allows malicious Javascript code to run in the browser, due to the absence of sanitization of the file/folder names before rendering.
{'CVE-2018-16480'}
2020-06-16T21:17:59Z
2019-02-07T18:14:37Z
LOW
null
{'CWE-79'}
{'https://www.npmjs.com/package/public', 'https://hackerone.com/reports/329950', 'https://github.com/advisories/GHSA-649c-x44h-4q7v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16480'}
null
npm
GHSA-gpvj-q7fp-jcch
Moderate severity vulnerability that affects simplehttpserver
Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server.
{'CVE-2018-3787'}
2020-06-16T21:37:52Z
2018-09-06T03:22:59Z
MODERATE
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-gpvj-q7fp-jcch', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3787', 'https://hackerone.com/reports/357109'}
null
npm
GHSA-wcm2-9c89-wmfm
Cross-site Scripting in jquery-ui
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
{'CVE-2010-5312'}
2022-01-20T15:38:28Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://www.securitytracker.com/id/1037035', 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-wcm2-9c89-wmfm', 'http://seclists.org/oss-sec/2014/q4/613', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://www.drupal.org/sa-core-2022-002', 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696', 'https://github.com/jquery/jquery-ui', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www.securityfocus.com/bid/71106', 'http://bugs.jqueryui.com/ticket/6016', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'http://www.debian.org/security/2015/dsa-3249', 'http://seclists.org/oss-sec/2014/q4/616'}
null
npm
GHSA-jvf5-q4h5-2jmj
Prototype Pollution in madlib-object-utils
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
{'CVE-2020-7701'}
2021-05-05T21:41:45Z
2021-05-06T17:28:57Z
CRITICAL
null
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7701', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676', 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'}
null
npm
GHSA-5v72-xg48-5rpm
Denial of Service in ws
Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent. ## Proof of concept ``` const WebSocket = require('ws'); const net = require('net'); const wss = new WebSocket.Server({ port: 3000 }, function () { const payload = 'constructor'; // or ',;constructor' const request = [ 'GET / HTTP/1.1', 'Connection: Upgrade', 'Sec-WebSocket-Key: test', 'Sec-WebSocket-Version: 8', `Sec-WebSocket-Extensions: ${payload}`, 'Upgrade: websocket', '\r\n' ].join('\r\n'); const socket = net.connect(3000, function () { socket.resume(); socket.write(request); }); }); ``` ## Recommendation Update to version 3.3.1 or later.
null
2021-08-04T21:29:05Z
2019-06-04T19:37:52Z
HIGH
null
{'CWE-400'}
{'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a', 'https://www.npmjs.com/advisories/550/versions', 'https://nodesecurity.io/advisories/550', 'https://snyk.io/vuln/npm:ws:20171108', 'https://www.npmjs.com/advisories/550'}
null
npm
GHSA-fwcw-5qw2-87mp
Cross-Site Scripting in fuelux
Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution. ## Recommendation Update to version 3.15.7 or later.
{'CVE-2016-1000235'}
2021-09-23T21:34:23Z
2020-09-01T15:55:56Z
HIGH
null
{'CWE-79'}
{'https://github.com/ExactTarget/fuelux', 'https://github.com/ExactTarget/fuelux/issues/1841', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000235', 'https://www.npmjs.com/advisories/133', 'https://github.com/ExactTarget/fuelux/pull/1856'}
null
npm
GHSA-2p62-c4rm-mr72
Malicious Package in another-date-picker
Version 2.0.43 of `another-date-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 2.0.43 of this module is found installed you will want to replace it with a version before or after 2.0.43. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:50:56Z
2020-09-01T19:44:57Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/616', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATEPICKER-451013', 'https://github.com/kekeh/mydatepicker', 'https://github.com/bi-a/mydatepicker'}
null
npm
GHSA-36c4-4r89-6whg
Prototype Pollution in @commercial/subtext
Versions of `@commercial/subtext` prior to 5.1.2 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. ## Recommendation Upgrade to version 5.1.2 or later.
null
2021-10-04T21:05:01Z
2020-09-03T15:49:02Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1484'}
null
npm
GHSA-7mpx-vg3c-cmr4
Improper Authentication in react-adal
This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.
{'CVE-2020-7787'}
2021-04-09T19:38:58Z
2021-04-13T15:22:37Z
HIGH
null
{'CWE-287'}
{'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787', 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9', 'https://github.com/salvoravida/react-adal/pull/115'}
null
npm
GHSA-6qqj-rx4w-r3cj
CSRF Vulnerability in jquery-ujs
Versions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains. When an attacker controls the href attribute of an anchor tag, or the action attribute of a form tag triggering a POST action, the attacker can set the href or action to " https://attacker.com". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain. ## Recommendation Upgrade jquery-ujs to version 1.0.4 or later.
null
2021-09-23T19:45:13Z
2020-08-31T22:48:44Z
MODERATE
null
{'CWE-352'}
{'https://hackerone.com/reports/49935', 'https://www.npmjs.com/advisories/15', 'https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'https://snyk.io/vuln/npm:jquery-ujs:20150624'}
null
npm
GHSA-qgfr-5hqp-vrw9
Path Traversal in decompress
Versions of `decompress` prior to 4.2.1 are vulnerable to Arbitrary File Write. The package fails to prevent extraction of files with relative paths, allowing attackers to write to any folder in the system by including filenames containing`../`. ## Recommendation Upgrade to version 4.2.1 or later.
{'CVE-2020-12265'}
2021-07-29T16:07:52Z
2020-09-03T21:16:27Z
CRITICAL
null
{'CWE-59', 'CWE-22'}
{'https://github.com/kevva/decompress/issues/71', 'https://github.com/kevva/decompress/pull/73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12265', 'https://www.npmjs.com/advisories/1217'}
null
npm
GHSA-5q5w-mf87-57x4
Downloads Resources over HTTP in sfml
Affected versions of `sfml` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10654'}
2021-01-08T19:48:39Z
2019-02-18T23:45:18Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10654', 'https://www.npmjs.com/advisories/256', 'https://nodesecurity.io/advisories/256', 'https://github.com/advisories/GHSA-5q5w-mf87-57x4'}
null
npm
GHSA-g336-c7wv-8hp3
Cross-Site Scripting in swagger-ui
Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter. ## Recommendation Update to 2.2.1 or later.
null
2021-09-23T21:35:43Z
2020-09-01T15:58:06Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/swagger-api/swagger-ui/issues/1617', 'https://www.npmjs.com/advisories/137', 'https://github.com/swagger-api/swagger-ui'}
null
npm
GHSA-w3cg-6577-wx9f
Directory Traversal in cuciuci
Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16122'}
2020-08-31T18:21:07Z
2020-09-01T17:20:41Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/381', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci', 'https://www.npmjs.com/advisories/381'}
null
npm
GHSA-5x8q-gj67-rhf2
Malicious Package in discord_debug_log
All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T21:23:24Z
2020-09-02T21:18:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/873'}
null
npm
GHSA-qx9m-27wh-7fjg
Downloads Resources over HTTP in jvminstall
Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10631'}
2021-01-08T01:58:11Z
2019-02-18T23:57:03Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/225', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10631', 'https://nodesecurity.io/advisories/225', 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg'}
null
npm
GHSA-pjxw-22xf-6pwc
Prototype Pollution in defaults-deep
All versions of `defaults-deep` are vulnerable to prototype pollution. Provided certain input `defaults-deep` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation As no patch is currently available for this vulnerability it is our recommendation to select another module that can provide this functionality.
{'CVE-2018-16486'}
2021-09-16T20:59:38Z
2019-02-07T18:16:38Z
MODERATE
null
{'CWE-345', 'CWE-400'}
{'https://github.com/advisories/GHSA-pjxw-22xf-6pwc', 'https://github.com/jonschlinkert/defaults-deep', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16486', 'https://hackerone.com/reports/380878', 'https://www.npmjs.com/advisories/778'}
null
npm
GHSA-mxr5-p36v-479m
Moderate severity vulnerability that affects jquery-file-upload
Arbitrary file upload in jQuery Upload File <= 4.0.2
{'CVE-2018-9207'}
2021-09-15T21:05:48Z
2018-12-19T19:24:03Z
CRITICAL
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-9207', 'https://github.com/advisories/GHSA-mxr5-p36v-479m', 'http://www.vapidlabs.com/advisory.php?v=206'}
null
npm
GHSA-2r8f-2665-3gxq
Malicious Package in froever
All versions of `froever` contain malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:54:32Z
2020-09-02T21:36:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/904'}
null
npm
GHSA-fhv8-fx5f-7fxf
Prototype Pollution in the merge and clone helper methods
### Impact Using `merge` and `clone` helper methods in the `src/core/util.ts` module will have prototype pollution. It will affect the popular data visualization library Apache ECharts, which is using and exported these two methods directly. ### Patches It has been patched in https://github.com/ecomfe/zrender/pull/826. Users should update zrender to `5.2.1`. and update echarts to `5.2.1` if project is using echarts. ### References NA ### For more information NA
{'CVE-2021-39227'}
2021-09-17T17:51:46Z
2021-09-20T19:53:15Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39227', 'https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf', 'https://github.com/ecomfe/zrender/pull/826', 'https://github.com/ecomfe/zrender', 'https://github.com/ecomfe/zrender/releases/tag/5.2.1'}
null
npm
GHSA-6pw2-5hjv-9pf7
Sandbox bypass in vm2
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
{'CVE-2021-23555'}
2022-02-24T13:46:56Z
2022-02-12T00:00:38Z
CRITICAL
null
{'CWE-1265', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-VM2-2309905', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23555', 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d', 'https://github.com/patriksimek/vm2'}
null
npm
GHSA-8w3j-g983-8jh5
Sensitive Data Exposure in parse-server
Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking. `ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses. ### For more information If you have any questions or comments about this advisory, Open an issue in the [parse-server](https://github.com/parse-community/parse-server) [Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md)
{'CVE-2019-1020013'}
2021-06-11T15:37:15Z
2019-07-11T14:23:09Z
MODERATE
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013', 'https://www.npmjs.com/advisories/1114', 'https://github.com/advisories/GHSA-8w3j-g983-8jh5', 'https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002)#Description_of_the_Issue', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637', 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-8w3j-g983-8jh5'}
null
npm
GHSA-9mrv-456v-pf22
Cross-site Scripting in vis-timeline
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
{'CVE-2020-28487'}
2021-03-22T23:06:41Z
2021-04-13T15:19:50Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28487', 'https://github.com/visjs/vis-timeline/pull/840', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501', 'https://github.com/visjs/vis-timeline/issues/838', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502', 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500', 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}
null
npm
GHSA-g95f-p29q-9xw4
Regular Expression Denial of Service in braces
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 2.3.1 or higher.
null
2021-08-04T21:35:07Z
2019-06-06T15:30:30Z
LOW
null
{'CWE-400', 'CWE-185'}
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://snyk.io/vuln/npm:braces:20180219', 'https://www.npmjs.com/advisories/786'}
null
npm
GHSA-4fqg-89cc-5pv5
Malicious Package in sj-labc
All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T17:21:38Z
2020-09-04T14:58:44Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1315'}
null
npm
GHSA-w9q5-mvc6-5cw3
Malicious Package in bufder-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:56:43Z
2020-09-03T21:45:13Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1235'}
null
npm
GHSA-mm4f-47ch-f7hx
Arbitrary code execution in kill-by-port
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23363'}
2021-03-31T20:18:57Z
2021-04-13T15:32:43Z
MODERATE
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531', 'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4', 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363'}
null
npm
GHSA-4p7j-5ppx-rfhm
Downloads Resources over HTTP in apk-parser3
Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`. ## Recommendation Update to version 0.1.3 or greater.
{'CVE-2016-10574'}
2021-01-07T23:32:43Z
2020-09-01T16:06:49Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/245', 'https://www.npmjs.com/advisories/245', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574'}
null
npm
GHSA-6h7f-qwqm-35pp
Arbitrary File Read in phantom-html-to-pdf
This affects the package phantom-html-to-pdf before 0.6.1.
{'CVE-2020-7763'}
2021-07-29T20:38:31Z
2020-11-06T18:06:16Z
HIGH
null
{'CWE-22', 'CWE-200'}
{'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259', 'https://www.npmjs.com/package/phantom-html-to-pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7763', 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598'}
null
npm
GHSA-25v4-mcx4-hh35
Cross-Site Scripting in atlasboard-atlassian-package
All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:59:41Z
2020-09-04T17:28:28Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/456702', 'https://www.npmjs.com/advisories/1449'}
null
npm
GHSA-6qgx-f452-7699
Malicious Package in superhappyfuntime
All versions of `superhappyfuntime` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T17:07:59Z
2020-09-03T23:28:39Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1314'}
null
npm
GHSA-wqg7-vrj7-v82h
High severity vulnerability that affects mosca
This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system.
{'CVE-2018-11615'}
2020-06-16T22:01:00Z
2018-08-31T06:22:50Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-wqg7-vrj7-v82h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615', 'https://zerodayinitiative.com/advisories/ZDI-18-583'}
null
npm
GHSA-hrgx-7j6v-xj82
Reflected cross-site scripting (XSS) vulnerability
This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package. #### Impact The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page. This is a targeted attack and may present itself in the form of phishing and or chained in conjunction with some other vulnerability. ## Vulnerability mitigation Please upgrade to `@keystone-6/auth >= 1.0.2`, where this vulnerability has been closed. If you are using `@keystone-next/auth`, we **strongly** recommend you upgrade to `@keystone-6`. ### Workarounds If for some reason you cannot upgrade the dependencies in software, you could alternatively - disable the administration user interface, or - if using a reverse-proxy, strip query parameters when accessing the administration interface ### References https://owasp.org/www-community/attacks/xss/ Thanks to Shivansh Khari (@Shivansh-Khari) for discovering and reporting this vulnerability
{'CVE-2022-0087'}
2022-01-19T17:42:16Z
2022-01-12T21:55:40Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0087', 'https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e', 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82', 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38', 'https://github.com/keystonejs/keystone'}
null
npm
GHSA-gmv4-r438-p67f
Leading white space bypasses protocol validation
### Impact Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail. ### Patches Patched in 1.19.9 ### Workarounds Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(value)`), e.g. by using ```js function remove_whitespace(url){ const whitespace = /^[\x00-\x20\u00a0\u1680\u2000-\u200a\u2028\u2029\u202f\u205f\u3000\ufeff]+/; url = url.replace(whitespace, '') return url } ``` ### References * https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [medialize/URI.js](https://github.com/medialize/URI.js/)
{'CVE-2022-24723'}
2022-03-11T20:04:26Z
2022-03-03T19:23:36Z
MODERATE
null
{'CWE-20'}
{'https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/', 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723', 'https://github.com/medialize/URI.js/releases/tag/v1.19.9', 'https://github.com/medialize/URI.js/', 'https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f'}
null
npm
GHSA-ph8p-2g97-9654
Downloads Resources over HTTP in jstestdriver
Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jstestdriver`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2011. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10643'}
2021-01-08T18:21:22Z
2018-08-15T19:27:25Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/244', 'https://github.com/advisories/GHSA-ph8p-2g97-9654', 'https://www.npmjs.com/advisories/244', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643'}
null
npm
GHSA-38f9-m297-6q9g
DoS via malicious record IDs in WatermelonDB
## Impact Medium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H A maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable. This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method. The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage. No way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized. It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app. ## Patches Patched versions include: - 0.15.1 - 0.16.2 - 0.16.1-fix - this is actually the same as 0.16.0, but with the patch applied - as 0.16.1 is causing issues for some users - `924c7ae2a8d` commit id contains the patch ## Workarounds 1. Ensure that your backend service sanitizes record IDs sent in the `pull sync` endpoint, such that only IDs matching `/^[a-zA-Z0-9_-.]+$/` are returned. This could also be done in JavaScript `pullChanges` function passed to `synchronize()` 2. If you use `destroyDeletedRecords` directly, validate all IDs passed the same way ## For more information If you have any questions about this advisory, contact @radex.
{'CVE-2020-4035'}
2021-01-08T20:15:00Z
2020-06-03T21:57:53Z
MODERATE
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4035', 'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025', 'https://github.com/Nozbe/WatermelonDB/security/advisories/GHSA-38f9-m297-6q9g'}
null
npm
GHSA-6xhf-x49c-m5m6
Github Token Leak in aegir
Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed. ## Recommendation Update to version 12.0.8 or later. If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked.
{'CVE-2017-16225'}
2020-08-31T18:27:14Z
2018-07-24T20:04:11Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16225', 'https://www.npmjs.com/advisories/546', 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6', 'https://nodesecurity.io/advisories/546'}
null
npm
GHSA-fvwr-h9xh-m6wc
Denial of Service in @commercial/subtext
Versions of `@commercial/subtext` prior to 5.1.1 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation Upgrade to version 5.1.1 or later.
null
2020-08-31T18:49:40Z
2020-09-03T20:33:17Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1166', 'https://github.com/hapijs/subtext/issues/72'}
null
npm
GHSA-gmxv-xf2q-6j8m
Cross-Site Scripting in m-server
Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving. ## Recommendation Update to version 1.4.2 or later.
{'CVE-2018-16484'}
2020-08-31T18:33:40Z
2019-02-07T18:16:16Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/319794', 'https://www.npmjs.com/advisories/729', 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}
null
npm
GHSA-r8f7-9pfq-mjmv
Improper Certificate Validation in node-sass
Certificate validation in node-sass 2.0.0 to 6.0.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
{'CVE-2020-24025'}
2022-02-09T22:23:03Z
2022-02-09T22:22:24Z
MODERATE
null
{'CWE-295'}
{'https://github.com/sass/node-sass/issues/3067', 'https://github.com/sass/node-sass/releases/tag/v7.0.0', 'https://github.com/sass/node-sass/pull/3149', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/sass/node-sass/pull/567#issuecomment-656609236'}
null
npm
GHSA-3627-w2qr-5fxr
Downloads Resources over HTTP in fuseki
Affected versions of `fuseki` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fuseki`. ## Recommendation Update to version 1.0.1 or later.
{'CVE-2016-10576'}
2021-01-08T20:04:27Z
2019-02-18T23:52:07Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/278', 'https://github.com/advisories/GHSA-3627-w2qr-5fxr', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10576', 'https://nodesecurity.io/advisories/278'}
null
npm
GHSA-w364-8vfv-gvf5
Downloads Resources over HTTP in phantomjs-cheniu
Affected versions of `phantomjs-cheniu` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `phantomjs-cheniu`. ## Recommendation No patch is currently available for this vulnerability. As this package is just a fork of Medium's [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs) package, the best mitigation is currently to install the `Medium` version of [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs). This can be done via the following command: ``` npm i phantomjs-prebuilt ```
{'CVE-2016-10661'}
2021-01-08T01:57:02Z
2019-02-18T23:44:52Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/262', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10661', 'https://github.com/advisories/GHSA-w364-8vfv-gvf5', 'https://nodesecurity.io/advisories/262'}
null
npm
GHSA-23vf-5g53-hm9q
Directory Traversal in list-n-stream
Affected versions of `list-n-stream` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 0.0.11 or later.
{'CVE-2017-16084'}
2020-08-31T18:20:03Z
2018-07-24T14:57:31Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-23vf-5g53-hm9q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16084', 'https://www.npmjs.com/advisories/344', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream', 'https://nodesecurity.io/advisories/344'}
null
npm
GHSA-pgjj-866w-fc5c
Risk of code injection
### Impact Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues ### Patches Temporarily removed the problematic route and added a `no-new-func` rule to eslint Self-built users should upgrade to 7f1c430 and later as soon as possible ### Credits Tencent Woodpecker Security Team ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues) * Email us at [i@diygod.me](mailto:i@diygod.me)
{'CVE-2021-21278'}
2021-10-11T16:14:26Z
2021-10-12T16:03:43Z
HIGH
null
{'CWE-74'}
{'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c', 'https://www.npmjs.com/package/rsshub', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278', 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d', 'https://github.com/DIYgod/RSSHub'}
null
npm
GHSA-2xv3-h762-ccxv
Out-of-bounds Read in concat-with-sourcemaps
Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator. ## Recommendation Update to version 1.0.6 or later.
null
2020-08-31T18:31:05Z
2019-05-29T19:18:02Z
MODERATE
null
{'CWE-125'}
{'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18', 'https://hackerone.com/reports/320166', 'https://www.npmjs.com/advisories/644'}
null
npm
GHSA-gjcw-v447-2w7q
Forgeable Public/Private Tokens in jws
Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2016-1000223'}
2021-09-23T21:25:33Z
2020-09-01T15:23:18Z
HIGH
null
null
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/brianloveswords/node-jws', 'https://www.npmjs.com/advisories/88', 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223', 'https://snyk.io/vuln/npm:jws:20160726'}
null
npm
GHSA-pv8x-p9hq-j328
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object. ## Recommendation Upgrade to version 3.17.0 or later.
{'CVE-2017-1001003'}
2020-08-31T18:27:26Z
2017-12-18T22:27:53Z
CRITICAL
null
{'CWE-88'}
{'https://github.com/advisories/GHSA-pv8x-p9hq-j328', 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/551', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}
null
npm
GHSA-2mxc-m4c3-wqhq
Malicious Package in ruffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:18:32Z
2020-09-03T22:50:46Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1273'}
null
npm
GHSA-j3qq-qvc8-c6g7
Malicious Package in foever
All versions of `foever` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:29:49Z
2020-09-01T21:15:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/688'}
null
npm
GHSA-536f-268f-6gxc
Malicious Package in buffermxor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:25:46Z
2020-09-03T22:17:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1256'}
null
npm
GHSA-vcfp-ppqw-mf23
Downloads Resources over HTTP in fis-sass-all
Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-sass-all`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10686'}
2021-09-16T20:52:55Z
2018-08-17T20:20:46Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://github.com/advisories/GHSA-vcfp-ppqw-mf23', 'https://github.com/fis-dev/fis-sass', 'https://www.npmjs.com/advisories/287', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10686', 'https://nodesecurity.io/advisories/287'}
null
npm
GHSA-qrmm-w75w-3wpx
Server side request forgery in SwaggerUI
SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered. However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances. An example scenario abusing this functionality could take the following form: - `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled. - Users will trust the domain `https://example.com` and the contents of the OpenAPI definition. - A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`. - Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the "Try-it-out" feature. We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism. ### Resolution We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites. ### Workaround If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code: ```js SwaggerUI({ // ...other configuration options, plugins: [function UrlParamDisablePlugin() { return { statePlugins: { spec: { wrapActions: { // Remove the ?url parameter from loading an external OpenAPI definition. updateUrl: (oriAction) => (payload) => { const url = new URL(window.location.href) if (url.searchParams.has('url')) { url.searchParams.delete('url') window.location.replace(url.toString()) } return oriAction(payload) } } } } } }], }) ``` ### Future UX work Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community. ## Reflected XSS attack **Warning** in versions <= 3.36.2, it is possible to combine the URL options (as mentioned above) with a vunerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than or equal to 3.36.2, we suggest you upgrade or implement the workaround as mentioned above.
null
2022-01-26T22:24:21Z
2021-12-09T19:08:38Z
MODERATE
null
{'CWE-918'}
{'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76', 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/issues/4872'}
null
npm
GHSA-35q2-47q7-3pc3
Potential exponential regex in monitor mode
### Impact When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. ### Patches The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`. ### References #1569 (GHSL-2021-026)
{'CVE-2021-29469'}
2021-04-23T18:11:39Z
2021-04-27T15:56:03Z
LOW
null
{'CWE-400'}
{'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3', 'https://security.netapp.com/advisory/ntap-20210611-0010/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469', 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1', 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}
null
npm
GHSA-85fq-56wq-gmcf
Hijacked Environment Variables in mariadb
The `mariadb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16046'}
2020-08-31T18:25:20Z
2018-07-18T18:28:17Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16046', 'https://www.npmjs.com/advisories/495', 'https://nodesecurity.io/advisories/495', 'https://github.com/advisories/GHSA-85fq-56wq-gmcf'}
null
npm
GHSA-ccrp-c664-8p4j
Cross-Site Scripting in markdown-to-jsx
Versions of `markdown-to-jsx` prior to 6.11.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload. ## Recommendation Upgrade to version 6.11.4 or later.
null
2021-09-29T19:59:57Z
2020-09-03T21:17:36Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1219', 'https://github.com/probablyup/markdown-to-jsx/pull/307', 'https://github.com/probablyup/markdown-to-jsx'}
null
npm
GHSA-3pwh-5mmc-mwrx
Denial of Service in nes
Affected versions of `nes` are vulnerable to denial of service when given an invalid `cookie` header, and websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to throw and exit. ## Recommendation Update to version 6.4.1 or later.
{'CVE-2017-16025'}
2020-08-31T18:19:35Z
2018-07-24T20:06:33Z
HIGH
null
{'CWE-400'}
{'https://github.com/hapijs/nes/issues/171', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16025', 'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655', 'https://nodesecurity.io/advisories/331', 'https://www.npmjs.com/advisories/331', 'https://github.com/advisories/GHSA-3pwh-5mmc-mwrx'}
null
npm
GHSA-3p94-vj97-fm4q
OS Command Injection in fsa
fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
{'CVE-2020-7615'}
2021-05-25T16:28:38Z
2021-12-09T19:56:44Z
MODERATE
null
{'CWE-78'}
{'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12', 'https://snyk.io/vuln/SNYK-JS-FSA-564118', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615'}
null
npm
GHSA-3wcq-x3mq-6r9p
Potential memory exposure in dns-packet
This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
{'CVE-2021-23386'}
2021-05-26T20:11:00Z
2021-05-24T19:51:04Z
HIGH
null
{'CWE-908', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23386', 'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56', 'https://hackerone.com/bugs?subject=user&amp%3Breport_id=968858', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719', 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d', 'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563'}
null
npm
GHSA-8xqr-4cpm-wx7g
Cross-Site Scripting in react-svg
Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default. ## Recommendation Update to version 2.2.18 or later.
null
2020-08-31T18:31:14Z
2019-05-31T23:47:27Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/648', 'https://github.com/tanem/react-svg/pull/57', 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb', 'https://nodesecurity.io/advisories/648'}
null
npm
GHSA-6qqf-vvcr-7qrv
Cryptographically Weak PRNG in generate-password
Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords. ## Recommendation Update to version 1.4.1 or later.
null
2020-08-31T18:34:48Z
2019-05-23T09:27:22Z
MODERATE
null
{'CWE-338'}
{'https://www.npmjs.com/advisories/762', 'https://github.com/brendanashworth/generate-password/pull/26'}
null
npm
GHSA-5jgp-pg4f-q8vj
Malicious Package in node-ftp
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:21Z
2020-09-03T19:55:42Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1137'}
null
npm
GHSA-g9r4-xpmj-mj65
Prototype Pollution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to prototype pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions. ## Recommendation Upgrade to version 3.0.8, 4.5.3 or later.
null
2020-08-31T18:55:14Z
2020-09-04T15:06:32Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1325'}
null
npm
GHSA-f38p-c2gq-4pmr
Regular Expression Denial-of-Service in npm schema-inspector
### Impact _What kind of vulnerability is it? Who is impacted?_ Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a "not yet validated" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways. ### References _Are there any links users can visit to find out more?_ https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f ### For more information If you have any questions or comments about this advisory, you can create an issue in this repository.
{'CVE-2021-21267'}
2021-03-19T20:14:08Z
2021-03-19T20:14:21Z
LOW
null
{'CWE-400', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21267', 'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f', 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr', 'https://www.npmjs.com/package/schema-inspector', 'https://security.netapp.com/advisory/ntap-20210528-0006/', 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0'}
null
npm
GHSA-8mfc-v7wv-p62g
Path Traversal in Yarn
Arbitrary filesystem write vulnerability in Yarn 1.21.1 and earlier allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
{'CVE-2020-8131'}
2021-04-08T20:35:01Z
2022-02-09T22:43:37Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8131', 'https://github.com/yarnpkg/yarn/pull/7831', 'https://hackerone.com/reports/730239'}
null
npm
GHSA-53xj-v576-3ch2
OS Command Injection in giting
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument &quot;repo&quot; of function &quot;pull()&quot; is executed by the package without any validation.
{'CVE-2019-10802'}
2021-04-09T21:50:02Z
2021-04-13T15:22:09Z
HIGH
null
{'CWE-78'}
{'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0', 'https://snyk.io/vuln/SNYK-JS-GITING-559008', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'}
null
npm
GHSA-vf5m-q45w-8mh9
Malicious Package in js-qha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:01:14Z
2020-09-03T23:00:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1282'}
null
npm
GHSA-78h7-fgq9-625x
Directory Traversal in quickserver
Affected versions of `quickserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16196'}
2020-08-31T18:22:57Z
2018-07-23T20:40:14Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-78h7-fgq9-625x', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16196', 'https://nodesecurity.io/advisories/433', 'https://www.npmjs.com/advisories/433'}
null
npm
GHSA-7h26-63m7-qhf2
HTML comments vulnerability allowing to execute JavaScript code
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.17.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability.
{'CVE-2021-41165'}
2022-02-08T20:39:10Z
2021-11-17T21:58:25Z
HIGH
null
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41165', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-rmxg-73gg-4p98
Cross-Site Scripting (XSS) in jquery
Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2015-9251'}
2021-09-17T18:58:18Z
2018-01-22T13:32:06Z
MODERATE
null
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20210108-0004/', 'http://www.securityfocus.com/bid/105658', 'https://www.tenable.com/security/tns-2019-08', 'https://access.redhat.com/errata/RHSA-2020:0481', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://snyk.io/vuln/npm:jquery:20150627', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://github.com/jquery/jquery/issues/2432', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://github.com/advisories/GHSA-rmxg-73gg-4p98', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery/pull/2588', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9251', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://www.npmjs.com/advisories/328', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04', 'https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf', 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'}
null
npm
GHSA-wxhq-pm8v-cw75
Regular Expression Denial of Service in clean-css
Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 4.1.11 or higher.
null
2020-08-31T18:35:40Z
2019-06-05T20:50:16Z
LOW
null
null
{'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3', 'https://www.npmjs.com/advisories/785'}
null
npm
GHSA-5vp3-v4hc-gx76
UUPSUpgradeable vulnerability in @openzeppelin/contracts
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301). ### References [Post-mortem](https://forum.openzeppelin.com/t/uupsupgradeable-vulnerability-post-mortem/15680). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
{'CVE-2021-41264'}
2021-11-16T21:44:47Z
2021-09-15T20:23:17Z
CRITICAL
null
{'CWE-665'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76', 'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'}
null
npm
GHSA-v39h-qm32-8gwq
Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
{'CVE-2020-7616'}
2021-07-29T15:53:05Z
2021-12-09T19:57:29Z
MODERATE
null
{'CWE-915'}
{'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39', 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616'}
null
npm
GHSA-cf66-xwfp-gvc4
Missing Origin Validation in webpack-dev-server
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation For `webpack-dev-server` update to version 3.1.11 or later.
{'CVE-2018-14732'}
2022-04-06T20:39:38Z
2019-01-04T17:40:59Z
HIGH
null
{'CWE-20'}
{'https://github.com/webpack/webpack-dev-server', 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732', 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10', 'https://github.com/webpack/webpack-dev-server/issues/1445', 'https://www.npmjs.com/advisories/725', 'https://github.com/webpack/webpack-dev-server/issues/1620'}
null
npm
GHSA-9fgx-q25h-jxrg
DOM XSS in Theme Preview
### Impact An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below. ### Patches Fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. As the endpoint is unused, the patch simply removes it. ### Workarounds - Log out of Ghost Admin - Suspend any users who cannot log out - Block access to `/ghost/preview` Example of how to block access in nginx: ``` location ~ /ghost/preview { rewrite ^(\/(.*\/)?ghost\/)(.*)$ $1 redirect; } ``` This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied.
{'CVE-2021-29484'}
2021-09-07T17:42:40Z
2021-04-29T21:53:18Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29484', 'https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290', 'https://security.netapp.com/advisory/ntap-20210618-0006/', 'https://blog.sonarsource.com/ghost-admin-takeover', 'https://www.npmjs.com/package/ghost', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg', 'https://github.com/TryGhost/Ghost'}
null
npm
GHSA-mwcv-m549-5cm8
Hijacked Environment Variables in node-tkinter
The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16062'}
2021-06-10T22:18:51Z
2018-11-01T14:47:43Z
HIGH
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16062', 'https://github.com/advisories/GHSA-mwcv-m549-5cm8', 'https://www.npmjs.com/advisories/501', 'https://nodesecurity.io/advisories/501'}
null
npm
GHSA-3rh3-wfr4-76mj
Regular expression Denial of Service in multiple packages
### Impact A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0. ### Patches The problem has been recognized and patched. The fix will be available in version 27.0.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities.
{'CVE-2021-21391'}
2021-04-30T17:30:42Z
2021-04-06T17:28:41Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391', 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine', 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office'}
null
npm
GHSA-hgmg-hhc8-g5wr
Regular expression Denial of Service in Markdown plugin
### Impact A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0. ### Patches The problem has been recognized and patched. The fix will be available in version 25.0.0. ### Workarounds The user can work around the issue by: - Upgrading CKEditor 5 to version 25.0.0. - Disabling the Markdown plugin. ### More information If you have any questions or comments about this advisory: * Email us at [security@cksource.com](mailto:security@cksource.com) ### Acknowledgements The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and Alvaro Muñoz from GitHub for reporting it.
{'CVE-2021-21254'}
2021-02-02T15:22:37Z
2021-01-29T21:51:22Z
LOW
null
{'CWE-400'}
{'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm', 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr', 'https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21254'}
null
npm
GHSA-7px7-7xjx-hxm8
Moderate severity vulnerability that affects marked
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
{'CVE-2017-1000427'}
2021-09-03T21:03:01Z
2018-01-04T21:04:19Z
MODERATE
null
{'CWE-79'}
{'https://github.com/markedjs/marked', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000427', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'https://github.com/advisories/GHSA-7px7-7xjx-hxm8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://snyk.io/vuln/npm:marked:20170112'}
null
npm
GHSA-x4w5-r546-x9qh
Arbitrary File Read in html-pdf
All versions of `html-pdf` are vulnerable to Arbitrary File Read. The package fails to sanitize the HTML input, allowing attackers to exfiltrate server files by supplying malicious HTML code. XHR requests in the HTML code are executed by the server. Input with an XHR request such as `request.open("GET","file:///etc/passwd")` will result in a PDF document with the contents of `/etc/passwd`. ## Recommendation No fix is currently available. There is a mitigation available in the provided reference.
{'CVE-2019-15138'}
2022-01-04T19:51:51Z
2019-10-11T18:40:38Z
HIGH
null
{'CWE-79', 'CWE-668', 'CWE-73', 'CWE-200'}
{'https://security.netapp.com/advisory/ntap-20191017-0005/', 'https://github.com/marcbachmann/node-html-pdf/issues/530#issuecomment-535045123', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15138', 'https://www.npmjs.com/advisories/1095', 'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362', 'https://github.com/marcbachmann/node-html-pdf/issues/530', 'https://github.com/marcbachmann/node-html-pdf/', 'https://github.com/marcbachmann/node-html-pdf/releases/tag/v3.0.1'}
null
npm
GHSA-65xx-c85x-wg76
Command Injection in plotter
All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory: ``` var plot = require('plotter').plot; const title = 'Example "\nset title system("touch testing")#'; plot({ data: [ 3, 1, 2, 3, 4 ], filename: 'output.pdf', style: 'linespoints', title: title, logscale: true, xlabel: 'time', ylabel: 'length of string', format: 'pdf' }); ``` ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:59:26Z
2020-09-04T17:20:52Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1441'}
null
npm
GHSA-9q64-mpxx-87fg
Open Redirect in ecstatic
Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains. ## Recommendation If using `ecstatic` 4.x, upgrade to 4.1.2 or later. If using `ecstatic` 3.x, upgrade to 3.3.2 or later. If using `ecstatic` 2.x, upgrade to 2.2.2 or later.
null
2020-12-15T16:51:18Z
2020-04-01T16:35:08Z
HIGH
null
{'CWE-601'}
{'https://www.npmjs.com/advisories/830', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10775'}
null
npm
GHSA-333x-qr3v-g4xx
Command injection in spritesheet-js
This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.
{'CVE-2020-7782'}
2021-04-05T19:04:46Z
2021-04-13T15:30:16Z
CRITICAL
null
{'CWE-74'}
{'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7782', 'https://www.npmjs.com/package/spritesheet-js', 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32'}
null
npm
GHSA-2f6g-w5gj-c93h
Prototype Pollution in iniparserjs
This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
{'CVE-2021-23328'}
2021-03-22T23:02:01Z
2021-04-13T15:20:09Z
MODERATE
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23328', 'https://www.npmjs.com/package/iniparserjs', 'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989'}
null
npm
GHSA-2ghc-6v89-pw9j
Prototype Pollution in body-parser-xml
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3666'}
2021-09-14T18:39:31Z
2021-09-14T20:25:35Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://github.com/fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
null
npm
GHSA-4rvg-955w-h68q
Path Traversal in angular-http-server
Affected versions of `angular-http-server` are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `angular-http-server`. ## Recommendation Update to version 1.6.0 or later. :exclamation: Note: This was originally thought to be fixed in version 1.4.3, though according to [this issue](https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/issues/117#issuecomment-803872454) the vulnerability was not completely fixed until version 1.6.0.
{'CVE-2018-3713'}
2021-03-23T21:44:03Z
2018-07-26T14:47:40Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-4rvg-955w-h68q', 'https://hackerone.com/reports/309120', 'https://www.npmjs.com/advisories/589', 'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8', 'https://github.com/simonh1000/angular-http-server/pull/21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3713'}
null
npm
GHSA-28f4-mjfq-qrvf
Malicious Package in buffes-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:03Z
2020-09-03T22:18:40Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1257'}
null
npm
GHSA-6rjc-4pwr-3vp7
Cross-Site Scripting in iobroker.web
Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 2.4.10 or later.
{'CVE-2019-10771'}
2021-08-19T15:34:42Z
2019-12-02T18:14:30Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771', 'https://www.npmjs.com/advisories/1345'}
null
npm
GHSA-vh7m-p724-62c2
Signature Malleabillity in elliptic
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
{'CVE-2020-13822'}
2021-09-23T17:39:58Z
2020-07-29T20:40:35Z
HIGH
null
{'CWE-190'}
{'https://www.npmjs.com/package/elliptic', 'https://github.com/indutny/elliptic', 'https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/', 'https://github.com/indutny/elliptic/issues/226', 'https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822'}
null
npm
GHSA-m5pf-5894-jmx7
Malicious Package in sailclothjs
Version 1.2.6 of `sailclothjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:11Z
2020-09-03T19:08:00Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1099'}
null
npm
GHSA-325j-24f4-qv5x
Regular Expression Denial of Service in ssri
Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode. ## Recommendation Update to version 5.2.2 or later.
{'CVE-2018-7651'}
2021-08-31T20:21:06Z
2018-03-07T22:22:20Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7651', 'https://github.com/advisories/GHSA-325j-24f4-qv5x', 'https://github.com/zkat/ssri/issues/10', 'https://github.com/zkat/ssri', 'https://nodesecurity.io/advisories/565', 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d', 'https://www.npmjs.com/advisories/565'}
null
npm
GHSA-7frr-c83r-fm22
Malicious Package in buffez-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:37Z
2020-09-03T22:20:49Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1259'}
null
npm
GHSA-g8wf-rcg3-qw4q
Directory Traversal in tinyserver2
Affected versions of `tinyserver2` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to v0.6.0 or later.
{'CVE-2017-16085'}
2020-08-31T18:20:43Z
2018-07-24T15:01:34Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/371', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16085', 'https://github.com/advisories/GHSA-g8wf-rcg3-qw4q', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2', 'https://nodesecurity.io/advisories/371'}
null