ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-36vc-cw62-fqvr
|
Hijacked Environment Variables in shadowsock
|
The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16078'}
|
2020-08-31T18:26:08Z
|
2018-08-27T19:07:23Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/517', 'https://nodesecurity.io/advisories/517', 'https://github.com/advisories/GHSA-36vc-cw62-fqvr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078'}
| null |
npm
|
GHSA-gvpx-9459-w3mj
|
Cross-Site Scripting in @ckeditor/ckeditor5-link
|
Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 10.0.1 or later.
|
{'CVE-2018-11093'}
|
2021-09-13T13:35:54Z
|
2018-05-23T20:37:46Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/ckeditor/ckeditor5-link', 'https://github.com/advisories/GHSA-gvpx-9459-w3mj', 'https://snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LINK-72892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093', 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/', 'https://github.com/ckeditor/ckeditor5-link/blob/master/CHANGELOG.md#1001-2018-05-22', 'https://www.npmjs.com/advisories/1154'}
| null |
npm
|
GHSA-6cf8-qhqj-vjqm
|
Prototype pollution in total.js
|
There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
|
{'CVE-2020-28495'}
|
2021-02-03T07:46:44Z
|
2021-02-05T20:43:19Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28495', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6617', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671', 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff', 'https://www.npmjs.com/package/total.js'}
| null |
npm
|
GHSA-crf7-fvjx-863q
|
Path Traversal in zero
|
Versions of `zero` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
Upgrade to version 1.0.6 or later.
| null |
2020-08-31T18:44:37Z
|
2020-09-03T17:09:26Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1025'}
| null |
npm
|
GHSA-hjxc-462x-x77j
|
TOCTOU Race Condition in Yarn
|
The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0.
|
{'CVE-2019-15608'}
|
2021-04-08T22:21:40Z
|
2022-02-09T22:49:38Z
|
MODERATE
| null |
{'CWE-367'}
|
{'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608', 'https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190', 'https://hackerone.com/reports/703138'}
| null |
npm
|
GHSA-2p69-gxpm-5469
|
Downloads Resources over HTTP in alto-saxophone
|
Affected versions of `alto-saxophone` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `alto-saxophone`.
## Recommendation
Update to version 2.25.1 or later.
|
{'CVE-2016-10694'}
|
2021-01-08T20:06:55Z
|
2018-07-31T22:34:45Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10694', 'https://www.npmjs.com/advisories/172', 'https://github.com/advisories/GHSA-2p69-gxpm-5469', 'https://nodesecurity.io/advisories/172'}
| null |
npm
|
GHSA-5x7p-gm79-383m
|
Malicious Package in regenraotr
|
All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:28:51Z
|
2020-09-01T21:11:57Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/684'}
| null |
npm
|
GHSA-2cf5-4w76-r9qv
|
Arbitrary Code Execution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.5.2 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
The following template can be used to demonstrate the vulnerability:
```{{#with "constructor"}}
{{#with split as |a|}}
{{pop (push "alert('Vulnerable Handlebars JS');")}}
{{#with (concat (lookup join (slice 0 1)))}}
{{#each (slice 2 3)}}
{{#with (apply 0 a)}}
{{.}}
{{/with}}
{{/each}}
{{/with}}
{{/with}}
{{/with}}```
## Recommendation
Upgrade to version 3.0.8, 4.5.2 or later.
| null |
2020-08-31T18:54:52Z
|
2020-09-04T14:57:38Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1316'}
| null |
npm
|
GHSA-649c-x44h-4q7v
|
Low severity vulnerability that affects public
|
A XSS vulnerability was found in module public <0.1.4 that allows malicious Javascript code to run in the browser, due to the absence of sanitization of the file/folder names before rendering.
|
{'CVE-2018-16480'}
|
2020-06-16T21:17:59Z
|
2019-02-07T18:14:37Z
|
LOW
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/package/public', 'https://hackerone.com/reports/329950', 'https://github.com/advisories/GHSA-649c-x44h-4q7v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16480'}
| null |
npm
|
GHSA-gpvj-q7fp-jcch
|
Moderate severity vulnerability that affects simplehttpserver
|
Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server.
|
{'CVE-2018-3787'}
|
2020-06-16T21:37:52Z
|
2018-09-06T03:22:59Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-gpvj-q7fp-jcch', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3787', 'https://hackerone.com/reports/357109'}
| null |
npm
|
GHSA-wcm2-9c89-wmfm
|
Cross-site Scripting in jquery-ui
|
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
|
{'CVE-2010-5312'}
|
2022-01-20T15:38:28Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securitytracker.com/id/1037035', 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-wcm2-9c89-wmfm', 'http://seclists.org/oss-sec/2014/q4/613', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://www.drupal.org/sa-core-2022-002', 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696', 'https://github.com/jquery/jquery-ui', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www.securityfocus.com/bid/71106', 'http://bugs.jqueryui.com/ticket/6016', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'http://www.debian.org/security/2015/dsa-3249', 'http://seclists.org/oss-sec/2014/q4/616'}
| null |
npm
|
GHSA-jvf5-q4h5-2jmj
|
Prototype Pollution in madlib-object-utils
|
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
|
{'CVE-2020-7701'}
|
2021-05-05T21:41:45Z
|
2021-05-06T17:28:57Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7701', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676', 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'}
| null |
npm
|
GHSA-5v72-xg48-5rpm
|
Denial of Service in ws
|
Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent.
## Proof of concept
```
const WebSocket = require('ws');
const net = require('net');
const wss = new WebSocket.Server({ port: 3000 }, function () {
const payload = 'constructor'; // or ',;constructor'
const request = [
'GET / HTTP/1.1',
'Connection: Upgrade',
'Sec-WebSocket-Key: test',
'Sec-WebSocket-Version: 8',
`Sec-WebSocket-Extensions: ${payload}`,
'Upgrade: websocket',
'\r\n'
].join('\r\n');
const socket = net.connect(3000, function () {
socket.resume();
socket.write(request);
});
});
```
## Recommendation
Update to version 3.3.1 or later.
| null |
2021-08-04T21:29:05Z
|
2019-06-04T19:37:52Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a', 'https://www.npmjs.com/advisories/550/versions', 'https://nodesecurity.io/advisories/550', 'https://snyk.io/vuln/npm:ws:20171108', 'https://www.npmjs.com/advisories/550'}
| null |
npm
|
GHSA-fwcw-5qw2-87mp
|
Cross-Site Scripting in fuelux
|
Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution.
## Recommendation
Update to version 3.15.7 or later.
|
{'CVE-2016-1000235'}
|
2021-09-23T21:34:23Z
|
2020-09-01T15:55:56Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/ExactTarget/fuelux', 'https://github.com/ExactTarget/fuelux/issues/1841', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000235', 'https://www.npmjs.com/advisories/133', 'https://github.com/ExactTarget/fuelux/pull/1856'}
| null |
npm
|
GHSA-2p62-c4rm-mr72
|
Malicious Package in another-date-picker
|
Version 2.0.43 of `another-date-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 2.0.43 of this module is found installed you will want to replace it with a version before or after 2.0.43. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:50:56Z
|
2020-09-01T19:44:57Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/616', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATEPICKER-451013', 'https://github.com/kekeh/mydatepicker', 'https://github.com/bi-a/mydatepicker'}
| null |
npm
|
GHSA-36c4-4r89-6whg
|
Prototype Pollution in @commercial/subtext
|
Versions of `@commercial/subtext` prior to 5.1.2 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
## Recommendation
Upgrade to version 5.1.2 or later.
| null |
2021-10-04T21:05:01Z
|
2020-09-03T15:49:02Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1484'}
| null |
npm
|
GHSA-7mpx-vg3c-cmr4
|
Improper Authentication in react-adal
|
This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.
|
{'CVE-2020-7787'}
|
2021-04-09T19:38:58Z
|
2021-04-13T15:22:37Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787', 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9', 'https://github.com/salvoravida/react-adal/pull/115'}
| null |
npm
|
GHSA-6qqj-rx4w-r3cj
|
CSRF Vulnerability in jquery-ujs
|
Versions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains.
When an attacker controls the href attribute of an anchor tag, or
the action attribute of a form tag triggering a POST action, the attacker can set the
href or action to " https://attacker.com". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain.
## Recommendation
Upgrade jquery-ujs to version 1.0.4 or later.
| null |
2021-09-23T19:45:13Z
|
2020-08-31T22:48:44Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://hackerone.com/reports/49935', 'https://www.npmjs.com/advisories/15', 'https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'https://snyk.io/vuln/npm:jquery-ujs:20150624'}
| null |
npm
|
GHSA-qgfr-5hqp-vrw9
|
Path Traversal in decompress
|
Versions of `decompress` prior to 4.2.1 are vulnerable to Arbitrary File Write. The package fails to prevent extraction of files with relative paths, allowing attackers to write to any folder in the system by including filenames containing`../`.
## Recommendation
Upgrade to version 4.2.1 or later.
|
{'CVE-2020-12265'}
|
2021-07-29T16:07:52Z
|
2020-09-03T21:16:27Z
|
CRITICAL
| null |
{'CWE-59', 'CWE-22'}
|
{'https://github.com/kevva/decompress/issues/71', 'https://github.com/kevva/decompress/pull/73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12265', 'https://www.npmjs.com/advisories/1217'}
| null |
npm
|
GHSA-5q5w-mf87-57x4
|
Downloads Resources over HTTP in sfml
|
Affected versions of `sfml` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10654'}
|
2021-01-08T19:48:39Z
|
2019-02-18T23:45:18Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10654', 'https://www.npmjs.com/advisories/256', 'https://nodesecurity.io/advisories/256', 'https://github.com/advisories/GHSA-5q5w-mf87-57x4'}
| null |
npm
|
GHSA-g336-c7wv-8hp3
|
Cross-Site Scripting in swagger-ui
|
Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter.
## Recommendation
Update to 2.2.1 or later.
| null |
2021-09-23T21:35:43Z
|
2020-09-01T15:58:06Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://github.com/swagger-api/swagger-ui/issues/1617', 'https://www.npmjs.com/advisories/137', 'https://github.com/swagger-api/swagger-ui'}
| null |
npm
|
GHSA-w3cg-6577-wx9f
|
Directory Traversal in cuciuci
|
Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16122'}
|
2020-08-31T18:21:07Z
|
2020-09-01T17:20:41Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/381', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci', 'https://www.npmjs.com/advisories/381'}
| null |
npm
|
GHSA-5x8q-gj67-rhf2
|
Malicious Package in discord_debug_log
|
All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
| null |
2021-09-30T21:23:24Z
|
2020-09-02T21:18:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/873'}
| null |
npm
|
GHSA-qx9m-27wh-7fjg
|
Downloads Resources over HTTP in jvminstall
|
Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10631'}
|
2021-01-08T01:58:11Z
|
2019-02-18T23:57:03Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/225', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10631', 'https://nodesecurity.io/advisories/225', 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg'}
| null |
npm
|
GHSA-pjxw-22xf-6pwc
|
Prototype Pollution in defaults-deep
|
All versions of `defaults-deep` are vulnerable to prototype pollution. Provided certain input `defaults-deep` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
As no patch is currently available for this vulnerability it is our recommendation to select another module that can provide this functionality.
|
{'CVE-2018-16486'}
|
2021-09-16T20:59:38Z
|
2019-02-07T18:16:38Z
|
MODERATE
| null |
{'CWE-345', 'CWE-400'}
|
{'https://github.com/advisories/GHSA-pjxw-22xf-6pwc', 'https://github.com/jonschlinkert/defaults-deep', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16486', 'https://hackerone.com/reports/380878', 'https://www.npmjs.com/advisories/778'}
| null |
npm
|
GHSA-mxr5-p36v-479m
|
Moderate severity vulnerability that affects jquery-file-upload
|
Arbitrary file upload in jQuery Upload File <= 4.0.2
|
{'CVE-2018-9207'}
|
2021-09-15T21:05:48Z
|
2018-12-19T19:24:03Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-9207', 'https://github.com/advisories/GHSA-mxr5-p36v-479m', 'http://www.vapidlabs.com/advisory.php?v=206'}
| null |
npm
|
GHSA-2r8f-2665-3gxq
|
Malicious Package in froever
|
All versions of `froever` contain malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:54:32Z
|
2020-09-02T21:36:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/904'}
| null |
npm
|
GHSA-fhv8-fx5f-7fxf
|
Prototype Pollution in the merge and clone helper methods
|
### Impact
Using `merge` and `clone` helper methods in the `src/core/util.ts` module will have prototype pollution. It will affect the popular data visualization library Apache ECharts, which is using and exported these two methods directly.
### Patches
It has been patched in https://github.com/ecomfe/zrender/pull/826.
Users should update zrender to `5.2.1`. and update echarts to `5.2.1` if project is using echarts.
### References
NA
### For more information
NA
|
{'CVE-2021-39227'}
|
2021-09-17T17:51:46Z
|
2021-09-20T19:53:15Z
|
MODERATE
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39227', 'https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf', 'https://github.com/ecomfe/zrender/pull/826', 'https://github.com/ecomfe/zrender', 'https://github.com/ecomfe/zrender/releases/tag/5.2.1'}
| null |
npm
|
GHSA-6pw2-5hjv-9pf7
|
Sandbox bypass in vm2
|
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
|
{'CVE-2021-23555'}
|
2022-02-24T13:46:56Z
|
2022-02-12T00:00:38Z
|
CRITICAL
| null |
{'CWE-1265', 'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-VM2-2309905', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23555', 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d', 'https://github.com/patriksimek/vm2'}
| null |
npm
|
GHSA-8w3j-g983-8jh5
|
Sensitive Data Exposure in parse-server
|
Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking.
`ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses.
### For more information
If you have any questions or comments about this advisory,
Open an issue in the [parse-server](https://github.com/parse-community/parse-server)
[Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md)
|
{'CVE-2019-1020013'}
|
2021-06-11T15:37:15Z
|
2019-07-11T14:23:09Z
|
MODERATE
| null |
{'CWE-209'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013', 'https://www.npmjs.com/advisories/1114', 'https://github.com/advisories/GHSA-8w3j-g983-8jh5', 'https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002)#Description_of_the_Issue', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637', 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-8w3j-g983-8jh5'}
| null |
npm
|
GHSA-9mrv-456v-pf22
|
Cross-site Scripting in vis-timeline
|
This affects the package vis-timeline before 7.4.4.
An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
|
{'CVE-2020-28487'}
|
2021-03-22T23:06:41Z
|
2021-04-13T15:19:50Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28487', 'https://github.com/visjs/vis-timeline/pull/840', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501', 'https://github.com/visjs/vis-timeline/issues/838', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502', 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500', 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}
| null |
npm
|
GHSA-g95f-p29q-9xw4
|
Regular Expression Denial of Service in braces
|
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 2.3.1 or higher.
| null |
2021-08-04T21:35:07Z
|
2019-06-06T15:30:30Z
|
LOW
| null |
{'CWE-400', 'CWE-185'}
|
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://snyk.io/vuln/npm:braces:20180219', 'https://www.npmjs.com/advisories/786'}
| null |
npm
|
GHSA-4fqg-89cc-5pv5
|
Malicious Package in sj-labc
|
All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T17:21:38Z
|
2020-09-04T14:58:44Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1315'}
| null |
npm
|
GHSA-w9q5-mvc6-5cw3
|
Malicious Package in bufder-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:56:43Z
|
2020-09-03T21:45:13Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1235'}
| null |
npm
|
GHSA-mm4f-47ch-f7hx
|
Arbitrary code execution in kill-by-port
|
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23363'}
|
2021-03-31T20:18:57Z
|
2021-04-13T15:32:43Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531', 'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4', 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363'}
| null |
npm
|
GHSA-4p7j-5ppx-rfhm
|
Downloads Resources over HTTP in apk-parser3
|
Affected versions of `apk-parser3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser3`.
## Recommendation
Update to version 0.1.3 or greater.
|
{'CVE-2016-10574'}
|
2021-01-07T23:32:43Z
|
2020-09-01T16:06:49Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/245', 'https://www.npmjs.com/advisories/245', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10574'}
| null |
npm
|
GHSA-6h7f-qwqm-35pp
|
Arbitrary File Read in phantom-html-to-pdf
|
This affects the package phantom-html-to-pdf before 0.6.1.
|
{'CVE-2020-7763'}
|
2021-07-29T20:38:31Z
|
2020-11-06T18:06:16Z
|
HIGH
| null |
{'CWE-22', 'CWE-200'}
|
{'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259', 'https://www.npmjs.com/package/phantom-html-to-pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7763', 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598'}
| null |
npm
|
GHSA-25v4-mcx4-hh35
|
Cross-Site Scripting in atlasboard-atlassian-package
|
All versions of `atlasboard-atlassian-package` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize user input that is rendered as HTML, which may allow attackers to execute arbitrary JavaScript in a victim's browser. This requires attackers being able to change issue summaries in Jira tickets.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:59:41Z
|
2020-09-04T17:28:28Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/456702', 'https://www.npmjs.com/advisories/1449'}
| null |
npm
|
GHSA-6qgx-f452-7699
|
Malicious Package in superhappyfuntime
|
All versions of `superhappyfuntime` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T17:07:59Z
|
2020-09-03T23:28:39Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1314'}
| null |
npm
|
GHSA-wqg7-vrj7-v82h
|
High severity vulnerability that affects mosca
|
This vulnerability allows remote attackers to deny service on vulnerable installations of npm mosca 2.8.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of topics. A crafted regular expression can cause the broker to crash. An attacker can leverage this vulnerability to deny access to the target system.
|
{'CVE-2018-11615'}
|
2020-06-16T22:01:00Z
|
2018-08-31T06:22:50Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-wqg7-vrj7-v82h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11615', 'https://zerodayinitiative.com/advisories/ZDI-18-583'}
| null |
npm
|
GHSA-hrgx-7j6v-xj82
|
Reflected cross-site scripting (XSS) vulnerability
|
This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package.
#### Impact
The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page.
This is a targeted attack and may present itself in the form of phishing and or chained in conjunction with some other vulnerability.
## Vulnerability mitigation
Please upgrade to `@keystone-6/auth >= 1.0.2`, where this vulnerability has been closed.
If you are using `@keystone-next/auth`, we **strongly** recommend you upgrade to `@keystone-6`.
### Workarounds
If for some reason you cannot upgrade the dependencies in software, you could alternatively
- disable the administration user interface, or
- if using a reverse-proxy, strip query parameters when accessing the administration interface
### References
https://owasp.org/www-community/attacks/xss/
Thanks to Shivansh Khari (@Shivansh-Khari) for discovering and reporting this vulnerability
|
{'CVE-2022-0087'}
|
2022-01-19T17:42:16Z
|
2022-01-12T21:55:40Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0087', 'https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e', 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82', 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38', 'https://github.com/keystonejs/keystone'}
| null |
npm
|
GHSA-gmv4-r438-p67f
|
Leading white space bypasses protocol validation
|
### Impact
Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail.
### Patches
Patched in 1.19.9
### Workarounds
Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(value)`), e.g. by using
```js
function remove_whitespace(url){
const whitespace = /^[\x00-\x20\u00a0\u1680\u2000-\u200a\u2028\u2029\u202f\u205f\u3000\ufeff]+/;
url = url.replace(whitespace, '')
return url
}
```
### References
* https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [medialize/URI.js](https://github.com/medialize/URI.js/)
|
{'CVE-2022-24723'}
|
2022-03-11T20:04:26Z
|
2022-03-03T19:23:36Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/', 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723', 'https://github.com/medialize/URI.js/releases/tag/v1.19.9', 'https://github.com/medialize/URI.js/', 'https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f'}
| null |
npm
|
GHSA-ph8p-2g97-9654
|
Downloads Resources over HTTP in jstestdriver
|
Affected versions of `jstestdriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jstestdriver`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2011.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10643'}
|
2021-01-08T18:21:22Z
|
2018-08-15T19:27:25Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/244', 'https://github.com/advisories/GHSA-ph8p-2g97-9654', 'https://www.npmjs.com/advisories/244', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10643'}
| null |
npm
|
GHSA-38f9-m297-6q9g
|
DoS via malicious record IDs in WatermelonDB
|
## Impact
Medium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
A maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable.
This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method.
The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage.
No way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized.
It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app.
## Patches
Patched versions include:
- 0.15.1
- 0.16.2
- 0.16.1-fix
- this is actually the same as 0.16.0, but with the patch applied - as 0.16.1 is causing issues for some users
- `924c7ae2a8d` commit id contains the patch
## Workarounds
1. Ensure that your backend service sanitizes record IDs sent in the `pull sync` endpoint, such that only IDs matching `/^[a-zA-Z0-9_-.]+$/` are returned. This could also be done in JavaScript `pullChanges` function passed to `synchronize()`
2. If you use `destroyDeletedRecords` directly, validate all IDs passed the same way
## For more information
If you have any questions about this advisory, contact @radex.
|
{'CVE-2020-4035'}
|
2021-01-08T20:15:00Z
|
2020-06-03T21:57:53Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4035', 'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025', 'https://github.com/Nozbe/WatermelonDB/security/advisories/GHSA-38f9-m297-6q9g'}
| null |
npm
|
GHSA-6xhf-x49c-m5m6
|
Github Token Leak in aegir
|
Affected versions of `aegir` bundle and publish the current users github token to npm when `aegir-release` is executed.
## Recommendation
Update to version 12.0.8 or later.
If you used this module to do a release for your project you should invalidate the GitHub tokens that were leaked.
|
{'CVE-2017-16225'}
|
2020-08-31T18:27:14Z
|
2018-07-24T20:04:11Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16225', 'https://www.npmjs.com/advisories/546', 'https://github.com/advisories/GHSA-6xhf-x49c-m5m6', 'https://nodesecurity.io/advisories/546'}
| null |
npm
|
GHSA-fvwr-h9xh-m6wc
|
Denial of Service in @commercial/subtext
|
Versions of `@commercial/subtext` prior to 5.1.1 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
## Recommendation
Upgrade to version 5.1.1 or later.
| null |
2020-08-31T18:49:40Z
|
2020-09-03T20:33:17Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1166', 'https://github.com/hapijs/subtext/issues/72'}
| null |
npm
|
GHSA-gmxv-xf2q-6j8m
|
Cross-Site Scripting in m-server
|
Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving.
## Recommendation
Update to version 1.4.2 or later.
|
{'CVE-2018-16484'}
|
2020-08-31T18:33:40Z
|
2019-02-07T18:16:16Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/319794', 'https://www.npmjs.com/advisories/729', 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}
| null |
npm
|
GHSA-r8f7-9pfq-mjmv
|
Improper Certificate Validation in node-sass
|
Certificate validation in node-sass 2.0.0 to 6.0.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
|
{'CVE-2020-24025'}
|
2022-02-09T22:23:03Z
|
2022-02-09T22:22:24Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://github.com/sass/node-sass/issues/3067', 'https://github.com/sass/node-sass/releases/tag/v7.0.0', 'https://github.com/sass/node-sass/pull/3149', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/sass/node-sass/pull/567#issuecomment-656609236'}
| null |
npm
|
GHSA-3627-w2qr-5fxr
|
Downloads Resources over HTTP in fuseki
|
Affected versions of `fuseki` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fuseki`.
## Recommendation
Update to version 1.0.1 or later.
|
{'CVE-2016-10576'}
|
2021-01-08T20:04:27Z
|
2019-02-18T23:52:07Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/278', 'https://github.com/advisories/GHSA-3627-w2qr-5fxr', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10576', 'https://nodesecurity.io/advisories/278'}
| null |
npm
|
GHSA-w364-8vfv-gvf5
|
Downloads Resources over HTTP in phantomjs-cheniu
|
Affected versions of `phantomjs-cheniu` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `phantomjs-cheniu`.
## Recommendation
No patch is currently available for this vulnerability.
As this package is just a fork of Medium's [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs) package, the best mitigation is currently to install the `Medium` version of [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs). This can be done via the following command:
```
npm i phantomjs-prebuilt
```
|
{'CVE-2016-10661'}
|
2021-01-08T01:57:02Z
|
2019-02-18T23:44:52Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/262', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10661', 'https://github.com/advisories/GHSA-w364-8vfv-gvf5', 'https://nodesecurity.io/advisories/262'}
| null |
npm
|
GHSA-23vf-5g53-hm9q
|
Directory Traversal in list-n-stream
|
Affected versions of `list-n-stream` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to version 0.0.11 or later.
|
{'CVE-2017-16084'}
|
2020-08-31T18:20:03Z
|
2018-07-24T14:57:31Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-23vf-5g53-hm9q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16084', 'https://www.npmjs.com/advisories/344', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/list-n-stream', 'https://nodesecurity.io/advisories/344'}
| null |
npm
|
GHSA-pgjj-866w-fc5c
|
Risk of code injection
|
### Impact
Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues
### Patches
Temporarily removed the problematic route and added a `no-new-func` rule to eslint
Self-built users should upgrade to 7f1c430 and later as soon as possible
### Credits
Tencent Woodpecker Security Team
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues)
* Email us at [i@diygod.me](mailto:i@diygod.me)
|
{'CVE-2021-21278'}
|
2021-10-11T16:14:26Z
|
2021-10-12T16:03:43Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c', 'https://www.npmjs.com/package/rsshub', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278', 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d', 'https://github.com/DIYgod/RSSHub'}
| null |
npm
|
GHSA-2xv3-h762-ccxv
|
Out-of-bounds Read in concat-with-sourcemaps
|
Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator.
## Recommendation
Update to version 1.0.6 or later.
| null |
2020-08-31T18:31:05Z
|
2019-05-29T19:18:02Z
|
MODERATE
| null |
{'CWE-125'}
|
{'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18', 'https://hackerone.com/reports/320166', 'https://www.npmjs.com/advisories/644'}
| null |
npm
|
GHSA-gjcw-v447-2w7q
|
Forgeable Public/Private Tokens in jws
|
Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 3.0.0 or later.
|
{'CVE-2016-1000223'}
|
2021-09-23T21:25:33Z
|
2020-09-01T15:23:18Z
|
HIGH
| null | null |
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/brianloveswords/node-jws', 'https://www.npmjs.com/advisories/88', 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000223', 'https://snyk.io/vuln/npm:jws:20160726'}
| null |
npm
|
GHSA-pv8x-p9hq-j328
|
Arbitrary Code Execution in mathjs
|
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object.
## Recommendation
Upgrade to version 3.17.0 or later.
|
{'CVE-2017-1001003'}
|
2020-08-31T18:27:26Z
|
2017-12-18T22:27:53Z
|
CRITICAL
| null |
{'CWE-88'}
|
{'https://github.com/advisories/GHSA-pv8x-p9hq-j328', 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/551', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}
| null |
npm
|
GHSA-2mxc-m4c3-wqhq
|
Malicious Package in ruffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:18:32Z
|
2020-09-03T22:50:46Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1273'}
| null |
npm
|
GHSA-j3qq-qvc8-c6g7
|
Malicious Package in foever
|
All versions of `foever` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:49Z
|
2020-09-01T21:15:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/688'}
| null |
npm
|
GHSA-536f-268f-6gxc
|
Malicious Package in buffermxor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:25:46Z
|
2020-09-03T22:17:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1256'}
| null |
npm
|
GHSA-vcfp-ppqw-mf23
|
Downloads Resources over HTTP in fis-sass-all
|
Affected versions of `fis-sass-all` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-sass-all`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10686'}
|
2021-09-16T20:52:55Z
|
2018-08-17T20:20:46Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://github.com/advisories/GHSA-vcfp-ppqw-mf23', 'https://github.com/fis-dev/fis-sass', 'https://www.npmjs.com/advisories/287', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10686', 'https://nodesecurity.io/advisories/287'}
| null |
npm
|
GHSA-qrmm-w75w-3wpx
|
Server side request forgery in SwaggerUI
|
SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered.
However, this functionality may pose a risk for users who host their own SwaggerUI instances. In particular, including remote OpenAPI definitions opens a vector for phishing attacks by abusing the trusted names/domains of self-hosted instances.
An example scenario abusing this functionality could take the following form:
- `https://example.com/api-docs` hosts a version of SwaggerUI with `?url=` query parameter enabled.
- Users will trust the domain `https://example.com` and the contents of the OpenAPI definition.
- A malicious actor may craft a similar OpenAPI definition and service that responds to the defined APIs at `https://evildomain`.
- Users mistakenly click a phishing URL like `https://example.com/api-docs?url=https://evildomain/fakeapi.yaml` and enters sensitive data via the "Try-it-out" feature.
We do want to stress that this attack vector is limited to scenarios that actively trick users into divulging sensitive information. The ease of this is highly contextual and, therefore, the threat model may be different for individual users and organizations. It is *not* possible to perform non-interactive attacks (e.g., cross-site scripting or code injection) through this mechanism.
### Resolution
We've made the decision to [disable query parameters (#4872)](https://github.com/swagger-api/swagger-ui/issues/4872) by default starting with SwaggerUI version `4.1.3`. Please update to this version when it becomes available (**ETA: 2021 December**). Users will still be able to be re-enable the options at their discretion. We'll continue to enable query parameters on the Swagger demo sites.
### Workaround
If you host a version of SwaggerUI and wish to mitigate this issue immediately, you are encouraged to add the following custom plugin code:
```js
SwaggerUI({
// ...other configuration options,
plugins: [function UrlParamDisablePlugin() {
return {
statePlugins: {
spec: {
wrapActions: {
// Remove the ?url parameter from loading an external OpenAPI definition.
updateUrl: (oriAction) => (payload) => {
const url = new URL(window.location.href)
if (url.searchParams.has('url')) {
url.searchParams.delete('url')
window.location.replace(url.toString())
}
return oriAction(payload)
}
}
}
}
}
}],
})
```
### Future UX work
Through the exploration of this issue, it became apparent that users may not be aware to which web server the Try-it-out function will send requests. While this information is currently presented at the top of the page, understanding may improve by displaying it closer to the "Execute" button where requests are actually made. We'll be exploring these UX improvements over the coming months and welcome community input. Please create a Feature Request under the GitHub Issue tab to start a conversation with us and the community.
## Reflected XSS attack
**Warning** in versions <= 3.36.2, it is possible to combine the URL options (as mentioned above) with a vunerability in DOMPurify (https://www.cvedetails.com/cve/CVE-2020-26870/) to create a reflected XSS vector. If your version of Swagger UI is older than or equal to 3.36.2, we suggest you upgrade or implement the workaround as mentioned above.
| null |
2022-01-26T22:24:21Z
|
2021-12-09T19:08:38Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76', 'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/issues/4872'}
| null |
npm
|
GHSA-35q2-47q7-3pc3
|
Potential exponential regex in monitor mode
|
### Impact
When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.
### Patches
The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`.
### References
#1569 (GHSL-2021-026)
|
{'CVE-2021-29469'}
|
2021-04-23T18:11:39Z
|
2021-04-27T15:56:03Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3', 'https://security.netapp.com/advisory/ntap-20210611-0010/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469', 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1', 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}
| null |
npm
|
GHSA-85fq-56wq-gmcf
|
Hijacked Environment Variables in mariadb
|
The `mariadb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16046'}
|
2020-08-31T18:25:20Z
|
2018-07-18T18:28:17Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16046', 'https://www.npmjs.com/advisories/495', 'https://nodesecurity.io/advisories/495', 'https://github.com/advisories/GHSA-85fq-56wq-gmcf'}
| null |
npm
|
GHSA-ccrp-c664-8p4j
|
Cross-Site Scripting in markdown-to-jsx
|
Versions of `markdown-to-jsx` prior to 6.11.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload.
## Recommendation
Upgrade to version 6.11.4 or later.
| null |
2021-09-29T19:59:57Z
|
2020-09-03T21:17:36Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1219', 'https://github.com/probablyup/markdown-to-jsx/pull/307', 'https://github.com/probablyup/markdown-to-jsx'}
| null |
npm
|
GHSA-3pwh-5mmc-mwrx
|
Denial of Service in nes
|
Affected versions of `nes` are vulnerable to denial of service when given an invalid `cookie` header, and websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to throw and exit.
## Recommendation
Update to version 6.4.1 or later.
|
{'CVE-2017-16025'}
|
2020-08-31T18:19:35Z
|
2018-07-24T20:06:33Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/hapijs/nes/issues/171', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16025', 'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655', 'https://nodesecurity.io/advisories/331', 'https://www.npmjs.com/advisories/331', 'https://github.com/advisories/GHSA-3pwh-5mmc-mwrx'}
| null |
npm
|
GHSA-3p94-vj97-fm4q
|
OS Command Injection in fsa
|
fsa through 0.5.1 is vulnerable to Command Injection. The first argument of 'execGitCommand()', located within 'lib/rep.js#63' can be controlled by users without any sanitization to inject arbitrary commands.
|
{'CVE-2020-7615'}
|
2021-05-25T16:28:38Z
|
2021-12-09T19:56:44Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://github.com/gregof/fsa/blob/master/lib/rep.js#L12', 'https://snyk.io/vuln/SNYK-JS-FSA-564118', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7615'}
| null |
npm
|
GHSA-3wcq-x3mq-6r9p
|
Potential memory exposure in dns-packet
|
This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
|
{'CVE-2021-23386'}
|
2021-05-26T20:11:00Z
|
2021-05-24T19:51:04Z
|
HIGH
| null |
{'CWE-908', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23386', 'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56', 'https://hackerone.com/bugs?subject=user&%3Breport_id=968858', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719', 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d', 'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563'}
| null |
npm
|
GHSA-8xqr-4cpm-wx7g
|
Cross-Site Scripting in react-svg
|
Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default.
## Recommendation
Update to version 2.2.18 or later.
| null |
2020-08-31T18:31:14Z
|
2019-05-31T23:47:27Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/648', 'https://github.com/tanem/react-svg/pull/57', 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb', 'https://nodesecurity.io/advisories/648'}
| null |
npm
|
GHSA-6qqf-vvcr-7qrv
|
Cryptographically Weak PRNG in generate-password
|
Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords.
## Recommendation
Update to version 1.4.1 or later.
| null |
2020-08-31T18:34:48Z
|
2019-05-23T09:27:22Z
|
MODERATE
| null |
{'CWE-338'}
|
{'https://www.npmjs.com/advisories/762', 'https://github.com/brendanashworth/generate-password/pull/26'}
| null |
npm
|
GHSA-5jgp-pg4f-q8vj
|
Malicious Package in node-ftp
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:27:21Z
|
2020-09-03T19:55:42Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1137'}
| null |
npm
|
GHSA-g9r4-xpmj-mj65
|
Prototype Pollution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.5.3 are vulnerable to prototype pollution. It is possible to add or modify properties to the Object prototype through a malicious template. This may allow attackers to crash the application or execute Arbitrary Code in specific conditions.
## Recommendation
Upgrade to version 3.0.8, 4.5.3 or later.
| null |
2020-08-31T18:55:14Z
|
2020-09-04T15:06:32Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1325'}
| null |
npm
|
GHSA-f38p-c2gq-4pmr
|
Regular Expression Denial-of-Service in npm schema-inspector
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a "not yet validated" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways.
### References
_Are there any links users can visit to find out more?_
https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f
### For more information
If you have any questions or comments about this advisory, you can create an issue in this repository.
|
{'CVE-2021-21267'}
|
2021-03-19T20:14:08Z
|
2021-03-19T20:14:21Z
|
LOW
| null |
{'CWE-400', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21267', 'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f', 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr', 'https://www.npmjs.com/package/schema-inspector', 'https://security.netapp.com/advisory/ntap-20210528-0006/', 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0'}
| null |
npm
|
GHSA-8mfc-v7wv-p62g
|
Path Traversal in Yarn
|
Arbitrary filesystem write vulnerability in Yarn 1.21.1 and earlier allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
|
{'CVE-2020-8131'}
|
2021-04-08T20:35:01Z
|
2022-02-09T22:43:37Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8131', 'https://github.com/yarnpkg/yarn/pull/7831', 'https://hackerone.com/reports/730239'}
| null |
npm
|
GHSA-53xj-v576-3ch2
|
OS Command Injection in giting
|
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument "repo" of function "pull()" is executed by the package without any validation.
|
{'CVE-2019-10802'}
|
2021-04-09T21:50:02Z
|
2021-04-13T15:22:09Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0', 'https://snyk.io/vuln/SNYK-JS-GITING-559008', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'}
| null |
npm
|
GHSA-vf5m-q45w-8mh9
|
Malicious Package in js-qha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:01:14Z
|
2020-09-03T23:00:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1282'}
| null |
npm
|
GHSA-78h7-fgq9-625x
|
Directory Traversal in quickserver
|
Affected versions of `quickserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16196'}
|
2020-08-31T18:22:57Z
|
2018-07-23T20:40:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-78h7-fgq9-625x', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/quickserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16196', 'https://nodesecurity.io/advisories/433', 'https://www.npmjs.com/advisories/433'}
| null |
npm
|
GHSA-7h26-63m7-qhf2
|
HTML comments vulnerability allowing to execute JavaScript code
|
### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.17.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-41165'}
|
2022-02-08T20:39:10Z
|
2021-11-17T21:58:25Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41165', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-rmxg-73gg-4p98
|
Cross-Site Scripting (XSS) in jquery
|
Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option.
## Recommendation
Update to version 3.0.0 or later.
|
{'CVE-2015-9251'}
|
2021-09-17T18:58:18Z
|
2018-01-22T13:32:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://security.netapp.com/advisory/ntap-20210108-0004/', 'http://www.securityfocus.com/bid/105658', 'https://www.tenable.com/security/tns-2019-08', 'https://access.redhat.com/errata/RHSA-2020:0481', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://snyk.io/vuln/npm:jquery:20150627', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://github.com/jquery/jquery/issues/2432', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://github.com/advisories/GHSA-rmxg-73gg-4p98', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery/pull/2588', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9251', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://www.npmjs.com/advisories/328', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04', 'https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf', 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'}
| null |
npm
|
GHSA-wxhq-pm8v-cw75
|
Regular Expression Denial of Service in clean-css
|
Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 4.1.11 or higher.
| null |
2020-08-31T18:35:40Z
|
2019-06-05T20:50:16Z
|
LOW
| null | null |
{'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3', 'https://www.npmjs.com/advisories/785'}
| null |
npm
|
GHSA-5vp3-v4hc-gx76
|
UUPSUpgradeable vulnerability in @openzeppelin/contracts
|
### Impact
Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon.
### Patches
A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).
### References
[Post-mortem](https://forum.openzeppelin.com/t/uupsupgradeable-vulnerability-post-mortem/15680).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
{'CVE-2021-41264'}
|
2021-11-16T21:44:47Z
|
2021-09-15T20:23:17Z
|
CRITICAL
| null |
{'CWE-665'}
|
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76', 'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'}
| null |
npm
|
GHSA-v39h-qm32-8gwq
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in express-mock-middleware
|
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
|
{'CVE-2020-7616'}
|
2021-07-29T15:53:05Z
|
2021-12-09T19:57:29Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://github.com/LingyuCoder/express-mock-middleware/blob/master/lib/index.js#L39', 'https://snyk.io/vuln/SNYK-JS-EXPRESSMOCKMIDDLEWARE-564120', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7616'}
| null |
npm
|
GHSA-cf66-xwfp-gvc4
|
Missing Origin Validation in webpack-dev-server
|
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
For `webpack-dev-server` update to version 3.1.11 or later.
|
{'CVE-2018-14732'}
|
2022-04-06T20:39:38Z
|
2019-01-04T17:40:59Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/webpack/webpack-dev-server', 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732', 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10', 'https://github.com/webpack/webpack-dev-server/issues/1445', 'https://www.npmjs.com/advisories/725', 'https://github.com/webpack/webpack-dev-server/issues/1620'}
| null |
npm
|
GHSA-9fgx-q25h-jxrg
|
DOM XSS in Theme Preview
|
### Impact
An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site.
Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.
Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below.
### Patches
Fixed in 4.3.3, all 4.x sites should upgrade as soon as possible.
As the endpoint is unused, the patch simply removes it.
### Workarounds
- Log out of Ghost Admin
- Suspend any users who cannot log out
- Block access to `/ghost/preview`
Example of how to block access in nginx:
```
location ~ /ghost/preview {
rewrite ^(\/(.*\/)?ghost\/)(.*)$ $1 redirect;
}
```
This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied.
|
{'CVE-2021-29484'}
|
2021-09-07T17:42:40Z
|
2021-04-29T21:53:18Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29484', 'https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290', 'https://security.netapp.com/advisory/ntap-20210618-0006/', 'https://blog.sonarsource.com/ghost-admin-takeover', 'https://www.npmjs.com/package/ghost', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg', 'https://github.com/TryGhost/Ghost'}
| null |
npm
|
GHSA-mwcv-m549-5cm8
|
Hijacked Environment Variables in node-tkinter
|
The `node-tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16062'}
|
2021-06-10T22:18:51Z
|
2018-11-01T14:47:43Z
|
HIGH
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16062', 'https://github.com/advisories/GHSA-mwcv-m549-5cm8', 'https://www.npmjs.com/advisories/501', 'https://nodesecurity.io/advisories/501'}
| null |
npm
|
GHSA-3rh3-wfr4-76mj
|
Regular expression Denial of Service in multiple packages
|
### Impact
A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 27.0.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities.
|
{'CVE-2021-21391'}
|
2021-04-30T17:30:42Z
|
2021-04-06T17:28:41Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391', 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine', 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget', 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office'}
| null |
npm
|
GHSA-hgmg-hhc8-g5wr
|
Regular expression Denial of Service in Markdown plugin
|
### Impact
A regular expression denial of service (ReDoS) vulnerability has been discovered in the CKEditor 5 Markdown plugin code. The vulnerability allowed to abuse a link recognition regular expression, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 Markdown plugin at version <= 24.0.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 25.0.0.
### Workarounds
The user can work around the issue by:
- Upgrading CKEditor 5 to version 25.0.0.
- Disabling the Markdown plugin.
### More information
If you have any questions or comments about this advisory:
* Email us at [security@cksource.com](mailto:security@cksource.com)
### Acknowledgements
The CKEditor 5 team would like to thank Erik Krogh Kristensen from the GitHub team for recognizing this vulnerability and
Alvaro Muñoz from GitHub for reporting it.
|
{'CVE-2021-21254'}
|
2021-02-02T15:22:37Z
|
2021-01-29T21:51:22Z
|
LOW
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm', 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-hgmg-hhc8-g5wr', 'https://github.com/ckeditor/ckeditor5/releases/tag/v25.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21254'}
| null |
npm
|
GHSA-7px7-7xjx-hxm8
|
Moderate severity vulnerability that affects marked
|
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
|
{'CVE-2017-1000427'}
|
2021-09-03T21:03:01Z
|
2018-01-04T21:04:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/markedjs/marked', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000427', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'https://github.com/advisories/GHSA-7px7-7xjx-hxm8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://snyk.io/vuln/npm:marked:20170112'}
| null |
npm
|
GHSA-x4w5-r546-x9qh
|
Arbitrary File Read in html-pdf
|
All versions of `html-pdf` are vulnerable to Arbitrary File Read. The package fails to sanitize the HTML input, allowing attackers to exfiltrate server files by supplying malicious HTML code. XHR requests in the HTML code are executed by the server. Input with an XHR request such as `request.open("GET","file:///etc/passwd")` will result in a PDF document with the contents of `/etc/passwd`.
## Recommendation
No fix is currently available. There is a mitigation available in the provided reference.
|
{'CVE-2019-15138'}
|
2022-01-04T19:51:51Z
|
2019-10-11T18:40:38Z
|
HIGH
| null |
{'CWE-79', 'CWE-668', 'CWE-73', 'CWE-200'}
|
{'https://security.netapp.com/advisory/ntap-20191017-0005/', 'https://github.com/marcbachmann/node-html-pdf/issues/530#issuecomment-535045123', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15138', 'https://www.npmjs.com/advisories/1095', 'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362', 'https://github.com/marcbachmann/node-html-pdf/issues/530', 'https://github.com/marcbachmann/node-html-pdf/', 'https://github.com/marcbachmann/node-html-pdf/releases/tag/v3.0.1'}
| null |
npm
|
GHSA-65xx-c85x-wg76
|
Command Injection in plotter
|
All versions of `plotter` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
```
var plot = require('plotter').plot;
const title = 'Example "\nset title system("touch testing")#';
plot({
data: [ 3, 1, 2, 3, 4 ],
filename: 'output.pdf',
style: 'linespoints',
title: title,
logscale: true,
xlabel: 'time',
ylabel: 'length of string',
format: 'pdf'
});
```
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:59:26Z
|
2020-09-04T17:20:52Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1441'}
| null |
npm
|
GHSA-9q64-mpxx-87fg
|
Open Redirect in ecstatic
|
Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains.
## Recommendation
If using `ecstatic` 4.x, upgrade to 4.1.2 or later.
If using `ecstatic` 3.x, upgrade to 3.3.2 or later.
If using `ecstatic` 2.x, upgrade to 2.2.2 or later.
| null |
2020-12-15T16:51:18Z
|
2020-04-01T16:35:08Z
|
HIGH
| null |
{'CWE-601'}
|
{'https://www.npmjs.com/advisories/830', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10775'}
| null |
npm
|
GHSA-333x-qr3v-g4xx
|
Command injection in spritesheet-js
|
This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.
|
{'CVE-2020-7782'}
|
2021-04-05T19:04:46Z
|
2021-04-13T15:30:16Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7782', 'https://www.npmjs.com/package/spritesheet-js', 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32'}
| null |
npm
|
GHSA-2f6g-w5gj-c93h
|
Prototype Pollution in iniparserjs
|
This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
|
{'CVE-2021-23328'}
|
2021-03-22T23:02:01Z
|
2021-04-13T15:20:09Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23328', 'https://www.npmjs.com/package/iniparserjs', 'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989'}
| null |
npm
|
GHSA-2ghc-6v89-pw9j
|
Prototype Pollution in body-parser-xml
|
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3666'}
|
2021-09-14T18:39:31Z
|
2021-09-14T20:25:35Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://github.com/fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
| null |
npm
|
GHSA-4rvg-955w-h68q
|
Path Traversal in angular-http-server
|
Affected versions of `angular-http-server` are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `angular-http-server`.
## Recommendation
Update to version 1.6.0 or later.
:exclamation: Note: This was originally thought to be fixed in version 1.4.3, though according to [this issue](https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/issues/117#issuecomment-803872454) the vulnerability was not completely fixed until version 1.6.0.
|
{'CVE-2018-3713'}
|
2021-03-23T21:44:03Z
|
2018-07-26T14:47:40Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-4rvg-955w-h68q', 'https://hackerone.com/reports/309120', 'https://www.npmjs.com/advisories/589', 'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8', 'https://github.com/simonh1000/angular-http-server/pull/21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3713'}
| null |
npm
|
GHSA-28f4-mjfq-qrvf
|
Malicious Package in buffes-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:26:03Z
|
2020-09-03T22:18:40Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1257'}
| null |
npm
|
GHSA-6rjc-4pwr-3vp7
|
Cross-Site Scripting in iobroker.web
|
Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 2.4.10 or later.
|
{'CVE-2019-10771'}
|
2021-08-19T15:34:42Z
|
2019-12-02T18:14:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771', 'https://www.npmjs.com/advisories/1345'}
| null |
npm
|
GHSA-vh7m-p724-62c2
|
Signature Malleabillity in elliptic
|
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
|
{'CVE-2020-13822'}
|
2021-09-23T17:39:58Z
|
2020-07-29T20:40:35Z
|
HIGH
| null |
{'CWE-190'}
|
{'https://www.npmjs.com/package/elliptic', 'https://github.com/indutny/elliptic', 'https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/', 'https://github.com/indutny/elliptic/issues/226', 'https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822'}
| null |
npm
|
GHSA-m5pf-5894-jmx7
|
Malicious Package in sailclothjs
|
Version 1.2.6 of `sailclothjs` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:11Z
|
2020-09-03T19:08:00Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1099'}
| null |
npm
|
GHSA-325j-24f4-qv5x
|
Regular Expression Denial of Service in ssri
|
Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode.
## Recommendation
Update to version 5.2.2 or later.
|
{'CVE-2018-7651'}
|
2021-08-31T20:21:06Z
|
2018-03-07T22:22:20Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7651', 'https://github.com/advisories/GHSA-325j-24f4-qv5x', 'https://github.com/zkat/ssri/issues/10', 'https://github.com/zkat/ssri', 'https://nodesecurity.io/advisories/565', 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d', 'https://www.npmjs.com/advisories/565'}
| null |
npm
|
GHSA-7frr-c83r-fm22
|
Malicious Package in buffez-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:26:37Z
|
2020-09-03T22:20:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1259'}
| null |
npm
|
GHSA-g8wf-rcg3-qw4q
|
Directory Traversal in tinyserver2
|
Affected versions of `tinyserver2` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to v0.6.0 or later.
|
{'CVE-2017-16085'}
|
2020-08-31T18:20:43Z
|
2018-07-24T15:01:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/371', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16085', 'https://github.com/advisories/GHSA-g8wf-rcg3-qw4q', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tinyserver2', 'https://nodesecurity.io/advisories/371'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.