ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-hhqj-cfjx-vj25
Cross site scripting in reveal.js
The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on victim's browser window hosting reveal.js
{'CVE-2022-0776'}
2022-03-10T16:00:14Z
2022-03-02T00:00:20Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2', 'https://github.com/hakimel/reveal.js', 'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'}
null
npm
GHSA-c35v-qwqg-87jc
Timing Attack in express-basic-auth
Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-08-04T20:58:12Z
2019-06-06T15:32:32Z
LOW
null
{'CWE-208'}
{'https://www.npmjs.com/advisories/827', 'https://github.com/LionC/express-basic-auth/pull/20', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345'}
null
npm
GHSA-x56p-c8cg-q435
Open Redirect in Next.js versions
### Impact - **Affected**: Users of Next.js between 9.5.0 and 9.5.3 - **Not affected**: Deployments on Vercel ([https://vercel.com](https://vercel.com)) are not affected - **Not affected**: Deployments using `next export` We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. ### Patches https://github.com/vercel/next.js/releases/tag/v9.5.4 ### References https://github.com/vercel/next.js/releases/tag/v9.5.4
{'CVE-2020-15242'}
2021-10-06T21:27:19Z
2020-10-08T19:28:07Z
MODERATE
null
{'CWE-601'}
{'https://github.com/vercel/next.js', 'https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15242', 'https://github.com/zeit/next.js/releases/tag/v9.5.4'}
null
npm
GHSA-qjfh-xc44-rm9x
Path Traversal in file-static-server
All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:43:54Z
2020-09-03T16:49:43Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/310671', 'https://www.npmjs.com/advisories/1008'}
null
npm
GHSA-6c3f-p5wp-34mh
OS Command Injection in async-git
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
{'CVE-2021-3190'}
2022-05-03T02:56:05Z
2021-01-29T18:14:00Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/omrilotan/async-git/pull/14', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git', 'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190'}
null
npm
GHSA-cwg9-c9cr-p5fq
Improper Neutralization of Input in Theia console
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
{'CVE-2021-28161'}
2021-03-26T23:20:56Z
2021-04-13T15:18:53Z
MODERATE
null
{'CWE-79'}
{'https://github.com/eclipse-theia/theia/issues/8794', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161'}
null
npm
GHSA-x3wr-v4wx-5qpc
Prototype Pollution
Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25948'}
2021-10-21T13:56:14Z
2021-06-21T17:14:01Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948', 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19', 'https://github.com/doowb/expand-hash'}
null
npm
GHSA-8796-gc9j-63rv
File upload local preview can run embedded scripts after user interaction
### Impact When uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file, but only after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. ### Patches This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5981, which is included in 3.21.0. ### Workarounds There are no known workarounds.
null
2021-10-05T16:31:48Z
2021-05-17T20:51:16Z
MODERATE
null
{'CWE-74'}
{'https://github.com/matrix-org/matrix-react-sdk', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}
null
npm
GHSA-m25q-fwg4-9v2p
Malicious Package in awesome_react_utility
Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T16:36:57Z
2020-09-01T19:47:07Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/618', 'https://github.com/kooinam/awesome_react_utility'}
null
npm
GHSA-qfh2-6f7q-gr86
Cross-Site Scripting in sexstatic
All versions of `sexstatic` are vulnerable to stored cross-site scripting (xss). This is exploitable if an attacker can control a filename that is served by `sexstatic`. ## Recommendation As there is no fix is currently available for this vulnerability it is our recommendation to not install or used this module at this time.
{'CVE-2018-3755'}
2021-01-08T18:15:58Z
2018-10-01T16:30:38Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-qfh2-6f7q-gr86', 'https://hackerone.com/reports/328210', 'https://www.npmjs.com/advisories/671', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3755'}
null
npm
GHSA-wx69-rvg3-x7fc
XSS via prototype pollution in NodeBB
### Impact A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43787'}
2021-12-01T15:07:01Z
2021-11-30T22:21:01Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc'}
null
npm
GHSA-rgfv-v3jh-7ffp
Prototype Pollution in deeps
All versions of package deeps up to and including version 1.4.5 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7716'}
2021-05-05T18:56:42Z
2021-05-06T18:11:52Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7716', 'https://snyk.io/vuln/SNYK-JS-DEEPS-598667'}
null
npm
GHSA-whcm-29f4-j4mx
Directory Traversal in zwserver
Affected versions of `zwserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16149'}
2020-08-31T18:20:46Z
2020-09-01T16:56:50Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/372', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16149', 'https://www.npmjs.com/advisories/372'}
null
npm
GHSA-w83x-fp72-p9qc
Command Injection in geojson2kml
All versions up to and including version 0.1.1 of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
{'CVE-2020-28429'}
2021-05-07T20:58:30Z
2021-05-10T15:59:33Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28429', 'https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412'}
null
npm
GHSA-4m3p-x2hp-2pgx
Malicious Package in bitcroe-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:44:10Z
2020-09-04T16:45:23Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1371'}
null
npm
GHSA-84p7-fh9c-6g8h
Prototype Pollution in mixme
### Impact When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content. ### Patches The problem was patch with a more agressive discovery of secured properties to filter out.
null
2021-09-16T21:30:18Z
2021-09-20T19:52:24Z
HIGH
null
{'CWE-1321'}
{'https://github.com/adaltas/node-mixme/issues/1', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/adaltas/node-mixme'}
null
npm
GHSA-8rxg-9g6f-vq9p
Malicious Package in another-date-range-picker
Version 4.1.48 of `another-date-range-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 4.1.48 of this module is found installed you will want to replace it with a version before or after 4.1.48. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T16:18:50Z
2020-09-01T19:46:01Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/617', 'https://github.com/bi-a/mydaterangepicker', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATERANGEPICKER-451011', 'https://github.com/kekeh/mydaterangepicker'}
null
npm
GHSA-756f-6j3f-48q9
Directory Traversal in calmquist.static-server
Affected versions of `calmquist.static-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16165'}
2020-08-31T18:21:48Z
2018-07-23T20:45:51Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server', 'https://nodesecurity.io/advisories/398', 'https://github.com/advisories/GHSA-756f-6j3f-48q9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16165', 'https://www.npmjs.com/advisories/398'}
null
npm
GHSA-94xh-2fmc-xf5j
command injection vulnerability
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite() ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
{'CVE-2020-7752'}
2021-10-08T21:15:35Z
2020-10-27T20:30:20Z
HIGH
null
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://github.com/sebhildebrandt/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909'}
null
npm
GHSA-xf64-2f9p-6pqq
Information Exposure in type-graphql
Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request. ## Recommendation Upgrade to version 0.17.6 or later.
null
2020-08-31T18:59:32Z
2020-09-04T17:24:08Z
LOW
null
{'CWE-209'}
{'https://github.com/MichalLytek/type-graphql/issues/489', 'https://www.npmjs.com/advisories/1444'}
null
npm
GHSA-7q9f-x6rm-qmxr
Command Injection in compass-compile
compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
{'CVE-2020-7635'}
2022-02-24T18:19:11Z
2021-12-09T19:27:46Z
CRITICAL
null
{'CWE-74'}
{'https://github.com/quaertym/compass-compile', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635', 'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25', 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}
null
npm
GHSA-f2rc-6xjq-95gq
Directory Traversal in shenliru
Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16161'}
2020-08-31T18:21:26Z
2020-09-01T17:24:57Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16161', 'https://nodesecurity.io/advisories/389', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru', 'https://www.npmjs.com/advisories/389'}
null
npm
GHSA-jh67-3wqw-cvhr
Malicious Package in js-sxa3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:35:02Z
2020-09-03T23:13:52Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1293'}
null
npm
GHSA-qj73-v688-wqxf
Hijacked Environment Variables in proxy.js
The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16076'}
2020-08-31T18:26:04Z
2018-08-29T23:19:13Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-qj73-v688-wqxf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076', 'https://nodesecurity.io/advisories/515', 'https://www.npmjs.com/advisories/515'}
null
npm
GHSA-pgmg-gf5p-54j8
Prototype Pollution in gammautils
"All versions of package gammautils up to and including version 0.0.81 are vulnerable to Prototype Pollution via the deepSet and deepMerge functions."
{'CVE-2020-7718'}
2021-05-05T18:05:47Z
2021-05-06T18:26:14Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7718'}
null
npm
GHSA-rjf2-j2r6-q8gr
Prototype Pollution in vm2
This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.
{'CVE-2021-23449'}
2021-10-19T14:18:05Z
2021-10-19T15:28:45Z
CRITICAL
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://security.netapp.com/advisory/ntap-20211029-0010/', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449', 'https://github.com/patriksimek/vm2'}
null
npm
GHSA-cpgr-wmr9-qxv4
Cross-Site Scripting in serve
Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation Upgrade to version 10.0.2 or later.
null
2020-08-31T18:43:20Z
2020-09-11T21:20:14Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/992', 'https://hackerone.com/reports/398285'}
null
npm
GHSA-3vg2-4qxc-ch4j
Directory Traversal in unicorn-list
Affected versions of `unicorn-list` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16131'}
2020-08-31T18:24:38Z
2018-07-23T20:49:38Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16131', 'https://github.com/advisories/GHSA-3vg2-4qxc-ch4j', 'https://www.npmjs.com/advisories/477', 'https://nodesecurity.io/advisories/477'}
null
npm
GHSA-m52x-29pq-w3vv
Cross-Site Scripting in pannellum
Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser. ## Recommendation Upgrade to version 2.5.6 or later.
{'CVE-2019-16763'}
2021-01-08T18:31:10Z
2019-11-22T18:18:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://www.npmjs.com/advisories/1418', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763'}
null
npm
GHSA-646x-m363-9rh4
Hijacked Environment Variables in node-opensl
The `node-opensl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16063'}
2020-08-31T18:25:36Z
2018-10-03T20:27:55Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/502', 'https://nodesecurity.io/advisories/502', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16063', 'https://github.com/advisories/GHSA-646x-m363-9rh4'}
null
npm
GHSA-gf8v-vxf9-7c66
Downloads Resources over HTTP in cloudpub-redis
Affected versions of `cloudpub-redis` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cloudpub-redis`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10672'}
2021-01-08T18:47:43Z
2019-02-18T23:44:26Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/282', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10672', 'https://nodesecurity.io/advisories/282', 'https://github.com/advisories/GHSA-gf8v-vxf9-7c66'}
null
npm
GHSA-2f29-pmpx-vj62
Directory Traversal in serverwg
`serverwg` is a simple http server. `serverwg` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` and response: ``` HTTP/1.1 200 OK Date: Wed, 17 May 2017 22:52:08 GMT Connection: keep-alive {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16101'}
2020-08-31T18:20:32Z
2020-09-01T16:52:33Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16101', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg', 'https://nodesecurity.io/advisories/364', 'https://www.npmjs.com/advisories/364'}
null
npm
GHSA-3rh7-vm4x-q2hp
Hijacked Environment Variables in sqlserver
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16055'}
2020-08-31T18:24:59Z
2018-11-09T17:49:22Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/486', 'https://nodesecurity.io/advisories/486', 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055'}
null
npm
GHSA-8j65-4pcq-xq95
Options structure open to XSS if passed unfiltered
### Impact In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. Especially when using the `useHTML` flag, HTML string options would be inserted unfiltered directly into the DOM. When `useHTML` was false, malicious code could be inserted by using various character replacement tricks or malformed HTML. If your chart configuration comes from a trusted source like a static setup or pre-filtered HTML (or no markup at all in the configuration), you are not impacted. ### Patches In version 9, the whole rendering layer was refactored to use an DOMParser, an AST and tag and HTML allow-listing to make sure only safe content entered the DOM. In addition, prototype pollution was stopped. ### Workarounds Implementers who are not able to upgrade may apply [DOMPurify](https://github.com/cure53/DOMPurify) recursively [to the options structure](https://jsfiddle.net/highcharts/zd3wcm5L/) to filter out malicious markup. ### References * Details on the improved [Highcharts security](https://www.highcharts.com/docs/chart-concepts/security) * [The AST and TextBuilder refactoring](https://github.com/highcharts/highcharts/pull/14913) * [The fix for prototype pollution](https://github.com/highcharts/highcharts/pull/14884) ### For more information If you have any questions or comments about this advisory: * Visit our [support page](https://www.highcharts.com/blog/support/) * For more Email us at [security@highcharts.com](mailto:security@highcharts.com)
{'CVE-2021-29489'}
2021-05-05T15:37:11Z
2021-05-06T15:45:03Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/package/highcharts', 'https://security.netapp.com/advisory/ntap-20210622-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29489', 'https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95'}
null
npm
GHSA-wg5r-c793-w5w2
Downloads Resources over HTTP in mystem-wrapper
Affected versions of `mystem-wrapper` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem-wrapper`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10671'}
2021-01-08T01:56:50Z
2019-02-18T23:44:28Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10671', 'https://www.npmjs.com/advisories/280', 'https://github.com/advisories/GHSA-wg5r-c793-w5w2', 'https://nodesecurity.io/advisories/280'}
null
npm
GHSA-3ww4-cp53-6g2x
Cross Site Request Forgery in kindeditor
Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:/examples/uploadbutton.html) and then use the authority of this website to trick users into clicking your malicious html link.
{'CVE-2021-42228'}
2021-10-21T14:56:51Z
2021-10-18T19:44:06Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42228', 'https://github.com/kindsoft/kindeditor', 'https://github.com/kindsoft/kindeditor/issues/337'}
null
npm
GHSA-vx3p-948g-6vhq
Regular Expression Denial of Service (ReDoS)
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
{'CVE-2021-27290'}
2021-10-21T17:38:11Z
2021-03-19T21:24:36Z
HIGH
null
{'CWE-400'}
{'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri', 'https://npmjs.com', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290', 'https://www.npmjs.com/package/ssri'}
null
npm
GHSA-j6x7-42x2-hpcf
Malicious Package in buffer-xoz
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:15:09Z
2020-09-03T22:14:20Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1253'}
null
npm
GHSA-4q2f-8g74-qm56
Cross-Site Scripting in takeapeek
All versions of `takeapeek` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:45:01Z
2020-09-03T17:18:05Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1038', 'https://hackerone.com/reports/490728'}
null
npm
GHSA-9mmw-3fmh-96g3
Malicious Package in calk
All versions of `calk` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:03:32Z
2020-09-02T20:23:38Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/855'}
null
npm
GHSA-43f8-2h32-f4cj
Regular Expression Denial of Service in hosted-git-info
The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity
{'CVE-2021-23362'}
2022-03-18T20:25:44Z
2021-05-06T16:10:39Z
MODERATE
null
{'CWE-400'}
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/pull/76', 'https://github.com/npm/hosted-git-info/commits/v2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://github.com/npm/hosted-git-info', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355'}
null
npm
GHSA-67mq-h2r9-rh2m
Prototype pollution in multi-ini
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
{'CVE-2020-28460'}
2021-04-07T23:23:09Z
2021-04-13T15:23:41Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}
null
npm
GHSA-mw6q-98mp-g8g8
Cross-site Scripting in bootstrap-table
This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
{'CVE-2021-23472'}
2021-11-04T17:00:48Z
2021-11-08T17:54:46Z
LOW
null
{'CWE-79', 'CWE-843'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687', 'https://github.com/wenzhixin/bootstrap-table', 'https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688', 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690', 'https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689'}
null
npm
GHSA-4whq-r978-2x68
Arbitrary code execution in ExifTool
### Impact Arbitrary code execution can occur when running `exiftool` against files with hostile metadata payloads. ### Patches ExifTool has already been patched in version 12.24. exiftool-vendored, which vendors ExifTool, includes this patch in v14.3.0. ### Workarounds No. ### References https://twitter.com/wcbowling/status/1385803927321415687 https://nvd.nist.gov/vuln/detail/CVE-2021-22204 ### For more information If you have any questions or comments about this advisory: * Open an issue in [exiftool-vendored](https://github.com/photostructure/exiftool-vendored.js)
null
2021-10-08T21:20:43Z
2021-05-04T17:43:52Z
HIGH
null
{'CWE-74'}
{'https://github.com/photostructure/exiftool-vendored.js/security/advisories/GHSA-4whq-r978-2x68', 'https://github.com/photostructure/exiftool-vendored.js'}
null
npm
GHSA-v6wh-2wvh-c8x5
Regular Expression Denial of Service in djvalidator
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, --@------------------------------------------------------------------------------------------------------------------------!.
{'CVE-2020-7779'}
2022-02-09T23:15:46Z
2022-02-09T23:15:46Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7779', 'https://snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709'}
null
npm
GHSA-5rrq-pxf6-6jx5
Prototype Pollution in node-forge debug API.
### Impact The `forge.debug` API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way. ### Patches The `forge.debug` API and related functions were removed in 1.0.0. ### Workarounds Don't use the `forge.debug` API directly or indirectly with untrusted input. ### References - https://www.huntr.dev/bounties/1-npm-node-forge/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge). * Email us at support@digitalbazaar.com.
null
2022-01-07T22:20:53Z
2022-01-08T00:22:42Z
LOW
null
{'CWE-1321'}
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5', 'https://github.com/digitalbazaar/forge'}
null
npm
GHSA-8v38-pw62-9cw2
Incorrect returned href via an '@' sign but no user info and hostname
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular, ````` parse(\"http://@/127.0.0.1\") ````` Will return: ````` { slashes: true, protocol: 'http:', hash: '', query: '', pathname: '/127.0.0.1', auth: '', host: '', port: '', hostname: '', password: '', username: '', origin: 'null', href: 'http:///127.0.0.1' } ````` If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
{'CVE-2022-0639'}
2022-03-11T22:48:39Z
2022-02-18T00:00:33Z
MODERATE
null
{'CWE-639'}
{'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639', 'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://github.com/unshiftio/url-parse'}
null
npm
GHSA-48hw-37g6-3gw4
Malicious Package in mx-nested-menu
Version 0.1.30 of `mx-nested-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:33Z
2020-09-03T02:35:41Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/947'}
null
npm
GHSA-7wpw-2hjm-89gp
Prototype Pollution in merge
All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge .
{'CVE-2020-28499'}
2021-05-04T20:20:28Z
2021-05-04T20:18:47Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4', 'https://snyk.io/vuln/SNYK-JS-MERGE-1042987'}
null
npm
GHSA-wjpc-cgvw-xx23
Prototype Pollution in sey
All versions of package `sey` are vulnerable to Prototype Pollution via the deepmerge() function.
{'CVE-2021-23663'}
2021-12-15T15:26:31Z
2021-12-16T14:29:34Z
MODERATE
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-SEY-1727592', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23663', 'https://github.com/eserozvataf/sey'}
null
npm
GHSA-pv55-r6j3-wp94
Malicious Package in eslint-config-eslint
Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
null
2020-08-31T18:32:17Z
2020-09-01T20:45:57Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/674'}
null
npm
GHSA-6956-83fg-5wc5
Prototype Pollution in set-in
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
{'CVE-2022-25354'}
2022-03-29T21:05:15Z
2022-03-18T00:01:11Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-SETIN-2388571', 'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5', 'https://github.com/ahdinosaur/set-in'}
null
npm
GHSA-p9f8-gqjf-m75j
Uncontrolled Resource Consumption in fastify-multipart
Prototype pollution vulnerability in `fastify-multipart` < 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request.
{'CVE-2020-8136'}
2021-05-26T20:05:47Z
2021-05-06T17:28:36Z
MODERATE
null
{'CWE-400'}
{'https://hackerone.com/reports/804772', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8136'}
null
npm
GHSA-3r9x-mjrm-2725
Prototype pollution vulnerability in 'libnested'
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28283'}
2021-10-08T22:09:39Z
2021-10-12T16:27:02Z
CRITICAL
null
null
{'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284', 'https://github.com/dominictarr/libnested', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283'}
null
npm
GHSA-cxmj-qjv6-vx9p
Low severity vulnerability that affects mcstatic
A server directory traversal vulnerability was found on node module mcstatic <=0.0.20 that would allow an attack to access sensitive information in the file system by appending slashes in the URL path.
{'CVE-2018-16482'}
2020-06-16T21:33:14Z
2019-02-07T18:15:44Z
LOW
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-cxmj-qjv6-vx9p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16482', 'https://hackerone.com/reports/330285'}
null
npm
GHSA-wgfq-7857-4jcc
Uncontrolled Resource Consumption in json-bigint
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
{'CVE-2020-8237'}
2021-04-28T16:57:11Z
2021-05-07T16:47:19Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8237', 'https://hackerone.com/reports/916430'}
null
npm
GHSA-qx2f-477c-35rq
Regular Expression Denial of Service in method-override
Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header. ## Recommendation Update to version 2.3.10 or later
{'CVE-2017-16136'}
2020-08-31T18:26:56Z
2018-07-24T20:06:04Z
HIGH
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-qx2f-477c-35rq', 'https://nodesecurity.io/advisories/538', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16136', 'https://www.npmjs.com/advisories/538'}
null
npm
GHSA-hwh3-fhf6-73x9
Malicious Package in bictoinjs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:38:19Z
2020-09-04T15:36:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1356'}
null
npm
GHSA-4xcv-9jjx-gfj3
Denial of Service in mem
Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging. ## Recommendation Upgrade to version 4.0.0 or later.
null
2021-08-17T15:44:45Z
2019-07-05T21:07:58Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/npm:mem:20180117', 'https://www.npmjs.com/advisories/1084', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
null
npm
GHSA-8gc6-65mm-xr6r
Malicious Package in bp66
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:44:26Z
2020-09-04T16:46:28Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1372'}
null
npm
GHSA-rc4q-9m69-gqp8
Lack of protection against cookie tossing attacks in fastify-csrf
### Impact Users that used fastify-csrf with the "double submit" mechanism using cookies with an application deployed across multiple subdomains, e.g. "heroku"-style platform as a service. ### Patches Version 3.1.0 of the fastify-csrf fixes it. See https://github.com/fastify/fastify-csrf/pull/51 and https://github.com/fastify/csrf/pull/2. The user of the module would need to supply a `userInfo` when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains. ### Workarounds None available. ### References 1. https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html 2. https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf ### Credits This vulnerability was found by Xhelal Likaj <xhelallikaj20@gmail.com>. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-csrf](https://github.com/fastify/fastify-csrf) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-29624'}
2021-05-17T20:29:48Z
2021-05-17T20:53:30Z
MODERATE
null
{'CWE-352', 'CWE-565'}
{'https://github.com/fastify/fastify-csrf/releases/tag/v3.1.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29624', 'https://github.com/fastify/csrf/pull/2', 'https://github.com/fastify/fastify-csrf/security/advisories/GHSA-rc4q-9m69-gqp8', 'https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf', 'https://github.com/fastify/fastify-csrf/pull/51', 'https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html'}
null
npm
GHSA-f7ph-p5rv-phw2
Cross-Site Scripting in nunjucks
Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability. ## Proof of Concept By using an array for the keys in a template var, escaping is bypassed. ```javascript name[]=<script>alert(1)</script> ``` A full PoC is available in the references section. ## Recommendation Update to version 2.4.3 or later.
{'CVE-2016-10547'}
2020-08-31T18:12:27Z
2018-11-06T23:13:37Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/147', 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2', 'https://github.com/matt-/nunjucks_test', 'https://github.com/mozilla/nunjucks/issues/835', 'https://nodesecurity.io/advisories/147', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547'}
null
npm
GHSA-6vwx-mwp8-fh44
Cross-site Scripting in reveal.js
Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.
{'CVE-2020-8127'}
2021-04-20T22:02:07Z
2021-05-10T18:47:10Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/691977', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8127'}
null
npm
GHSA-qg8p-v9q4-gh34
Potential Command Injection in shell-quote
Affected versions of `shell-quote` do not properly escape command line arguments, which may result in command injection if the library is used to escape user input destined for use as command line arguments. ## Proof of Concept: The following characters are not escaped properly: `>`,`;`,`{`,`}` Bash has a neat but not well known feature known as "Bash Brace Expansion", wherein a sub-command can be executed without spaces by running it between a set of `{}` and using the `,` instead of ` ` to seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible. ``` const quote = require('shell-quote').quote; console.log(quote(['a;{echo,test,123,234}'])); // Actual "a;{echo,test,123,234}" // Expected "a\;\{echo,test,123,234\}" // Functional Equivalent "a; echo 'test' '123' '1234'" ``` ## Recommendation Update to version 1.6.1 or later.
{'CVE-2016-10541'}
2020-08-31T18:11:23Z
2019-02-18T23:58:29Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10541', 'https://www.npmjs.com/advisories/117', 'https://github.com/advisories/GHSA-qg8p-v9q4-gh34', 'https://nodesecurity.io/advisories/117'}
null
npm
GHSA-5327-gfq5-8f4m
Malicious Package in buffer-xmr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:17Z
2020-09-03T21:56:23Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1246'}
null
npm
GHSA-27gm-ghr9-4v95
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in: the core parser, `paste` and `visualchars` plugins. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.6 or lower and TinyMCE 5.1.3 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.7 and 5.1.4 by improved parser logic and HTML sanitization. ### Workarounds The workarounds available are: - disable the impacted plugins - manually sanitize the content using the `BeforeSetContent` event (see below) - upgrade to either TinyMCE 4.9.7 or TinyMCE 5.1.4 #### Example: Manually sanitize content ```js editor.on('BeforeSetContent', function(e) { var sanitizedContent = ...; // Manually sanitize content here e.content = sanitizedContent; }); ``` ### Acknowledgements Tiny Technologies would like to thank Michał Bentkowski for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2021-10-08T21:26:37Z
2020-01-30T21:22:15Z
HIGH
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}
null
npm
GHSA-cr56-66mx-293v
Cross-Site Scripting in @toast-ui/editor
Versions of `@toast-ui/editor` prior to 2.2.0 are vulnerable to Cross-Site Scripting (XSS). There are multiple bypasses to the package's built-in XSS sanitization. This may allow attackers to execute arbitrary JavaScript on a victim's browser. ## Recommendation Upgrade to version 2.2.0 or later.
null
2021-10-04T21:12:14Z
2020-09-03T15:53:50Z
HIGH
null
{'CWE-79'}
{'https://github.com/nhn/tui.editor', 'https://www.npmjs.com/advisories/1521', 'https://github.com/nhn/tui.editor/pull/1010', 'https://github.com/nhn/tui.editor/issues/733'}
null
npm
GHSA-333x-9vgq-v2j4
Directory Traversal in geddy
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors. ### Proof of Concept ``` http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd ``` ## Recommendation Update geddy to version >= 13.0.8
{'CVE-2015-5688'}
2021-08-31T20:33:50Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-22'}
{'https://github.com/geddy/geddy/issues/697', 'https://www.npmjs.com/advisories/10', 'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/geddy/releases/tag/v13.0.8', 'https://github.com/geddy/geddy', 'https://github.com/geddy/geddy/pull/699', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688'}
null
npm
GHSA-32x6-qvw6-mxj4
Forwarding of confidentials headers to third parties in fluture-node
### Impact Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing. ### Patches The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin. ### Workarounds Use a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2. ### References - This vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/ - Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
{'CVE-2022-24719'}
2022-03-15T18:05:24Z
2022-03-01T22:14:57Z
LOW
null
{'CWE-359', 'CWE-601', 'CWE-200'}
{'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/psf/requests/pull/4718', 'https://github.com/fluture-js/fluture-node', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719'}
null
npm
GHSA-6chw-6frg-f759
Regular Expression Denial of Service in Acorn
Affected versions of acorn are vulnerable to Regular Expression Denial of Service. A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop. The string is not valid UTF16 which usually results in it being sanitized before reaching the parser. If an application processes untrusted input and passes it directly to acorn, attackers may leverage the vulnerability leading to Denial of Service.
null
2021-08-23T15:10:32Z
2020-04-03T21:48:38Z
HIGH
null
{'CWE-400'}
{'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929', 'https://www.npmjs.com/advisories/1488', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469'}
null
npm
GHSA-8xwg-wv7v-4vqp
Code Execution by Re-enabling Node.js integration in electron
Versions of electron A vulnerability has been discovered which allows Node.js integration to be re-enabled in some Electron applications that disable it. For the application to be impacted by this vulnerability it must meet all of these conditions - Runs on Electron 1.7, 1.8, or a 2.0.0-beta - Allows execution of arbitrary remote code - Disables Node.js integration - Does not explicitly declare webviewTag: false in its webPreferences - Does not enable the nativeWindowOption option - Does not intercept new-window events and manually override event.newGuest without using the supplied options tag ## Recommendation Update to `electron` version 1.7.13, 1.8.4, or 2.0.0.beta.5 or later If you are unable to update your Electron version can mitigate the vulnerability with the following code. ``` app.on('web-contents-created', (event, win) => { win.on('new-window', (event, newURL, frameName, disposition, options, additionalFeatures) => { if (!options.webPreferences) options.webPreferences = {}; options.webPreferences.nodeIntegration = false; options.webPreferences.nodeIntegrationInWorker = false; options.webPreferences.webviewTag = false; delete options.webPreferences.preload; }) }) // and *IF* you don't use WebViews at all, // you might also want app.on('web-contents-created', (event, win) => { win.on('will-attach-webview', (event, webPreferences, params) => { event.preventDefault(); }) }) ```
{'CVE-2018-1000136'}
2021-06-11T15:17:23Z
2018-03-26T16:41:17Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-8xwg-wv7v-4vqp', 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/', 'https://www.npmjs.com/advisories/574', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000136', 'https://www.electronjs.org/blog/webview-fix', 'https://electronjs.org/blog/webview-fix'}
null
npm
GHSA-3qh4-r86r-grvm
Arbitrary JavaScript Execution in typed-function
Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code. ## Recommendation Upgrade to version 0.10.6 or later.
{'CVE-2017-1001004'}
2020-08-31T18:36:57Z
2020-09-02T18:24:39Z
HIGH
null
{'CWE-94'}
{'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004', 'https://www.npmjs.com/advisories/819', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106', 'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139'}
null
npm
GHSA-9r3m-mhfm-39cm
Incorrect Calculation in bigint-money
Versions of `bigint-money` prior to 0.6.2 are vulnerable to an Incorrect Calculation. The package incorrectly rounded certain numbers, which could have drastic consequences due to its usage in financial systems. ## Recommendation Upgrade to version 0.6.2 or later.
null
2020-08-31T18:42:08Z
2020-09-11T21:10:29Z
LOW
null
{'CWE-682'}
{'https://www.npmjs.com/advisories/962'}
null
npm
GHSA-33rv-m2gp-mm2r
Prototype pollution in safe-flat
Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25927'}
2021-05-20T21:34:56Z
2021-06-21T17:18:29Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927', 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'}
null
npm
GHSA-6226-h7ff-ch6c
Widget feature vulnerability allowing to execute JavaScript code using undo functionality
### Affected packages The vulnerability has been discovered in [Widget](https://ckeditor.com/cke4/addon/clipboard) plugin if used alongside [Undo](https://ckeditor.com/cke4/addon/undo) feature. ### Impact A potential vulnerability has been discovered in CKEditor 4 [Widget](https://ckeditor.com/cke4/addon/widget) package. The vulnerability allowed to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version >= 4.13.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.16.2. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
{'CVE-2021-32808'}
2022-02-08T21:01:57Z
2021-08-23T19:40:48Z
HIGH
null
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32808', 'https://github.com/ckeditor/ckeditor4/releases/tag/4.16.2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-8jf2-cq6v-w234
Malicious Package in uglyfi.js
Version 0.17.3 of `uglyfi.js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:47:08Z
2020-09-03T21:10:53Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1202'}
null
npm
GHSA-hhfg-6hfc-rvxm
Regular Expression Denial of Service in jsoneditor
JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex.
{'CVE-2021-3822'}
2022-05-04T03:39:38Z
2021-09-29T17:15:55Z
MODERATE
null
{'CWE-400', 'CWE-697', 'CWE-1333'}
{'https://github.com/josdejong/jsoneditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822', 'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73', 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'}
null
npm
GHSA-hvgc-mggg-pxr2
Malicious Package in js-sha7
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:12:40Z
2020-09-03T23:02:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1284'}
null
npm
GHSA-gjwp-7v3g-99pj
Cross-site Request Forgery (CSRF) in joplin
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
{'CVE-2021-23431'}
2021-08-25T18:00:40Z
2021-09-02T17:09:05Z
MODERATE
null
{'CWE-352'}
{'https://github.com/laurent22/joplin', 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23431', 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'}
null
npm
GHSA-4xg9-g7qj-jhg4
Malicious Package in comander
All versions of `comander` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-29T20:33:40Z
2020-09-03T20:46:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1193'}
null
npm
GHSA-4r62-v4vq-hr96
Regular Expression Denial of Service (REDoS) in Marked
### Impact _What kind of vulnerability is it? Who is impacted?_ [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) A Denial of Service attack can affect anyone who runs user generated code through `marked`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ patched in v2.0.0 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ None. ### References _Are there any links users can visit to find out more?_ https://github.com/markedjs/marked/issues/1927 https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked/issues)
{'CVE-2021-21306'}
2021-02-08T21:17:26Z
2021-02-08T21:17:58Z
MODERATE
null
{'CWE-400'}
{'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306', 'https://github.com/markedjs/marked/pull/1864', 'https://www.npmjs.com/package/marked', 'https://github.com/markedjs/marked/issues/1927', 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96'}
null
npm
GHSA-4p55-xj37-fx7g
Improper Authorization in Strapi
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
{'CVE-2020-27665'}
2020-10-29T16:25:47Z
2020-10-29T18:29:31Z
MODERATE
null
{'CWE-276'}
{'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://github.com/strapi/strapi/pull/8439', 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616', 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27665'}
null
npm
GHSA-28xh-wpgr-7fm8
Command Injection in open
Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in. The package does come with the following warning in the readme: ``` The same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell. ``` ## Recommendation `open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.
null
2020-08-31T18:31:51Z
2019-06-20T15:35:49Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/pwnall/node-open/issues/69', 'https://www.npmjs.com/advisories/663', 'https://github.com/pwnall/node-open/issues/68', 'https://nodesecurity.io/advisories/663', 'https://hackerone.com/reports/319473'}
null
npm
GHSA-fvq6-55gv-jx9f
SQL Injection in mysql
Versions of `mysql` prior to 2.0.0-alpha8 are affected by a SQL Injection vulnerability in the `mysql.escape()` function, which does not properly escape object keys. ## Recommendation Update to version 2.0.0-alpha8 or later.
{'CVE-2015-9244'}
2020-08-31T18:09:53Z
2020-09-01T15:21:05Z
MODERATE
null
{'CWE-89'}
{'https://nodesecurity.io/advisories/66', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9244', 'https://www.npmjs.com/advisories/66', 'https://github.com/felixge/node-mysql/issues/342'}
null
npm
GHSA-6c3j-c64m-qhgq
XSS in jQuery as used in Drupal, Backdrop CMS, and other products
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
{'CVE-2019-11358'}
2022-02-08T22:08:08Z
2019-04-26T16:29:11Z
MODERATE
null
{'CWE-79', 'CWE-1321'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://www.tenable.com/security/tns-2019-08', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11358', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html', 'https://backdropcms.org/security/backdrop-sa-core-2019-009', 'https://github.com/jquery/jquery/pull/4333', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/', 'https://www.debian.org/security/2019/dsa-4434', 'https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E', 'https://www.drupal.org/sa-core-2019-006', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://github.com/jquery/jquery', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190919-0001/', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/', 'http://www.securityfocus.com/bid/108023', 'https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/', 'https://access.redhat.com/errata/RHSA-2019:2587', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/', 'https://seclists.org/bugtraq/2019/Apr/32', 'https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://seclists.org/bugtraq/2019/Jun/12', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://www.tenable.com/security/tns-2020-02', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.debian.org/security/2019/dsa-4460', 'https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://snyk.io/vuln/SNYK-JS-JQUERY-174006', 'https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/', 'https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/', 'https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456'}
null
npm
GHSA-x5ph-4fr4-g7fw
Downloads Resources over HTTP in galenframework-cli
Affected versions of `galenframework-cli` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `galenframework-cli`. ## Recommendation Update to version 2.3.1 or later.
{'CVE-2016-10560'}
2021-01-08T00:47:45Z
2019-02-18T23:54:21Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/170', 'https://nodesecurity.io/advisories/170', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10560', 'https://github.com/advisories/GHSA-x5ph-4fr4-g7fw'}
null
npm
GHSA-x3w4-mrmv-cw2x
Malicious Package in buffev-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:19Z
2020-09-03T22:19:44Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1258'}
null
npm
GHSA-2v5f-23xc-v9qr
Cross-site scripting
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
{'CVE-2021-3377'}
2021-03-11T22:49:55Z
2021-03-11T22:50:39Z
MODERATE
null
{'CWE-79'}
{'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27', 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377'}
null
npm
GHSA-cqr7-78pj-3g7j
File Descriptor Leak Can Cause DoS Vulnerability in hapi
Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak. When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No other side effects or exploits have been identified. ## Recommendation - Please upgrade to version 2.2.x or above as soon as possible.
{'CVE-2014-3742'}
2021-09-09T20:31:02Z
2017-10-24T18:33:36Z
HIGH
null
null
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/hapi_File_descriptor_leak_DoS_vulnerability', 'https://www.npmjs.com/advisories/11', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://github.com/spumko/hapi/issues/1427', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742', 'https://github.com/spumko/hapi', 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j'}
null
npm
GHSA-xc6g-ggrc-qq4r
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`. ## Proof of Concept ``` var sanitizeHtml = require('sanitize-html'); var dirty = '!<textarea>&lt;/textarea&gt;<svg/onload=prompt`xs`&gt;</textarea>!'; var clean = sanitizeHtml(dirty, { allowedTags: [ 'textarea' ] }); console.log(clean); // !<textarea></textarea><svg/onload=prompt`xs`></textarea>! ``` ## Recommendation Update to version 1.11.4 or later.
{'CVE-2017-16016'}
2020-08-31T18:12:43Z
2018-11-09T17:47:23Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/154', 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r', 'https://github.com/punkave/sanitize-html/issues/100', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://nodesecurity.io/advisories/154', 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'}
null
npm
GHSA-5mhv-9qw8-j63g
Hijacked Environment Variables in mssql.js
The `mssql.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16056'}
2020-08-31T18:24:57Z
2018-11-09T17:43:03Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16056', 'https://www.npmjs.com/advisories/485', 'https://github.com/advisories/GHSA-5mhv-9qw8-j63g', 'https://nodesecurity.io/advisories/485'}
null
npm
GHSA-wj6h-7chw-x4h2
Command injection in get-git-data
get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.
{'CVE-2020-7619'}
2021-07-28T21:53:39Z
2021-05-10T15:59:14Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7619', 'https://github.com/chardos/get-git-data/blob/master/index.js#L7,', 'https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222'}
null
npm
GHSA-gh78-48h3-frjq
Improper exception handling in Aedes
An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.
{'CVE-2020-13410'}
2021-05-05T20:02:28Z
2021-05-06T18:10:46Z
HIGH
null
{'CWE-755'}
{'https://payatu.com/advisory/dos-in-aedes-mqtt-broker', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13410', 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b', 'https://github.com/moscajs/aedes/pull/493'}
null
npm
GHSA-4v9q-hm2p-68c4
Spoofing attack due to unvalidated KDC in node-krb5
Affected versions of `node-krb5` do not validate the KDC prior to authenticating, which might allow an attacker with network access and enough time to spoof the KDC and impersonate a valid user without knowing their credentials. ## Recommendation It appears that this will remain unfixed indefinitely, as the Github issue for this vulnerability has been open since 2015, with no work on it since then. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=kerberos).
{'CVE-2016-1000238'}
2021-09-23T21:35:22Z
2020-09-01T15:57:01Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000238', 'https://www.npmjs.com/advisories/136', 'https://github.com/qesuto/node-krb5/issues/13', 'https://github.com/qesuto/node-krb5', 'http://archive.hack.lu/2010/Bouillon-Stealing-credentials-for-impersonation.pdf'}
null
npm
GHSA-8j8c-7jfh-h6hx
Code Injection in js-yaml
Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected. An example payload is `{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1` which returns the object { "1553107949161": 1 } ## Recommendation Upgrade to version 3.13.1.
null
2020-08-31T18:36:43Z
2019-06-04T20:14:07Z
HIGH
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/813', 'https://github.com/nodeca/js-yaml/pull/480'}
null
npm
GHSA-g4m3-rpxr-h7vg
Malicious Package in mogodb-core
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:26:34Z
2020-09-03T19:52:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1134'}
null
npm
GHSA-4j59-hfw6-6w7h
Downloads Resources over HTTP in cmake
Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10642'}
2021-09-16T20:54:42Z
2018-08-15T19:30:48Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nodesecurity.io/advisories/233', 'https://www.npmjs.com/advisories/233', 'https://github.com/advisories/GHSA-4j59-hfw6-6w7h', 'https://github.com/stanley-gu/cmake', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10642'}
null
npm
GHSA-q4h8-7qff-gh6c
Server-side request forgery in Ghost CMS
Server-side request forgery (SSRF) vulnerability in Ghost CMS < 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.
{'CVE-2020-8134'}
2021-05-04T22:08:54Z
2021-05-06T18:28:08Z
MODERATE
null
{'CWE-918'}
{'https://hackerone.com/reports/793704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8134'}
null
npm
GHSA-4rgj-8mq3-hggj
Denial of Service in @hapi/subtext
Versions of `@hapi/subtext` prior to 6.1.2 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation Upgrade to version 6.1.2 or later.
null
2020-08-31T18:49:38Z
2020-09-03T20:32:11Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1165', 'https://github.com/hapijs/subtext/issues/72'}
null
npm
GHSA-m7rg-8wvq-846v
Prototype pollution
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25947'}
2021-06-14T21:47:44Z
2021-06-07T21:49:14Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947', 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'}
null