ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-v659-54cx-g4qr
|
Prototype Pollution in deep-override
|
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25941'}
|
2021-05-25T20:44:52Z
|
2021-05-17T20:57:25Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941', 'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25941'}
| null |
npm
|
GHSA-q5mq-6fjg-4mw8
|
SQL Injection in thinkjs
|
SQL injection vulnerability in the model.increment and model.decrement function in ThinkJS 3.2.10 allows remote attackers to execute arbitrary SQL commands via the step parameter.
|
{'CVE-2020-21176'}
|
2021-11-19T20:42:27Z
|
2021-11-19T20:42:32Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21176', 'https://github.com/thinkjs/thinkjs', 'https://blog.jiguang.xyz/posts/thinkjs-sql-injection/'}
| null |
npm
|
GHSA-8h55-49jm-739x
|
Directory Traversal in easyquick
|
Affected versions of `easyquick` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16109'}
|
2020-08-31T18:20:48Z
|
2018-08-29T23:21:46Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16109', 'https://github.com/advisories/GHSA-8h55-49jm-739x', 'https://www.npmjs.com/advisories/373', 'https://nodesecurity.io/advisories/373', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick'}
| null |
npm
|
GHSA-gpg2-7r7j-4pm9
|
Malicious Package in buffer-xob
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:05:05Z
|
2020-09-03T22:09:56Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1249'}
| null |
npm
|
GHSA-hf5h-hh56-3vrg
|
Denial of Service in uws
|
Affected versions of `uws` do not properly handle large websocket messages when `permessage-deflate` is enabled, which may result in a denial of service condition.
If `uws` recieves a 256Mb websocket message when `permessage-deflate` is enabled, the server will compress the message prior to executing the length check, and subsequently extract the message prior to processing. This can result in a situation where an excessively large websocket message passes the length checks, yet still gets cast from a Buffer to a string, which will exceed v8's maximum string size and crash the process.
## Recommendation
Update to version 0.10.9 or later.
Alternatively, disable `permessage-deflate`.
|
{'CVE-2016-10544'}
|
2020-08-31T18:12:32Z
|
2020-09-01T16:02:29Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9', 'https://nodesecurity.io/advisories/149', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10544', 'https://www.npmjs.com/advisories/149'}
| null |
npm
|
GHSA-2jpm-827p-j44g
|
Stored XSS in TimelineJS3
|
### Impact
TimelineJS renders some user data as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file.
Most TimelineJS users configure their timeline with a Google Sheets document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if they grant public write access to the document.
Some TimelineJS users configure their timeline with a JSON document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if write access to the system hosting that document is otherwise compromised.
Although the vulnerability has a [CVSS v3.1 base score of 7.2](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), this vulnerability has a severity of Moderate due to the likeliness of exploitation.
### Patches
Version 3.7.0 of TimelineJS addresses this in two ways.
1. For content which is intended to support limited HTML markup for styling and linking, that content is "sanitized" before being added to the DOM.
1. For content intended for simple text display, all markup is stripped.
Very few users of TimelineJS actually install the TimelineJS code on their server. Most users publish a timeline using a URL hosted on systems we control. The fix for this issue is published to our system such that **those users will automatically begin using the new code**. The only exception would be users who have deliberately edited the embed URL to "pin" their timeline to an earlier version of the code.
Some users of TimelineJS use it as a part of a [wordpress plugin](https://wordpress.org/plugins/knight-lab-timelinejs/). Version 3.7.0.0 of that plugin and newer integrate the updated code. Users are encouraged to update the plugin rather than manually update the embedded version of TimelineJS.
### Workarounds
To exploit this vulnerability, the attacker must have write access to the data source for the Timeline or the server which embeds the timeline.
Thus, the only workaround is appropriate attention to securing write access to the Google Sheet or JSON file which serves as the data source.
### References
For more about the release of TimelineJS which addresses this vulnerability, see the [Knight Lab website](https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html).
A technical write-up of this vulnerability is available [here](https://zanderwork.com/blog/cve-2020-15092/).
### Acknowledgements
This vulnerability was discovered by Zander Work ([@captainGeech42](https://twitter.com/captainGeech42)) of Oregon State University.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](https://github.com/NUKnightLab/TimelineJS3/issues)
* File a support request in our [helpdesk system](https://knightlab.zendesk.com/hc/en-us/requests/new)
|
{'CVE-2020-15092'}
|
2021-01-07T23:47:19Z
|
2020-07-09T18:28:07Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/NUKnightLab/TimelineJS3/security/advisories/GHSA-2jpm-827p-j44g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15092', 'https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html', 'https://knightlab.northwestern.edu/posts/'}
| null |
npm
|
GHSA-c9f4-xj24-8jqx
|
Regular Expression Denial of Service in uglify-js
|
Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method.
### Proof of Concept
```
var u = require('uglify-js');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
u.parse("var a = " + genstr(process.argv[2], "1") + ".1ee7;");
```
### Results
```
$ time node test.js 10000
real 0m1.091s
user 0m1.047s
sys 0m0.039s
$ time node test.js 80000
real 0m6.486s
user 0m6.229s
sys 0m0.094s
```
## Recommendation
Update to version 2.6.0 or later.
|
{'CVE-2015-8858'}
|
2021-09-08T21:59:09Z
|
2017-10-24T18:33:36Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/48', 'https://github.com/advisories/GHSA-c9f4-xj24-8jqx', 'http://www.securityfocus.com/bid/96409', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858', 'https://nodesecurity.io/advisories/48', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-mmhj-4w6j-76h7
|
Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate
|
Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.
`Reference` objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a `Reference` instance to an attacker they would be able to use it to acquire a `Reference` to the nodejs context's `Function` object.
Similar application-specific attacks could be possible by modifying the local prototype of other API objects.
Access to `NativeModule` objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution.
To address these issues the following changes were made in v4.0.0:
- Documentation was updated with more explicit guidelines on building secure applications.
- `Reference` instances will no longer follow prototype chains by default, nor will they invoke accessors or proxies.
- All `isolated-vm` API prototypes are now immutable.
- `NativeModule` constructor may only be invoked from a nodejs isolate.
|
{'CVE-2021-21413'}
|
2021-03-30T22:27:45Z
|
2021-04-06T17:22:55Z
|
HIGH
| null |
{'CWE-913'}
|
{'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15', 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413', 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7', 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704'}
| null |
npm
|
GHSA-p92x-r36w-9395
|
Type confusion in mpath
|
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input.
|
{'CVE-2021-23438'}
|
2021-09-13T20:27:08Z
|
2021-09-02T22:02:25Z
|
CRITICAL
| null |
{'CWE-843'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548', 'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc', 'https://github.com/aheckmann/mpath', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23438', 'https://snyk.io/vuln/SNYK-JS-MPATH-1577289'}
| null |
npm
|
GHSA-gqfv-g9f6-3v3m
|
Directory Traversal in serveryaozeyan
|
Affected versions of `serveryaozeyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16096'}
|
2020-08-31T18:20:22Z
|
2020-09-01T16:50:23Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/355', 'https://nodesecurity.io/advisories/355', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16096'}
| null |
npm
|
GHSA-xrr6-6ww3-f3qm
|
Sandbox Breakout / Arbitrary Code Execution in value-censorship
|
All versions of `value-censorship` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to validate async function constructors allowing attackers to execute arbitrary code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:39:27Z
|
2020-09-02T21:25:58Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/888'}
| null |
npm
|
GHSA-c6h4-gc3f-hgjq
|
Prototype Pollution in js-data
|
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
|
{'CVE-2021-23574'}
|
2022-01-13T18:28:50Z
|
2022-01-06T21:58:56Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23574', 'https://github.com/js-data/js-data/issues/577', 'https://github.com/js-data/js-data/issues/576', 'https://snyk.io/vuln/SNYK-JS-JSDATA-1584361', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790', 'https://github.com/js-data/js-data', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791', 'https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472'}
| null |
npm
|
GHSA-f64g-whxf-w8f2
|
Malicious Package in buffar-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:56:59Z
|
2020-09-03T21:44:06Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1236'}
| null |
npm
|
GHSA-c2v2-7rcg-2ch7
|
Regular Expression Denial of Service in ansi2html
|
The `ansi2html` package is affected by a regular expression denial of service vulnerability when certain types of user input is passed in.
## Proof of concept
```
var ansi2html = require('ansi2html')
var start = process.hrtime();
ansi2html("[1111111111111111111111;0000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;00000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;000000000000000000000000");
console.log(process.hrtime(start));
start = process.hrtime();
ansi2html("[1111111111111111111111;0000000000000000000000000000");
console.log(process.hrtime(start));
```
Results of the above
```
00:29:53-adam_baldwin~/tmp$ node test
[ 0, 119615367 ]
[ 0, 149934565 ]
[ 0, 233325677 ]
[ 3, 46582479 ]
```
## Recommendation
At the time of this writing, February 2018, all versions of `ansi2html` remain vulnerable, and the package has not been updated for 4 years.
In order to use this package safely, it is necessary to avoid passing user input to the package, or to limit the size of the input string to a size with a parse time you find acceptable. Unfortunately, the match time grows at quite a small character count, so it is unlikely for it to both allow strings of a useful size while protecting against the denial of service attack.
In the case that user input of significant length must be parsed by ansi2html, the best mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.][available on npm](https://www.npmjs.com/search?q=ansi+html)
|
{'CVE-2015-9239'}
|
2021-01-14T15:58:08Z
|
2020-09-01T15:17:48Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/51', 'https://nodesecurity.io/advisories/51', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9239'}
| null |
npm
|
GHSA-8v3j-jfg3-v3fv
|
Prototype Pollution in Sails.js
|
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
|
{'CVE-2021-44908'}
|
2022-03-29T21:42:43Z
|
2022-03-18T00:01:11Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://github.com/balderdashy/sails/issues/7209', 'https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32', 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358', 'https://github.com/balderdashy/sails', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908', 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip'}
| null |
npm
|
GHSA-c9j3-wqph-5xx9
|
Command Injection in egg-scripts
|
Versions of `egg-scripts` before 2.8.1 are vulnerable to command injection. This is only exploitable if a malicious argument is provided on the command line.
Example:
`eggctl start --daemon --stderr='/tmp/eggctl_stderr.log; touch /tmp/malicious'`
## Recommendation
Update to version 2.8.1 or later.
|
{'CVE-2018-3786'}
|
2020-08-31T18:32:59Z
|
2018-09-17T20:43:34Z
|
LOW
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/694', 'https://hackerone.com/reports/388936', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3786', 'https://github.com/eggjs/egg-scripts/blob/2.8.1/History.md', 'https://github.com/advisories/GHSA-c9j3-wqph-5xx9', 'https://github.com/eggjs/egg-scripts/pull/26'}
| null |
npm
|
GHSA-94jq-q5v2-76wj
|
Improper certificate management in AWS IoT Device SDK v2
|
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.
|
{'CVE-2021-40828'}
|
2022-03-03T05:13:50.572827Z
|
2021-11-24T21:02:24Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40828', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
| null |
npm
|
GHSA-7p99-3798-f85c
|
URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
|
### Impact
Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route.
If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//google.com` will be redirected to `google.com` after login because the original url reported by the Express framework is not properly sanitised.
### Am I affected?
You are affected by this vulnerability if you are using the `requiresAuth` middleware on a catch all route or the default `authRequired` option and `express-openid-connect` version `<=2.7.1`.
### How to fix that?
Upgrade to version `>=2.7.2`
### Will this update impact my users?
The fix provided in the patch will not affect your users.
|
{'CVE-2022-24794'}
|
2022-03-31T22:44:47Z
|
2022-03-31T22:44:47Z
|
HIGH
| null |
{'CWE-601'}
|
{'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24794', 'https://github.com/auth0/express-openid-connect', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c'}
| null |
npm
|
GHSA-x9gm-qxhh-rf75
|
Malicious Package in cordova-plugin-china-picker
|
Version 1.0.910 of `cordova-plugin-china-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.910 of this module is found installed you will want to replace it with a version before or after 1.0.910. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T17:04:30Z
|
2020-09-01T19:51:28Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-x9gm-qxhh-rf75', 'https://snyk.io/vuln/SNYK-JS-CORDOVAPLUGINCHINAPICKER-451001', 'https://git.oschina.net/BlankTrack/ChinaPicker.git', 'https://www.npmjs.com/advisories/622'}
| null |
npm
|
GHSA-cmch-296j-wfvw
|
Arbitrary File Write in iobroker.js-controller
|
Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default.
## Recommendation
Upgrade to version 2.0.25 or later.
|
{'CVE-2019-10767'}
|
2021-08-19T15:11:15Z
|
2019-12-02T18:06:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda', 'https://www.npmjs.com/advisories/1419', 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}
| null |
npm
|
GHSA-x6gq-467r-hwcc
|
Malicious Package in soket.js
|
All versions of `soket.js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:35Z
|
2020-09-01T21:14:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/687'}
| null |
npm
|
GHSA-p6mr-pxg4-68hx
|
Symlink Arbitrary File Overwrite in bower
|
Versions of `bower` prior to 1.8.8 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `bower` does not verify that extracted symbolic links do not resolve to targets outside of the extraction root directory.
## Recommendation
Update to version 1.8.8 or later
|
{'CVE-2019-5484'}
|
2020-08-31T18:35:19Z
|
2019-09-17T23:21:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/487.json', 'https://hackerone.com/reports/473811', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction', 'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3', 'https://www.npmjs.com/advisories/776', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5484'}
| null |
npm
|
GHSA-58qp-5328-v7mh
|
Improper Input Validation and Loop with Unreachable Exit Condition ('Infinite Loop') in cumulative-distribution-function
|
### Impact
* Apps using this library on improper data may crash or go into an infinite-loop
* In the case of a nodejs server-app using this library to act on invalid non-numeric data, the nodejs server may crash. This may affect other users of this server and/or require the server to be rebooted for proper operation.
* In the case of a browser app using this library to act on invalid non-numeric data, that browser may crash or lock up.
A flaw enabling an infinite-loop was discovered in the code for evaluating the cumulative-distribution-function
of input data. Although the documentation explains that numeric data is required, some users may confuse an array
of strings like ["1","2","3","4","5"] for numeric data [1,2,3,4,5] when it is in fact string data. An infinite loop is possible when the
cumulative-distribution-function is evaluated for a given point when the input data is string data rather than type `number`.
This vulnerability enables an infinite-cpu-loop denial-of-service-attack on any app using npm:cumulative-distribution-function v1.0.3 or earlier if the attacker can supply malformed data to the library. The vulnerability could also manifest if a data source to
be analyzed changes data type from Arrays of number (proper) to Arrays of string (invalid, but undetected by earlier version of the library).
### Patches
Users should upgrade to at least v2.0.0, or the latest version.
Tests for several types of invalid data have been created, and version 2.0.0 has been tested to reject this invalid data by
throwing a `TypeError()` instead of processing it. Developers using this library may wish to adjust their app's code slightly to better tolerate or handle this TypeError. Apps performing proper numeric data validation before sending data to this library should be mostly unaffected by this patch.
### Workarounds
The vulnerability can be mitigated in older versions by ensuring that only finite numeric data of type `Array[number]` or `number` is passed to `cumulative-distribution-function` and its `f(x)` function, respectively.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the Github repository at https://github.com/DrPaulBrewer/cumulative-distribution-function
|
{'CVE-2021-29486'}
|
2021-04-30T17:36:06Z
|
2021-05-04T17:43:36Z
|
HIGH
| null |
{'CWE-835', 'CWE-20'}
|
{'https://github.com/DrPaulBrewer/cumulative-distribution-function/pull/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29486', 'https://www.npmjs.com/package/cumulative-distribution-function', 'https://github.com/DrPaulBrewer/cumulative-distribution-function/security/advisories/GHSA-58qp-5328-v7mh', 'https://github.com/DrPaulBrewer/cumulative-distribution-function/issues/7'}
| null |
npm
|
GHSA-qhm8-m2c4-9mw7
|
Downloads Resources over HTTP in qbs
|
Affected versions of `qbs` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `qbs`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10656'}
|
2021-01-08T01:58:31Z
|
2019-02-18T23:45:11Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-qhm8-m2c4-9mw7', 'https://nodesecurity.io/advisories/266', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10656', 'https://www.npmjs.com/advisories/266'}
| null |
npm
|
GHSA-cgqv-x5cx-xvqh
|
Arbitrary Code Injection in pouchdb
|
Affected versions of `pouchdb` do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server.
## Recommendation
Update to version 6.0.5 or later.
|
{'CVE-2016-10546'}
|
2020-08-31T18:12:18Z
|
2018-07-26T16:22:08Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/143', 'https://github.com/advisories/GHSA-cgqv-x5cx-xvqh', 'https://nodesecurity.io/advisories/143', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10546'}
| null |
npm
|
GHSA-ff6r-5jwm-8292
|
Regular Expression Denial of Service in no-case
|
Affected versions of `no-case` are vulnerable to a regular expression denial of service when parsing untrusted user input.
## Recommendation
Update to version 2.3.2 or later.
|
{'CVE-2017-16099'}
|
2020-08-31T18:26:35Z
|
2018-07-24T19:51:16Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/529', 'https://github.com/advisories/GHSA-ff6r-5jwm-8292', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16099', 'https://www.npmjs.com/advisories/529', 'https://github.com/blakeembrey/no-case/issues/17'}
| null |
npm
|
GHSA-grv5-w5vr-8h98
|
Path Traversal in droppy
|
This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server.
|
{'CVE-2020-7757'}
|
2021-04-20T19:42:45Z
|
2021-05-10T18:47:29Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/silverwind/droppy/blob/master/server/server.js%23L845', 'https://snyk.io/vuln/SNYK-JS-DROPPY-1023656', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7757'}
| null |
npm
|
GHSA-4r4m-hjwj-43p8
|
Insecure Defaults Allow MITM Over TLS in engine.io-client
|
Affected versions of `engine.io-client` do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks.
The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, such as undefined or null, certificate verification will be disabled.
## Recommendation
Update to version 1.6.9 or later.
If you are unable to upgrade, ensure all calls to socket.io to have a `rejectedUnauthorized: true` flag.
|
{'CVE-2016-10536'}
|
2020-08-31T18:10:49Z
|
2019-02-18T23:39:50Z
|
MODERATE
| null |
{'CWE-300'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10536', 'https://www.npmjs.com/advisories/99', 'https://nodesecurity.io/advisories/99', 'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800e2f7ff5c1', 'https://github.com/advisories/GHSA-4r4m-hjwj-43p8', 'https://www.cigital.com/blog/node-js-socket-io/'}
| null |
npm
|
GHSA-7jvx-f994-rfw2
|
materialize-css vulnerable to cross-site Scripting (XSS) due to improper escape of user input
|
All versions of package materialize-css are vulnerable to Cross-site Scripting (XSS) due to improper escape of user input (such as <not-a-tag />) that is being parsed as HTML/JavaScript, and inserted into the Document Object Model (DOM). This vulnerability can be exploited when the user-input is provided to the autocomplete component.
|
{'CVE-2022-25349'}
|
2022-05-03T21:09:12Z
|
2022-05-03T00:00:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498', 'https://github.com/Dogfalo/materialize', 'https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25349'}
| null |
npm
|
GHSA-fg47-3c2x-m2wr
|
TimelockController vulnerability in OpenZeppelin Contracts
|
### Impact
A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker.
### Patches
A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`:
- 4.3.1
- 3.4.2
- 3.4.2-solc-0.7
Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles.
### Workarounds
Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
### References
[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958).
### Credits
The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
{'CVE-2021-39167'}
|
2021-09-13T20:30:10Z
|
2021-08-30T16:12:38Z
|
CRITICAL
| null |
{'CWE-269'}
|
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr', 'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39167', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431'}
| null |
npm
|
GHSA-jf85-cpcp-j695
|
Prototype Pollution in lodash
|
Versions of `lodash` before 4.17.12 are vulnerable to Prototype Pollution. The function `defaultsDeep` allows a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.12 or later.
|
{'CVE-2019-10744'}
|
2021-08-17T17:55:46Z
|
2019-07-10T19:45:23Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/1065', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10744', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://github.com/lodash/lodash/pull/4336', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20191004-0005/', 'https://snyk.io/vuln/SNYK-JS-LODASH-450202'}
| null |
npm
|
GHSA-q5pq-pgrv-fh89
|
Critical severity vulnerability that affects dns-sync
|
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
|
{'CVE-2014-9682'}
|
2021-09-16T19:33:41Z
|
2017-10-24T18:33:36Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/skoranga/node-dns-sync/issues/1', 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'http://www.openwall.com/lists/oss-security/2014/11/11/6', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682', 'https://github.com/skoranga/node-dns-sync'}
| null |
npm
|
GHSA-5fm9-jmv7-fcx5
|
Malicious Package in asynnc
|
All versions of `asynnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:47:05Z
|
2020-09-02T18:35:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/842'}
| null |
npm
|
GHSA-87qw-7v97-w34r
|
Malicious Package in asinc
|
All versions of `asinc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:46:36Z
|
2020-09-02T18:33:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/840'}
| null |
npm
|
GHSA-46m8-42hm-wvvw
|
Cross-Site Scripting in emojione
|
Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions.
## Recommendation
Update to version 1.3.1 or later.
|
{'CVE-2016-1000231'}
|
2021-09-23T21:33:00Z
|
2020-09-01T15:34:16Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/Ranks/emojione/issues/61', 'https://github.com/Ranks/emojione/', 'https://www.npmjs.com/advisories/129', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000231'}
| null |
npm
|
GHSA-m852-866j-69j8
|
Malicious Package in eslint-config-airbnb-standard
|
Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| null |
2021-10-01T13:27:58Z
|
2020-09-01T20:47:01Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/675'}
| null |
npm
|
GHSA-wh87-3959-vfrq
|
Malicious Package in buffer-hor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:58:37Z
|
2020-09-03T21:51:58Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1242'}
| null |
npm
|
GHSA-62g9-6hw5-rwfp
|
Path Traversal in resolve-path
|
Versions of `resolve-path` before 1.4.0 are vulnerable to path traversal. `resolve-path` relative path resolving suffers from a lack of file path sanitization for windows based paths.
## Recommendation
Update to version 1.4.0 or later.
|
{'CVE-2018-3732'}
|
2020-08-31T18:28:19Z
|
2018-07-18T21:20:25Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/573', 'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0', 'https://hackerone.com/reports/315760', 'https://github.com/advisories/GHSA-62g9-6hw5-rwfp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3732'}
| null |
npm
|
GHSA-wvhm-4hhf-97x9
|
Cross-Site Scripting in Prism
|
### Impact
The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer.
This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0).
### Patches
This problem is patched in v1.21.0.
### Workarounds
To workaround the issue without upgrading, [disable the easing preview](https://prismjs.com/plugins/previewers/#disabling-a-previewer) on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround.
### References
The vulnerability was introduced by this [commit](https://github.com/PrismJS/prism/commit/4303c940d3d3a20e8ce7635bf23331c75060f5c5) on Sep 29, 2015 and fixed by [Masato Kinugawa](https://twitter.com/kinugawamasato) (#2506).
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/PrismJS/prism/issues).
|
{'CVE-2020-15138'}
|
2021-01-07T23:41:49Z
|
2020-08-07T22:28:30Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://prismjs.com/plugins/previewers/#disabling-a-previewer', 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c', 'https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138'}
| null |
npm
|
GHSA-pr34-8jfr-xhv8
|
Downloads Resources over HTTP in selenium-wrapper
|
Affected versions of `selenium-wrapper` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-wrapper`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10628'}
|
2021-01-08T18:20:00Z
|
2019-02-18T23:47:21Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/224', 'https://nodesecurity.io/advisories/224', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10628', 'https://github.com/advisories/GHSA-pr34-8jfr-xhv8'}
| null |
npm
|
GHSA-57f3-gghm-9mhc
|
Regular Expression Denial of Service (ReDoS)
|
This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.
|
{'CVE-2021-23353'}
|
2021-03-25T00:18:05Z
|
2021-03-12T21:28:46Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288', 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e', 'https://github.com/MrRio/jsPDF/pull/3091', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23353', 'https://snyk.io/vuln/SNYK-JS-JSPDF-1073626'}
| null |
npm
|
GHSA-hg78-c92r-hvwr
|
Denial of Service in mqtt
|
Affected versions of `mqtt` will cause the node process to crash when receiving specially crafted MQTT packets, making the application vulnerable to a denial of service condition.
## Recommendation
Update to v1.0.0 or later
|
{'CVE-2016-1000242'}
|
2021-09-23T21:37:37Z
|
2020-09-01T16:01:24Z
|
HIGH
| null |
{'CWE-248'}
|
{'https://snyk.io/vuln/npm:mqtt:20160817', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000242', 'https://github.com/mqttjs/MQTT.js', 'https://www.npmjs.com/advisories/140', 'https://github.com/mqttjs/MQTT.js/blob/388a084d7803934b18b43c1146c817deaa1396b1/lib/parse.js#L230'}
| null |
npm
|
GHSA-c78w-2gw7-gjv3
|
XSS in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in: the core parser and `media` plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic.
### Workarounds
The workarounds available are:
- disable the media plugin and manually sanitize CDATA content (see below)
or
- upgrade to either TinyMCE 4.9.10 or TinyMCE 5.2.2
#### Example: Manually strip CDATA elements
```js
setup: function(editor) {
editor.on('PreInit', function() {
editor.parser.addNodeFilter('#cdata', function(nodes) {
for (var i = 0; i < nodes.length; i++) {
nodes[i].remove();
}
});
});
}
```
### Acknowledgements
Tiny Technologies would like to thank Michał Bentkowski and [intivesec](https://github.com/intivesec) for discovering these vulnerabilities.
### References
https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
|
{'CVE-2019-1010091'}
|
2021-01-14T17:50:10Z
|
2020-05-11T20:00:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/issues/4394', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-c78w-2gw7-gjv3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010091'}
| null |
npm
|
GHSA-m8pw-hgvj-cwcm
|
Directory Traversal in sgqserve
|
Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16215'}
|
2020-08-31T18:22:25Z
|
2020-09-01T18:08:55Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve', 'https://www.npmjs.com/advisories/419', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215', 'https://nodesecurity.io/advisories/419'}
| null |
npm
|
GHSA-gjph-xf5q-6mfq
|
Denial of Service in @hapi/ammo
|
Versions of `@hapi/ammo` prior to 3.1.2 or 5.0.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 3.1.2 or 5.0.1.
| null |
2020-08-31T19:00:37Z
|
2020-09-03T15:46:02Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1474'}
| null |
npm
|
GHSA-wp7m-mrvf-599c
|
Command Injection in node-df
|
All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15597'}
|
2021-11-01T14:12:07Z
|
2020-02-14T23:09:10Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/adriano-di-giovanni/node-df', 'https://www.npmjs.com/advisories/1431', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15597', 'https://hackerone.com/reports/703412'}
| null |
npm
|
GHSA-x7m2-6g99-84w5
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
|
{'CVE-2020-7652'}
|
2021-08-25T21:46:46Z
|
2020-06-03T22:02:24Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7652', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://github.com/snyk/broker'}
| null |
npm
|
GHSA-w8hg-mxvh-9h57
|
Malicious Package in angular-bmap
|
Version 0.0.9 of `angular-bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.9 of this module is found installed you will want to replace it with a version before or after 0.0.9. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:49:19Z
|
2020-09-01T19:42:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/shenfw1987/angular-bmap', 'https://www.npmjs.com/advisories/614', 'https://snyk.io/vuln/SNYK-JS-ANGULARBMAP-451017'}
| null |
npm
|
GHSA-6898-wx94-8jq8
|
Potential Command Injection in libnotify
|
Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify.
Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this.
### Example
```
var libnotify = require('libnotify')
libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () {
console.log(arguments);
})
```
Special thanks to Neal Poole for submitting the pull request to fix this issue.
## Recommendation
Update to version 1.0.4 or greater
|
{'CVE-2013-7381'}
|
2021-09-23T20:55:29Z
|
2020-08-31T22:50:48Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify', 'https://github.com/mytrile/node-libnotify', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://www.npmjs.com/advisories/20', 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}
| null |
npm
|
GHSA-5w8q-x7hc-jhp6
|
Directory Traversal in node-simple-router
|
Affected versions of `node-simple-router` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to v0.10.1 or later.
|
{'CVE-2017-16083'}
|
2020-08-31T18:20:18Z
|
2018-07-24T19:42:39Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16083', 'https://nodesecurity.io/advisories/352', 'https://github.com/advisories/GHSA-5w8q-x7hc-jhp6', 'https://www.npmjs.com/advisories/352'}
| null |
npm
|
GHSA-wpgh-hmv4-r3v5
|
Prototype pollution in safe-obj
|
Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25928'}
|
2021-05-20T21:52:15Z
|
2021-06-21T17:18:20Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928', 'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}
| null |
npm
|
GHSA-w725-67p7-xv22
|
Command Injection in local-devices
|
Versions of `local-devices` prior to 3.0.0 are vulnerable to Command Injection. The package does not validate input on ip addresses and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 3.0.0 or later.
| null |
2021-09-28T17:35:44Z
|
2020-09-03T17:05:04Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1020', 'https://github.com/DylanPiercey/local-devices/pull/16', 'https://github.com/DylanPiercey/local-devices'}
| null |
npm
|
GHSA-89mq-4x47-5v83
|
Prototype Pollution in angular
|
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality.
|
{'CVE-2019-10768'}
|
2022-01-04T19:51:20Z
|
2019-11-20T15:29:43Z
|
HIGH
| null |
{'CWE-915', 'CWE-20'}
|
{'https://github.com/angular/angular.js', 'https://www.npmjs.com/advisories/1343', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768', 'https://github.com/angular/angular.js/pull/16913', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}
| null |
npm
|
GHSA-hmw2-mvvh-jf5j
|
OS Command Injection in enpeem
|
enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.
|
{'CVE-2019-10801'}
|
2021-04-08T22:25:20Z
|
2021-04-13T15:22:47Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10801', 'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007', 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}
| null |
npm
|
GHSA-hqw4-8893-j4h7
|
Directory Traversal in simple-npm-registry
|
Affected versions of `simple-npm-registry` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16132'}
|
2020-08-31T18:23:41Z
|
2018-07-23T20:49:28Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-hqw4-8893-j4h7', 'https://www.npmjs.com/advisories/452', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16132', 'https://nodesecurity.io/advisories/452'}
| null |
npm
|
GHSA-22h7-7wwg-qmgg
|
Prototype Pollution in @hapi/hoek
|
Versions of `@hapi/hoek` prior to 8.5.1 and 9.0.3 are vulnerable to Prototype Pollution. The `clone` function fails to prevent the modification of the Object prototype when passed specially-crafted input. Attackers may use this to change existing properties that exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
This issue __does not__ affect hapi applications since the framework protects against such malicious inputs. Applications that use `@hapi/hoek` outside of the hapi ecosystem may be vulnerable.
## Recommendation
Update to version 8.5.1, 9.0.3 or later.
| null |
2020-08-31T19:00:24Z
|
2020-09-04T17:56:39Z
|
LOW
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1468'}
| null |
npm
|
GHSA-4r9c-jghc-cx5m
|
Cross-site Scripting in apostrophe
|
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.
|
{'CVE-2021-25978'}
|
2021-11-08T21:26:37Z
|
2021-11-10T16:45:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59', 'https://github.com/apostrophecms/apostrophe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}
| null |
npm
|
GHSA-3v6h-hqm4-2rg6
|
Arbitrary File Write in adm-zip
|
Versions of `adm-zip` before 0.4.9 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example).
## Recommendation
Update to version 0.4.9 or later.
|
{'CVE-2018-1002204'}
|
2020-08-31T18:43:24Z
|
2018-07-27T17:07:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/cthackers/adm-zip/pull/212', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/cthackers/adm-zip/commit/62f64004fefb894c523a7143e8a88ebe6c84df25', 'https://snyk.io/research/zip-slip-vulnerability', 'https://www.npmjs.com/advisories/681', 'http://www.securityfocus.com/bid/107001', 'https://www.npmjs.com/advisories/994', 'https://hackerone.com/reports/362118', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002204', 'https://snyk.io/vuln/npm:adm-zip:20180415', 'https://github.com/advisories/GHSA-3v6h-hqm4-2rg6'}
| null |
npm
|
GHSA-mjjq-c88q-qhr6
|
Cross-Site Scripting in dompurify
|
Versions of `dompurify` prior to 2.0.7 are vulnerable to Cross-Site Scripting (XSS). It is possible to bypass the package sanitization through Mutation XSS, which may allow an attacker to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.0.7 or later.
| null |
2021-09-29T20:13:06Z
|
2020-09-03T21:22:00Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1223', 'https://github.com/cure53/DOMPurify', 'https://github.com/cure53/DOMPurify/releases/tag/2.0.7'}
| null |
npm
|
GHSA-4hq8-v42x-9wx3
|
Malicious Package in bs85check
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:56:40Z
|
2020-09-04T16:51:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1379'}
| null |
npm
|
GHSA-qmhf-qg6f-pc4v
|
Directory Traversal in fbr-client
|
Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16217'}
|
2020-08-31T18:23:35Z
|
2018-07-23T20:39:51Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v', 'https://www.npmjs.com/advisories/449', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217', 'https://nodesecurity.io/advisories/449'}
| null |
npm
|
GHSA-662x-fhqg-9p8v
|
Regular Expression Denial of Service in ua-parser-js
|
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
|
{'CVE-2020-7733'}
|
2021-05-03T19:19:25Z
|
2021-05-07T16:18:19Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666', 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7733'}
| null |
npm
|
GHSA-7hx8-2rxv-66xv
|
Denial of Service in hapi
|
All Versions of `hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
This package is deprecated and is now maintained as `@hapi/hapi`. Please update your dependencies to use `@hapi/hapi`.
| null |
2020-08-31T19:00:54Z
|
2020-09-03T15:48:00Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1481'}
| null |
npm
|
GHSA-9px9-f7jw-fwhj
|
Command Injection in priest-runner
|
All versions of `priest-runner` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to a `spawn` call, which may allow attackers to execute arbitrary code in the system. The `PriestController.prototype.createChild ` function is vulnerable since the `spawn` parameters come from a POST request body.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T19:01:15Z
|
2020-09-03T15:49:37Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1492'}
| null |
npm
|
GHSA-vvf2-ppj9-pp49
|
Inefficient Regular Expression Complexity in vuelidate
|
vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.
|
{'CVE-2021-3794'}
|
2022-05-04T03:24:54Z
|
2021-09-20T20:42:06Z
|
HIGH
| null |
{'CWE-400', 'CWE-697'}
|
{'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794', 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7', 'https://github.com/vuelidate/vuelidate'}
| null |
npm
|
GHSA-69r7-cw26-px6h
|
Downloads Resources over HTTP in google-closure-tools-latest
|
Affected versions of `google-closure-tools-latest` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `google-closure-tools-latest`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, and instead install the [closure compiler](https://github.com/google/closure-compiler) manually.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10677'}
|
2021-01-08T19:45:57Z
|
2019-02-18T23:42:14Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/274', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10677', 'https://github.com/advisories/GHSA-69r7-cw26-px6h', 'https://www.npmjs.com/advisories/274'}
| null |
npm
|
GHSA-49x3-8228-3w3m
|
Inefficient Regular Expression Complexity in code-server
|
code-server is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3810'}
|
2021-09-20T18:59:46Z
|
2021-09-20T20:18:39Z
|
HIGH
| null |
{'CWE-1333'}
|
{'https://github.com/cdr/code-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3810', 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5', 'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223'}
| null |
npm
|
GHSA-frxq-v7fm-m4pv
|
Malicious Package in requuest
|
All versions of `requuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:04:59Z
|
2020-09-02T20:27:53Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/859'}
| null |
npm
|
GHSA-qrmc-fj45-qfc2
|
Prototype Pollution in extend
|
Versions of `extend` prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The `extend()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
If you're using `extend` 3.x upgrade to 3.0.2 or later.
If you're using `extend` 2.x upgrade to 2.0.2 or later.
|
{'CVE-2018-16492'}
|
2020-08-31T18:43:30Z
|
2019-02-07T18:03:28Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://hackerone.com/reports/381185', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16492', 'https://github.com/advisories/GHSA-qrmc-fj45-qfc2', 'https://www.npmjs.com/advisories/996'}
| null |
npm
|
GHSA-7r8m-45gc-m2c8
|
Downloads Resources over HTTP in mongodb-instance
|
Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`.
## Recommendation
Update to version 0.0.3 or later.
|
{'CVE-2016-10572'}
|
2021-01-08T19:14:34Z
|
2019-02-18T23:52:14Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'}
| null |
npm
|
GHSA-8hq2-fcqm-39hq
|
Malicious Package in rimrafall
|
Version 1.0.0 of `rimrafall` contains malicious code as a preinstall script. The package attempts to remove all files in the system's root folder.
## Recommendation
If you installed this package it is likely your machine was erased. If not, remove the package from your system and verify if any files were deleted.
| null |
2021-09-30T21:57:22Z
|
2020-09-02T21:46:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/913'}
| null |
npm
|
GHSA-r3xc-47qg-h929
|
Cross-Site Scripting in @ionic/core
|
Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components:
- `<ion-alert>.message`
- `<ion-searchbar>.placeholder`
- `<ion-infinite-scroll-content>.loadingText`
- `<ion-refresher-content>.pullingText`
- `<ion-refresher-content>.refershingText`
## Recommendation
- If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later.
- If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later.
- If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later.
- If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later.
| null |
2021-09-28T17:38:45Z
|
2020-09-03T17:06:09Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1023', 'https://github.com/ionic-team/ionic/issues/18065', 'https://github.com/ionic-team/ionic'}
| null |
npm
|
GHSA-pj97-j597-ppm7
|
Malicious Package in rqeuest
|
All versions of `rqeuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T20:30:01Z
|
2020-09-02T21:15:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/870'}
| null |
npm
|
GHSA-vpf5-82c8-9v36
|
Prototype Pollution in algoliasearch-helper
|
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.
|
{'CVE-2021-23433'}
|
2021-11-24T19:00:33Z
|
2021-11-23T21:15:35Z
|
MODERATE
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://github.com/algolia/algoliasearch-helper-js'}
| null |
npm
|
GHSA-fmrr-mx6j-h3h5
|
Prototype Pollution in confucious
|
All versions of package confucious up to and including version 0.0.12 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7714'}
|
2021-05-05T18:50:23Z
|
2021-05-06T18:12:09Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7714'}
| null |
npm
|
GHSA-wfjh-3hq2-r276
|
Malicious Package in node-spdy
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:27:36Z
|
2020-09-03T19:56:48Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1138'}
| null |
npm
|
GHSA-377f-vvrc-9wgg
|
Malicious Package in zemen
|
Version 0.0.5 of `zemen` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T20:07:38Z
|
2020-09-03T19:09:07Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1101'}
| null |
npm
|
GHSA-vm5j-vqr6-v7v8
|
OS Command Injection in pixl-class
|
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
|
{'CVE-2020-7640'}
|
2021-05-25T20:40:19Z
|
2021-12-10T20:04:56Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
| null |
npm
|
GHSA-gfm8-g3vm-53jh
|
Malicious Package in leetlog
|
Versions 0.1.2 and 0.1.3 of `leetlog` contain malicious code. The package adds an arbitrary hardcoded SSH key identified as `hacker@evilmachine` to the system's `authorized_keys`
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T17:16:55Z
|
2020-09-03T17:21:19Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1041'}
| null |
npm
|
GHSA-q8xg-8xwf-m598
|
Machine-In-The-Middle in lix
|
All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-10800'}
|
2021-09-16T20:39:54Z
|
2020-04-16T03:14:59Z
|
HIGH
| null |
{'CWE-544', 'CWE-639'}
|
{'https://www.npmjs.com/advisories/1306', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800', 'https://github.com/lix-pm/lix.client'}
| null |
npm
|
GHSA-58v4-qwx5-7f59
|
SQL Injection in knex
|
knex.js versions before 0.19.5 are vulnerable to SQL Injection attack. Identifiers are escaped incorrectly as part of the MSSQL dialect, allowing attackers to craft a malicious query to the host DB.
|
{'CVE-2019-10757'}
|
2021-08-18T21:50:50Z
|
2019-10-21T16:12:13Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-JS-KNEX-471962', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10757'}
| null |
npm
|
GHSA-2h3h-q99f-3fhc
|
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.
This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies.
When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem.
For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed.
Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected.
### Patches
2.8.2 (included in npm v7.20.7 and above)
### Fix and Caveats
There are two parts to the fix:
1. Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.)
2. The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision.
This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems.
If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file.
|
{'CVE-2021-39134'}
|
2021-08-31T16:51:31Z
|
2021-08-31T16:04:03Z
|
MODERATE
| null |
{'CWE-61', 'CWE-59'}
|
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc', 'https://github.com/npm/arborist', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/@npmcli/arborist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39134'}
| null |
npm
|
GHSA-m7mf-vm62-7x3q
|
Insecure template handling in haml-coffee
|
haml-coffee is a JavaScript templating solution. haml-coffee mixes pure template data with engine configuration options through the Express render API. More specifically, haml-coffee supports overriding a series of HTML helper functions through its configuration options. A vulnerable application that passes user controlled request objects to the haml-coffee template engine may introduce RCE vulnerabilities. Additionally control over the escapeHtml parameter through template configuration pollution ensures that haml-coffee would not sanitize template inputs that may result in reflected Cross Site Scripting attacks against downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of haml-coffee is currently 1.14.1. For complete details refer to the referenced GHSL-2021-025.
|
{'CVE-2021-32818'}
|
2021-05-17T19:07:00Z
|
2021-05-17T20:58:21Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/', 'https://www.npmjs.com/package/haml-coffee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32818'}
| null |
npm
|
GHSA-q42p-pg8m-cqh6
|
Prototype Pollution in handlebars
|
Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
## Recommendation
For handlebars 4.1.x upgrade to 4.1.2 or later.
For handlebars 4.0.x upgrade to 4.0.14 or later.
| null |
2021-08-04T20:54:05Z
|
2019-06-05T14:07:48Z
|
HIGH
| null |
{'CWE-471'}
|
{'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://www.npmjs.com/advisories/755'}
| null |
npm
|
GHSA-6pq3-928q-x6w6
|
Prototype Pollution
|
All versions of `utils-extend` are vulnerable to prototype pollution. The `extend` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-8147'}
|
2021-06-07T22:49:29Z
|
2020-09-03T15:51:28Z
|
HIGH
| null |
{'CWE-471'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8147', 'https://www.npmjs.com/advisories/1502', 'https://hackerone.com/reports/801522'}
| null |
npm
|
GHSA-w32g-5hqp-gg6q
|
Cross-Site Scripting in mermaid
|
Versions of `mermaid` prior to 8.2.3 are vulnerable to Cross-Site Scripting. If malicious input such as `A["<img src=invalid onerror=alert('XSS')></img>"] ` is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding.
## Recommendation
Upgrade to version 8.2.3 or later
| null |
2021-09-27T13:34:07Z
|
2020-09-02T15:41:41Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/knsv/mermaid', 'https://github.com/knsv/mermaid/issues/847', 'https://www.npmjs.com/advisories/751'}
| null |
npm
|
GHSA-pc7q-c837-3wjq
|
Malicious Package in wallet-address-validtaor
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:56:21Z
|
2020-09-03T17:02:58Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1413'}
| null |
npm
|
GHSA-2vqv-hp3p-fmv8
|
Downloads Resources over HTTP in webdriver-launcher
|
Affected versions of `webdriver-launcher` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdriver-launcher`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2011.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10651'}
|
2021-01-08T20:06:08Z
|
2019-02-18T23:47:03Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-2vqv-hp3p-fmv8', 'https://www.npmjs.com/advisories/246', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10651', 'https://nodesecurity.io/advisories/246'}
| null |
npm
|
GHSA-9xv2-548x-5h79
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
|
{'CVE-2020-7648'}
|
2021-07-29T17:46:59Z
|
2020-06-03T22:02:19Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7648', 'https://updates.snyk.io/snyk-broker-security-fixes-152338'}
| null |
npm
|
GHSA-w4vp-3mq7-7v82
|
Cross-Site Scripting in lazysizes
|
Versions of `lazysizes` prior to 5.2.1-rc1 are vulnerable to Cross-Site Scripting. The `video-embed` plugin fails to sanitize the following attributes: data-vimeo, `data-vimeoparams`, `data-youtube` and `data-ytparams`. This allows attackers to execute arbitrary JavaScript in a victim's browser if the attacker has control over the vulnerable attributes.
## Recommendation
Upgrade to version 5.2.1-rc1 or later.
| null |
2020-08-31T19:01:17Z
|
2020-09-03T15:49:48Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/aFarkas/lazysizes/issues/764', 'https://www.npmjs.com/advisories/1493'}
| null |
npm
|
GHSA-g4xj-wcq6-qwx5
|
Code injection in mock2easy
|
This affects all versions up to and including version 0.0.24 of package mock2easy. a malicious user could inject commands through the _data variable: Affected Area require('../server/getJsonByCurl')(mock2easy, function (error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, '', _data.interfaceUrl, query, _data.cookie,_data.interfaceType);
|
{'CVE-2020-7697'}
|
2021-05-06T18:23:33Z
|
2021-05-06T18:25:58Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7697', 'https://www.npmjs.com/package/mock2easy', 'https://snyk.io/vuln/SNYK-JS-MOCK2EASY-572312'}
| null |
npm
|
GHSA-mpp5-2x55-49xw
|
XSS in svg2png (NPM package)
|
svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document.
|
{'CVE-2020-11887'}
|
2021-05-25T19:52:21Z
|
2022-01-06T19:45:13Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11887', 'https://github.com/domenic/svg2png/issues/117'}
| null |
npm
|
GHSA-jmqm-f2gx-4fjv
|
Sensitive information exposure through logs in npm-registry-fetch
|
Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
| null |
2021-09-22T19:00:07Z
|
2020-07-07T18:59:10Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}
| null |
npm
|
GHSA-w3w8-37jv-2c58
|
Cross-Site Scripting in mustache
|
Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 2.2.1 or later.
Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.
|
{'CVE-2015-8862'}
|
2021-09-20T22:34:08Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/62', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'https://www.npmjs.com/advisories/62', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/janl/mustache.js', 'http://www.securityfocus.com/bid/96436', 'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-pqpp-2363-649v
|
Cross-Site Scripting in buttle
|
All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:36:36Z
|
2020-09-02T18:22:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/404126', 'https://www.npmjs.com/advisories/810'}
| null |
npm
|
GHSA-8p9r-f949-699g
|
Path Traversal in browserless-chrome
|
This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
|
{'CVE-2020-7758'}
|
2021-04-20T22:41:52Z
|
2021-05-10T18:46:48Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://www.npmjs.com/package/browserless-chrome', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758'}
| null |
npm
|
GHSA-xqqr-p362-6rmc
|
Directory Traversal in hostr
|
Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests.
## Recommendation
Upgrade to version 2.3.6 or later.
|
{'CVE-2017-16029'}
|
2020-08-31T18:18:32Z
|
2018-11-09T17:44:20Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/303', 'https://github.com/henrytseng/hostr/issues/8)', 'https://www.npmjs.com/advisories/303', 'https://github.com/advisories/GHSA-xqqr-p362-6rmc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029', 'https://github.com/henrytseng/hostr/issues/8'}
| null |
npm
|
GHSA-6c8f-qphg-qjgp
|
Validation Bypass in kind-of
|
Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
## Recommendation
Upgrade to versions 6.0.3 or later.
|
{'CVE-2019-20149'}
|
2021-08-23T15:03:55Z
|
2020-03-31T15:59:54Z
|
HIGH
| null |
{'CWE-668'}
|
{'https://www.npmjs.com/advisories/1490', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'}
| null |
npm
|
GHSA-rqjw-p5vr-c695
|
Basic-auth app bundle credential exposure in gatsby-source-wordpress
|
### Impact
The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected.
Example affected gatsby-config.js:
```
resolve: 'gatsby-source-wordpress',
auth: {
htaccess: {
username: leaked_username
password: leaked_password,
},
},
```
### Patches
A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`.
### Workarounds
There is no known workaround at this time, other than manually editing the app.js file post-build.
### For more information
Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com)
|
{'CVE-2021-32770'}
|
2021-07-28T15:18:01Z
|
2021-07-19T15:21:41Z
|
HIGH
| null |
{'CWE-522', 'CWE-200'}
|
{'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32770'}
| null |
npm
|
GHSA-6f93-xj8r-jp82
|
Malicious Package in bunfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:36:55Z
|
2020-09-03T22:28:21Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1267'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.