ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-chh2-rvhg-wqwr
|
Malicious Package in json-serializer
|
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:50:40Z
|
2020-09-03T21:02:10Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1194'}
| null |
npm
|
GHSA-j9q7-3rhf-4ppv
|
Downloads Resources over HTTP in windows-selenium-chromedriver
|
Affected versions of `windows-selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-selenium-chromedriver`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10687'}
|
2021-01-14T15:57:21Z
|
2020-09-01T16:11:08Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/285', 'https://www.npmjs.com/advisories/285', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10687'}
| null |
npm
|
GHSA-9wjh-jr2j-6r4x
|
Remote Code Execution in pi_video_recording
|
All versions of `pi_video_recording` are vulnerable to Remote Code Execution. Due to insufficient input validation the server executes arbitrary code through the /api/record/start endpoint. After running the server, `curl -POST -H "Content-Type: application/json" -d '{"filename": " || touch /tmp/worked;"}' http://localhost:5000/api/record/start`creates a file in the /tmp/ directory
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:35:14Z
|
2020-09-02T15:55:58Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/773'}
| null |
npm
|
GHSA-h2r4-4xgf-3865
|
Downloads Resources over HTTP in product-monitor
|
Affected versions of `product-monitor` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `product-monitor`.
## Recommendation
Update to versions 2.2.5 or later.
|
{'CVE-2016-10567'}
|
2021-01-08T18:44:26Z
|
2019-02-18T23:35:32Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/171', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10567', 'https://nodesecurity.io/advisories/171', 'https://github.com/advisories/GHSA-h2r4-4xgf-3865'}
| null |
npm
|
GHSA-c53x-wwx2-pg96
|
Cross-Site Scripting in @berslucas/liljs
|
Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
Upgrade to version 1.0.2 or later.
| null |
2021-09-28T17:27:43Z
|
2020-09-03T17:03:58Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2', 'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
| null |
npm
|
GHSA-pm52-wwrw-c282
|
Command Injection in wiki-plugin-datalog
|
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system.
## Recommendation
Upgrade to version 0.1.6 or later.
| null |
2021-08-16T14:32:10Z
|
2019-06-13T18:59:06Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926'}
| null |
npm
|
GHSA-wm7q-rxch-43mx
|
Byass due to validation before canonicalization in serve
|
Versions of `serve` before 6.5.2 are vulnerable to the bypass of the ignore functionality. The bypass is possible because validation happens before canonicalization of paths and filenames.
Example:
Here we have a server that ignores the file test.txt.
```
const serve = require('serve')
const server = serve(__dirname, {
port: 1337,
ignore: ['test.txt']
})
```
Using the URL encoded form of a letter (%65 instead of e) attacker can bypass the ignore control accessing the file.
`curl http://localhost:1337/t%65st.txt`
Additionally this technique can be used to get directory listings of ignored directories.
## Recommendation
Update to version 6.5.2 or later.
| null |
2020-08-31T18:29:10Z
|
2020-09-01T19:38:33Z
|
HIGH
| null | null |
{'https://hackerone.com/reports/308721', 'https://www.npmjs.com/advisories/594'}
| null |
npm
|
GHSA-f499-jv47-9wxf
|
Directory Traversal in desafio
|
Affected versions of `desafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
no patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16164'}
|
2020-08-31T18:21:46Z
|
2018-08-06T21:40:02Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16164', 'https://nodesecurity.io/advisories/397', 'https://github.com/advisories/GHSA-f499-jv47-9wxf', 'https://www.npmjs.com/advisories/397'}
| null |
npm
|
GHSA-x8qc-rrcw-4r46
|
Symlink reference outside of node_modules in npm
|
Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected.
This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.3 or later.
|
{'CVE-2019-16776'}
|
2021-04-27T14:40:26Z
|
2019-12-13T15:39:26Z
|
LOW
| null |
{'CWE-22'}
|
{'https://access.redhat.com/errata/RHSA-2020:0573', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://access.redhat.com/errata/RHEA-2020:0330', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/advisories/GHSA-x8qc-rrcw-4r46', 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46', 'https://www.npmjs.com/advisories/1436'}
| null |
npm
|
GHSA-qmjg-g86h-6rc9
|
Hijacked Environment Variables in d3.js
|
The `d3.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16044'}
|
2020-08-31T18:25:25Z
|
2018-07-23T21:00:28Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-qmjg-g86h-6rc9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16044', 'https://nodesecurity.io/advisories/497', 'https://www.npmjs.com/advisories/497'}
| null |
npm
|
GHSA-w42g-7vfc-xf37
|
Introspection in schema validation in Apollo Server
|
We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions.
### Impact
If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled.
The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory.
> **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary.
In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)).
The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP).
**The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors.
### Affected packages
The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server.
Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`.
> Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form.
### Resolution
The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.)
### Workarounds
Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**:
```js
const server = new ApolloServer({
subscriptions: false,
/* Other options, such as typeDefs, resolvers, schema, etc. */
});
```
### For more information
If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist.
### Credit and appreciation
Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing.
Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing.
| null |
2020-08-31T19:02:14Z
|
2020-06-05T19:38:14Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1527', 'https://www.npmjs.com/advisories/1531', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1534', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1526', 'https://www.npmjs.com/advisories/1530', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1533', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1528'}
| null |
npm
|
GHSA-p77h-hv6g-fmfp
|
Sensitive Data Exposure in ibm_db
|
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode.
## Recommendation
Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
| null |
2021-09-29T18:49:03Z
|
2020-09-03T20:43:16Z
|
MODERATE
| null | null |
{'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db'}
| null |
npm
|
GHSA-g9cg-h3jm-cwrc
|
Prototype Pollution in @hapi/subtext
|
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
## Recommendation
Upgrade to versions 6.1.3, 7.0.3 or later.
| null |
2021-10-04T21:00:50Z
|
2020-09-03T15:47:23Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1480'}
| null |
npm
|
GHSA-7h42-5vj2-cq39
|
High severity vulnerability that affects tiny-json-http
|
brianleroux tiny-json-http version all versions since commit 9b8e74a232bba4701844e07bcba794173b0238a8 (Oct 29 2016) contains a Missing SSL certificate validation vulnerability in The libraries core functionality is affected. that can result in Exposes the user to man-in-the-middle attacks.
|
{'CVE-2018-1000096'}
|
2021-09-03T17:41:03Z
|
2018-03-13T20:42:00Z
|
HIGH
| null |
{'CWE-295'}
|
{'https://github.com/brianleroux/tiny-json-http/pull/15', 'https://github.com/advisories/GHSA-7h42-5vj2-cq39', 'https://github.com/brianleroux/tiny-json-http', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000096'}
| null |
npm
|
GHSA-jv7g-9g6q-cxvw
|
Path Traversal in convert-svg packages
|
This affects all versions of package convert-svg-core; all versions of package convert-svg-to-png; all versions of package convert-svg-to-jpeg. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file.
|
{'CVE-2021-23631'}
|
2022-01-27T13:51:45Z
|
2022-01-27T14:04:28Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/neocotic/convert-svg', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23631', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245', 'https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14'}
| null |
npm
|
GHSA-hv96-xxx2-5v7w
|
Downloads Resources over HTTP in nw
|
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`.
## Recommendation
Update to version 0.23.6-1 or later.
|
{'CVE-2016-10588'}
|
2021-06-10T23:26:24Z
|
2019-02-18T23:51:04Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nodesecurity.io/advisories/166'}
| null |
npm
|
GHSA-82rf-q3pr-4f6p
|
Sensitive data exposure in NATS
|
Preview versions of two NPM packages and one Deno package from the NATS
project contain an information disclosure flaw, leaking options to the
NATS server; for one package, this includes TLS private credentials.
The _connection_ configuration options in these JavaScript-based
implementations were fully serialized and sent to the server in the
client's CONNECT message, immediately after TLS establishment.
The nats.js client supports Mutual TLS and the credentials for the TLS
client key are included in the connection configuration options;
disclosure of the client's TLS private key to the server has been
observed.
Most authentication mechanisms are handled after connection, instead of
as part of connection, so other authentication mechanisms are
unaffected.
For clarity: NATS account NKey authentication is NOT affected.
Neither the nats.ws nor the nats.deno clients support Mutual TLS: the
affected versions listed below are those where the logic flaw is
present. We are including the nats.ws and nats.deno versions out of an
abundance of caution, as library maintainers, but rate as minimal the
likelihood of applications leaking sensitive data.
Affected versions:
Security impact:
* NPM package nats.js:
+ mainline is unaffected
+ beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209
Logic flaw:
* NPM package nats.ws:
+ status: preview
+ flawed from 1.0.0-85, fixed in 1.0.0-111
* Deno repository https://github.com/nats-io/nats.deno
+ status: preview
+ flawed in all git tags prior to fix
+ fixed with git tag v1.0.0-9
Impact:
For deployments using TLS client certificates (for mutual TLS), private
key material for TLS is leaked from the client application to the
server. If the server is untrusted (run by a third party), or if the
client application also disables TLS verification (and so the true
identity of the server is unverifiable) then authentication credentials
are leaked.
|
{'CVE-2020-26149'}
|
2021-10-04T21:25:47Z
|
2020-10-08T22:11:32Z
|
HIGH
| null |
{'CWE-522'}
|
{'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://github.com/nats-io/nats.ws', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9'}
| null |
npm
|
GHSA-w7rc-rwvf-8q5r
|
The `size` option isn't honored after following a redirect in node-fetch
|
### Impact
Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure.
For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing.
### Patches
We released patched versions for both stable and beta channels:
- For `v2`: 2.6.1
- For `v3`: 3.0.0-beta.9
### Workarounds
None, it is strongly recommended to update as soon as possible.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+)
* Contact one of the core maintainers.
|
{'CVE-2020-15168'}
|
2021-01-07T22:57:38Z
|
2020-09-10T17:46:21Z
|
LOW
| null |
{'CWE-20', 'CWE-770'}
|
{'https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15168', 'https://www.npmjs.com/package/node-fetch'}
| null |
npm
|
GHSA-28f8-hqmc-7ph8
|
Malicious Package in ember-power-timepicker
|
Version 1.0.8 of `ember-power-timepicker` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:40:57Z
|
2020-09-11T21:19:09Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/931'}
| null |
npm
|
GHSA-8g64-9cm2-838j
|
Malicious Package in bugfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:36:41Z
|
2020-09-03T22:29:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1266'}
| null |
npm
|
GHSA-vw7g-jq9m-3q9v
|
Unauthorized File Access in glance
|
Versions of `glance` prior to 3.0.7 are vulnerable to Unauthorized File Access. The package provides a `--nodot` option meant to hide files and directories with names that begin with a `.`, such as `.git` but fails to hide files inside a folder that begins with `.`.
## Recommendation
Upgrade to version 3.0.7 or later.
| null |
2020-08-31T18:36:38Z
|
2020-09-02T18:23:35Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/811', 'https://hackerone.com/reports/490379'}
| null |
npm
|
GHSA-v82v-rq72-phq9
|
Server side request forgery in @isomorphic-git/cors-proxy
|
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
|
{'CVE-2021-23664'}
|
2022-01-31T22:00:02Z
|
2022-01-26T22:13:05Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://github.com/isomorphic-git/cors-proxy', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
| null |
npm
|
GHSA-w36g-q975-37rg
|
Improper Input Validation (RCE)
|
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
|
{'CVE-2021-26814'}
|
2021-03-12T22:48:12Z
|
2021-03-18T19:30:20Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26814', 'https://github.com/wazuh/wazuh/releases/tag/v4.0.4', 'https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html'}
| null |
npm
|
GHSA-g7h8-p22m-2rvx
|
Prototype Pollution in flat-wrap
|
All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:16Z
|
2020-09-04T15:08:46Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1327'}
| null |
npm
|
GHSA-mfcp-34xw-p57x
|
Authentication Bypass in saml2-js
|
Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely.
## Recommendation
Upgrade to version 2.0.5 or later.
| null |
2021-09-29T20:12:42Z
|
2020-09-03T21:20:52Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/Clever/saml2', 'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637'}
| null |
npm
|
GHSA-4964-cjrr-jg97
|
Malicious Package in jqeury
|
Version 3.3.1 of `jqeury` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:55:10Z
|
2020-09-02T21:38:43Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/906'}
| null |
npm
|
GHSA-ch52-vgq2-943f
|
Regular Expression Denial of Service in marked
|
Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input.
## Recommendation
Upgrade to version 0.7.0 or later.
| null |
2020-08-31T18:46:28Z
|
2020-09-03T18:15:53Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/1076'}
| null |
npm
|
GHSA-2hpj-g53m-9gj6
|
Downloads Resources over HTTP in closure-util
|
Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`.
## Recommendation
To mitigate this issue:
1. Install the package using npm's `--ignore-scripts` flag.
2. Navigate to the package directory, and open `default-config.json` in a text editor
3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents
4. run `npm i` in the package directory.
|
{'CVE-2016-10583'}
|
2021-08-30T21:55:14Z
|
2019-02-18T23:58:03Z
|
HIGH
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10583', 'https://nodesecurity.io/advisories/165', 'https://www.npmjs.com/advisories/165', 'https://github.com/advisories/GHSA-2hpj-g53m-9gj6'}
| null |
npm
|
GHSA-2mj8-pj3j-h362
|
Symlink reference outside of node_modules in bin-links
|
Versions of `bin-links` prior to 1.1.5 are vulnerable to a Symlink reference outside of node_modules. It is possible to create symlinks to files outside of the`node_modules` folder through the `bin` field. This may allow attackers to access unauthorized files.
## Recommendation
Upgrade to version 1.1.5 or later.
| null |
2020-08-31T18:59:12Z
|
2020-09-04T17:17:39Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/1435'}
| null |
npm
|
GHSA-q4j7-v27r-fgcx
|
Prototype Pollution in realms-shim
|
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
|
{'CVE-2021-23543'}
|
2022-01-11T18:13:17Z
|
2022-01-13T15:00:36Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/Agoric/realms-shim', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23543', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908', 'https://www.npmjs.com/package/realms-shim'}
| null |
npm
|
GHSA-8cc8-8vvx-fhgw
|
Downloads Resources over HTTP in jdf-sass
|
Affected versions of `jdf-sass` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jdf-sass`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10595'}
|
2021-01-08T19:10:31Z
|
2019-02-18T23:34:11Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/198', 'https://github.com/advisories/GHSA-8cc8-8vvx-fhgw', 'https://nodesecurity.io/advisories/198', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10595'}
| null |
npm
|
GHSA-wqgx-4q47-j2w5
|
Insecure Cryptography Algorithm in parsel
|
All versions of `parsel` use an insecure cryptography algorithm. The package uses `aes-256-cbc` without integrity checks, which renders the ciphertext vulnerable to bit-flipping attacks.
## Recommendation
The package is deprecated and will not be updated. Consider using an alternative package.
| null |
2020-08-31T19:00:07Z
|
2020-09-04T17:36:04Z
|
CRITICAL
| null |
{'CWE-327'}
|
{'https://www.npmjs.com/advisories/1461'}
| null |
npm
|
GHSA-7pgq-hhq9-9r27
|
Directory Traversal in lab6drewfusbyu
|
Affected versions of `lab6drewfusbyu` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16141'}
|
2020-08-31T18:24:31Z
|
2018-07-23T20:48:38Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu', 'https://www.npmjs.com/advisories/474', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16141', 'https://github.com/advisories/GHSA-7pgq-hhq9-9r27', 'https://nodesecurity.io/advisories/474'}
| null |
npm
|
GHSA-pfxf-wh96-fvjc
|
Log Forging in generator-jhipster-kotlin
|
### Impact
We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.
### Patches
version 1.7.0.
### Workarounds
In `AccountResource.kt` you should change the line
```kotlin
log.warn("Password reset requested for non existing mail '$mail'");
```
to
```kotlin
log.warn("Password reset requested for non existing mail");
```
### References
* https://cwe.mitre.org/data/definitions/117.html
* https://owasp.org/www-community/attacks/Log_Injection
* https://www.baeldung.com/jvm-log-forging
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin)
|
{'CVE-2020-4072'}
|
2021-01-07T23:50:00Z
|
2020-06-25T20:02:51Z
|
MODERATE
| null |
{'CWE-117'}
|
{'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
| null |
npm
|
GHSA-m79w-4mqv-r39f
|
Downloads Resources over HTTP in windows-seleniumjar
|
Affected versions of `windows-seleniumjar` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10691'}
|
2021-01-08T18:30:31Z
|
2018-07-31T22:06:33Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10691', 'https://github.com/advisories/GHSA-m79w-4mqv-r39f', 'https://www.npmjs.com/advisories/296', 'https://nodesecurity.io/advisories/296'}
| null |
npm
|
GHSA-m3j9-p4x2-97q6
|
Directory Traversal in liyujing
|
Affected versions of `liyujing` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16120'}
|
2020-08-31T18:21:22Z
|
2020-09-01T17:22:49Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing', 'https://www.npmjs.com/advisories/387', 'https://nodesecurity.io/advisories/387', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16120'}
| null |
npm
|
GHSA-qp6m-jqfr-2f7v
|
Malicious Package in babel-laoder
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:17:24Z
|
2020-09-04T15:27:11Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/babel/babel-loader', 'https://snyk.io/vuln/SNYK-JS-BABELLAODER-536195', 'https://www.npmjs.com/advisories/1348'}
| null |
npm
|
GHSA-6m85-wvcr-pgw3
|
Prototype Pollution in safetydance
|
All versions of package safetydance are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7737'}
|
2021-04-22T22:33:20Z
|
2022-02-10T20:33:49Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7737', 'https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687', 'https://www.npmjs.com/package/safetydance'}
| null |
npm
|
GHSA-2pr6-76vf-7546
|
Denial of Service in js-yaml
|
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
## Recommendation
Upgrade to version 3.13.0.
| null |
2021-08-04T21:32:56Z
|
2019-06-05T14:35:29Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://github.com/nodeca/js-yaml/issues/475', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions'}
| null |
npm
|
GHSA-x3g3-334f-q6h4
|
Moderate severity vulnerability that affects editor.md
|
pandao Editor.md 1.5.0 has DOM XSS via input starting with a "<<" substring, which is mishandled during construction of an A element.
|
{'CVE-2018-19056'}
|
2021-09-21T22:01:01Z
|
2018-11-09T17:41:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-x3g3-334f-q6h4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056', 'https://github.com/pandao/editor.md', 'https://github.com/pandao/editor.md/issues/634'}
| null |
npm
|
GHSA-mrmf-qwxg-7c3h
|
XSS in Data URI in remarkable
|
Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript.
## Proof of Concept
```
[link](data:text/html,<script>alert('0')</script>)
```
## Recommendation
Update to v1.7.0 or later
|
{'CVE-2017-16006'}
|
2020-08-31T18:19:08Z
|
2018-11-09T17:48:20Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/jonschlinkert/remarkable/issues/227', 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006', 'https://nodesecurity.io/advisories/319', 'https://www.npmjs.com/advisories/319'}
| null |
npm
|
GHSA-6394-6h9h-cfjg
|
Regular Expression Denial of Service
|
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
| null |
2021-02-25T17:23:12Z
|
2019-06-07T21:12:35Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
| null |
npm
|
GHSA-8vcr-vxm8-293m
|
Denial of Service in SheetsJS Pro
|
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).
|
{'CVE-2021-32013'}
|
2022-03-03T05:13:18.637397Z
|
2021-07-22T19:48:13Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32013', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
npm
|
GHSA-cr4x-w2v7-4mmf
|
Malicious Package in bufver-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:36:13Z
|
2020-09-03T22:26:13Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1265'}
| null |
npm
|
GHSA-2j5x-56p6-hj6x
|
Path Traversal in statichttpserver
|
All versions of `statichttpserver` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5480'}
|
2020-08-31T18:48:50Z
|
2019-09-04T10:02:14Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/570035', 'https://www.npmjs.com/advisories/1143', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5480'}
| null |
npm
|
GHSA-7f5c-rpf4-86p8
|
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs
|
The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.
|
{'CVE-2021-32822'}
|
2021-08-26T17:12:06Z
|
2021-09-02T17:16:46Z
|
MODERATE
| null |
{'CWE-538', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32822', 'https://github.com/pillarjs/hbs', 'https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/'}
| null |
npm
|
GHSA-2x4q-6jfv-8h9h
|
Path Traversal in glance
|
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`.
## Recommendation
Update to version 3.0.4 or later.
|
{'CVE-2018-3715'}
|
2020-08-31T18:29:00Z
|
2018-07-26T14:53:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://hackerone.com/reports/310106', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://www.npmjs.com/advisories/590', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h'}
| null |
npm
|
GHSA-63q7-h895-m982
|
Cross-site Scripting in dompurify
|
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
|
{'CVE-2020-26870'}
|
2022-04-28T17:58:51Z
|
2020-12-18T22:51:40Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://github.com/cure53/DOMPurify', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
| null |
npm
|
GHSA-8fw4-xh83-3j6q
|
Cross-Site Scripting in diagram-js
|
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
If you are using diagram-js 3.x, upgrade to version 3.3.1.
If you are using diagram-js 2.x, upgrade to version 2.6.2.
| null |
2021-09-28T16:58:42Z
|
2020-09-11T21:18:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/bpmn-io/diagram-js', 'https://www.npmjs.com/advisories/982'}
| null |
npm
|
GHSA-f698-m2v9-5fh3
|
Command Injection in opencv
|
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.
## Recommendation
Upgrade to version 6.1.0.
| null |
2020-08-31T18:35:50Z
|
2019-06-04T20:11:44Z
|
LOW
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/789', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
| null |
npm
|
GHSA-xj6r-2jpm-qvxp
|
Code injection issue for java-spring-cloud-stream-template
|
The following was initially reported by @jonaslagoni:
Given the following command:
`ag ./dummy.json @asyncapi/java-spring-cloud-stream-template --force-write --output ./output`
With the following AsyncAPI document:
```json
{
"asyncapi": "2.0.0",
"info": {
"title": "Streetlight",
"version": "1.0.0"
},
"defaultContentType": "json",
"channels": {
"security/audit/channel": {
"description": "Channel for the turn on command which should turn on the streetlight",
"parameters": {
"streetlight_id": {
"description": "The ID of the streetlight",
"schema": {
"type": "string"
}
}
},
"publish": {
"operationId": "test() { System.out.println(\"injected\"); return test(0); }\n public Consumer<CustomClass> someothername",
"message": {
"name": "TurnonCommand",
"payload": {
"$ref": "#/components/schemas/CustomClass"
}
}
}
}
},
"components": {
"schemas" : {
"CustomClass": {
"type": "object",
"properties": {
"prop": {
"type": "string"
}
}
}
}
}
}
```
Which changes the following output:
```java
...
@Bean
public Consumer<CustomClass> test() {
// Add business logic here.
return null;
}
...
```
To
```java
...
@Bean
public Consumer<CustomClass> test() { System.out.println("injected"); return someothername(); }
public Consumer<CustomClass> someothername() {
// Add business logic here.
return null;
}
...
```
|
{'CVE-2021-37694'}
|
2021-08-24T18:50:59Z
|
2021-08-25T14:45:52Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/asyncapi/java-spring-cloud-stream-template', 'https://github.com/asyncapi/java-spring-cloud-stream-template/security/advisories/GHSA-xj6r-2jpm-qvxp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37694'}
| null |
npm
|
GHSA-3c48-6pcv-88rm
|
Macro in MathJax running untrusted Javascript within a web browser
|
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
|
{'CVE-2018-1999024'}
|
2022-04-26T18:17:56Z
|
2018-07-27T17:05:27Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/mathjax/MathJax', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024'}
| null |
npm
|
GHSA-r9p9-mrjm-926w
|
Use of a Broken or Risky Cryptographic Algorithm
|
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
|
{'CVE-2020-28498'}
|
2021-03-08T16:02:43Z
|
2021-03-08T16:06:50Z
|
MODERATE
| null |
{'CWE-327'}
|
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
| null |
npm
|
GHSA-72hv-rp4q-q7f3
|
Hijacked Environment Variables in babelcli
|
The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16060'}
|
2020-08-31T18:25:29Z
|
2018-08-29T23:57:14Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16060', 'https://nodesecurity.io/advisories/499', 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3', 'https://www.npmjs.com/advisories/499'}
| null |
npm
|
GHSA-4w46-w44m-3jq3
|
Parse Server stores password in plain text
|
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js.
In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext.
This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
|
{'CVE-2020-26288'}
|
2021-01-07T22:32:25Z
|
2020-12-28T16:33:17Z
|
LOW
| null |
{'CWE-312'}
|
{'https://www.npmjs.com/advisories/1593', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
| null |
npm
|
GHSA-6cgh-hjpw-q3gq
|
Utils.readChallengeTx does not verify the server account signature
|
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.
Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.
Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
|
{'CVE-2021-32738'}
|
2021-07-02T18:25:08Z
|
2021-07-02T19:20:33Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3'}
| null |
npm
|
GHSA-j49g-mp79-5vm5
|
Exfiltrates data on installation in coffe-script
|
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffe-script` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16203'}
|
2021-01-08T18:37:35Z
|
2018-08-06T20:06:29Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-j49g-mp79-5vm5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203', 'https://www.npmjs.com/advisories/543', 'https://nodesecurity.io/advisories/543'}
| null |
npm
|
GHSA-792j-9wj3-j634
|
Command injection in github-todos
|
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
|
{'CVE-2021-44684'}
|
2021-12-08T20:28:47Z
|
2021-12-10T20:30:52Z
|
MODERATE
| null | null |
{'https://github.com/dwisiswant0/advisory/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44684', 'https://github.com/naholyr/github-todos/issues/34'}
| null |
npm
|
GHSA-jgrx-mgxx-jf9v
|
Regular Expression Denial of Service in tmpl
|
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
|
{'CVE-2021-3777'}
|
2022-05-04T03:26:16Z
|
2021-09-20T20:27:52Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://github.com/daaku/nodejs-tmpl', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
| null |
npm
|
GHSA-qg3g-2mgh-33j8
|
Sensitive Data Exposure in msrcrypto
|
Versions of `msrcrypto` prior to 1.4.1 are vulnerable to Sensitive Data Exposure. The package's Elliptic Curve Cryptography (ECC) implementation may leak information about a server's private ECC key. It can also allow attackers to craft invalid ECDSA signatures that pass as valid. There is no published proof-of-concept for this vulnerability.
## Recommendation
Upgrade to version 1.4.1 or later.
|
{'CVE-2018-8319'}
|
2021-09-16T19:58:01Z
|
2018-09-10T15:19:49Z
|
CRITICAL
| null |
{'CWE-682'}
|
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8319', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8319', 'http://www.securitytracker.com/id/1041268', 'https://www.npmjs.com/advisories/1112', 'https://github.com/advisories/GHSA-qg3g-2mgh-33j8', 'http://www.securityfocus.com/bid/104655'}
| null |
npm
|
GHSA-fw5f-7c6c-3vmv
|
Cross-site Scripting in PrimeFaces
|
An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.
|
{'CVE-2020-10544'}
|
2021-05-03T20:39:02Z
|
2021-05-07T16:16:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/primefaces/primefaces/issues/5642', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10544'}
| null |
npm
|
GHSA-vm67-mh96-95mq
|
Malicious Package in bubfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:53:43Z
|
2020-09-03T21:40:48Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1232'}
| null |
npm
|
GHSA-rhwf-hqpr-q8g2
|
Code Injection in script-manager
|
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.
|
{'CVE-2020-8129'}
|
2021-04-07T19:36:21Z
|
2021-04-13T15:24:38Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://hackerone.com/reports/660563', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8129'}
| null |
npm
|
GHSA-8m2f-74r2-x3f2
|
Code injection in accesslog
|
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
|
{'CVE-2022-25760'}
|
2022-03-18T22:41:34Z
|
2022-03-18T00:01:10Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/carlos8f/node-accesslog', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25760', 'https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6', 'https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099'}
| null |
npm
|
GHSA-w8qv-6jwh-64r5
|
Regular Expression Denial of Service in browserslist
|
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
|
{'CVE-2021-23364'}
|
2021-05-20T22:03:36Z
|
2021-05-24T19:52:40Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/browserslist/browserslist/pull/593', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364'}
| null |
npm
|
GHSA-77qv-gh6f-pgh4
|
Command Injection in Limdu
|
### Impact
The `trainBatch` function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
### Patches
Patched in version 0.95.
### Workarounds
Do not use trainBatch with classifiers that rely on shell execution, such as SVM Perf, SVM Linear or Adaboost
### References
No
|
{'CVE-2020-4066'}
|
2021-01-07T23:50:29Z
|
2020-06-22T15:24:06Z
|
LOW
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4066', 'https://github.com/erelsgl/limdu/security/advisories/GHSA-77qv-gh6f-pgh4'}
| null |
npm
|
GHSA-8h84-8j4f-p97q
|
Injection in bodymen
|
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
|
{'CVE-2019-10792'}
|
2021-04-07T20:24:23Z
|
2021-04-13T15:24:21Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}
| null |
npm
|
GHSA-mxjr-xmcg-fg7w
|
Arbitrary Code Injection in mobile-icon-resizer
|
mobile-icon-resizer resizes large images for use as icons for iOS and Android.
mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3.
mobile-icon-resizer takes an options object as an argument to define the resulting icons as such:
```
var options = {
config: './config.js'
}
resize(options, function(err){});
```
config.js would need to be a file on the filesystem and look something like:
```
var config = {
iOS: {
"images": [
/* iOS image definitions are not vulnerable */
]
},
android: {
"images" : [
{
"baseRatio" : "console.log('Executing script as baseRatio property')",
"folder" : "drawable-ldpi"
},
{
"ratio" : "console.log('Executing script as ratio property')",
"folder" : "drawable-mdpi"
},
/* other android image defintiions ... */
]
}
};
exports = module.exports = config;
```
The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed.
## Recommendation
Update to version 0.4.3 or later.
| null |
2021-08-17T15:41:58Z
|
2019-06-27T17:25:21Z
|
MODERATE
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f', 'https://www.npmjs.com/advisories/317'}
| null |
npm
|
GHSA-rq8g-5pc5-wrhr
|
Insufficient Entropy in cryptiles
|
Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed.
## Recommendation
Upgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package.
|
{'CVE-2018-1000620'}
|
2021-09-17T19:26:13Z
|
2018-09-11T18:22:50Z
|
CRITICAL
| null |
{'CWE-331'}
|
{'https://github.com/advisories/GHSA-rq8g-5pc5-wrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000620', 'https://www.npmjs.com/advisories/1464', 'https://github.com/hapijs/cryptiles/issues/34', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/476.json', 'https://www.npmjs.com/advisories/720', 'https://github.com/hapijs/cryptiles'}
| null |
npm
|
GHSA-cgvm-rvfv-c92r
|
Malicious Package in ecuvre
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:01:46Z
|
2020-09-03T17:05:51Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1396'}
| null |
npm
|
GHSA-g95j-p8f6-pwh4
|
Downloads Resources over HTTP in headless-browser-lite
|
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`.
## Recommendation
Update to version 2015.4.18-a or later.
|
{'CVE-2016-10625'}
|
2021-06-10T23:42:13Z
|
2019-02-18T23:56:58Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://nodesecurity.io/advisories/230', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'}
| null |
npm
|
GHSA-jvf4-g24p-2qgw
|
Arbitrary Code Execution in shiba
|
"All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad()."
|
{'CVE-2020-7738'}
|
2021-04-22T22:20:49Z
|
2021-05-10T18:37:34Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-SHIBA-596466', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7738', 'https://www.npmjs.com/package/shiba'}
| null |
npm
|
GHSA-mwj7-r5vc-hmc9
|
Directory Traversal in hcbserver
|
Affected versions of `hcbserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16171'}
|
2020-08-31T18:22:13Z
|
2020-09-01T17:35:38Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver', 'https://www.npmjs.com/advisories/414', 'https://nodesecurity.io/advisories/414', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16171'}
| null |
npm
|
GHSA-2hw7-mxvj-m455
|
Path traversal in Node-RED-Dashboard
|
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
|
{'CVE-2021-3223'}
|
2021-01-27T23:26:39Z
|
2021-01-29T18:13:52Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}
| null |
npm
|
GHSA-ww39-953v-wcq6
|
Regular expression denial of service in glob-parent
|
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
|
{'CVE-2020-28469'}
|
2022-03-30T21:18:41Z
|
2021-06-07T21:56:34Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905', 'https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9', 'https://github.com/gulpjs/glob-parent', 'https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092', 'https://github.com/gulpjs/glob-parent/pull/36', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28469', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
npm
|
GHSA-x2jj-x3q2-7hph
|
Directory Traversal in 11xiaoli
|
Affected versions of `11xiaoli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16160'}
|
2020-08-31T18:21:41Z
|
2020-09-01T17:28:09Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli', 'https://www.npmjs.com/advisories/395', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16160', 'https://nodesecurity.io/advisories/395'}
| null |
npm
|
GHSA-fpw3-x4xq-6vxq
|
Malicious Package in wepack-cli
|
All versions of `wepack-cli` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:46:23Z
|
2020-09-02T18:32:13Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/839'}
| null |
npm
|
GHSA-4v9w-pvwr-38h3
|
OS Command Injection in strong-nginx-controller
|
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
|
{'CVE-2020-7621'}
|
2021-07-28T21:54:53Z
|
2022-02-10T23:36:54Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7621', 'https://github.com/strongloop/strong-nginx-controller/blob/master/lib/server.js#L65,', 'https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248'}
| null |
npm
|
GHSA-j44m-qm6p-hp7m
|
Arbitrary File Overwrite in tar
|
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.
## Recommendation
For tar 4.x, upgrade to version 4.4.2 or later.
For tar 2.x, upgrade to version 2.2.2 or later.
|
{'CVE-2018-20834'}
|
2021-08-03T21:28:27Z
|
2019-05-01T18:37:31Z
|
HIGH
| null |
{'CWE-59'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://hackerone.com/reports/344595', 'https://www.npmjs.com/advisories/803', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://access.redhat.com/errata/RHSA-2019:1821'}
| null |
npm
|
GHSA-2w3f-9w3q-qw77
|
Prototype Pollution in config-handler
|
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.
|
{'CVE-2021-23448'}
|
2021-10-20T17:12:24Z
|
2021-10-12T18:30:37Z
|
CRITICAL
| null |
{'CWE-913'}
|
{'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947', 'https://github.com/jarradseers/config-handler/issues/1', 'https://github.com/jarradseers/config-handler', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448'}
| null |
npm
|
GHSA-hqq7-2q2v-82xq
|
Cross-site Scripting in sanitize-url
|
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
|
{'CVE-2021-23648'}
|
2022-03-21T17:20:05Z
|
2022-03-17T00:00:24Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://github.com/braintree/sanitize-url', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882'}
| null |
npm
|
GHSA-5wg4-74h6-q47v
|
Integer Overflow or Wraparound and Use of a Broken or Risky Cryptographic Algorithm in bcrypt
|
In bcrypt (npm package) before version 5.0.0, data is truncated wrong when its length is greater than 255 bytes.
|
{'CVE-2020-7689'}
|
2021-07-29T20:49:30Z
|
2020-08-20T14:38:49Z
|
MODERATE
| null |
{'CWE-327', 'CWE-190'}
|
{'https://github.com/kelektiv/node.bcrypt.js/pull/806', 'https://github.com/kelektiv/node.bcrypt.js/issues/776', 'https://github.com/kelektiv/node.bcrypt.js/pull/807', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7689', 'https://snyk.io/vuln/SNYK-JS-BCRYPT-572911'}
| null |
npm
|
GHSA-qj3f-9gmq-fwv5
|
Cross-Site Scripting in simple-markdown
|
Versions of `simple-markdown` prior to 0.4.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload.
## Recommendation
Upgrade to version 0.4.4 or later.
|
{'CVE-2019-9844'}
|
2021-09-16T20:02:36Z
|
2019-04-09T19:47:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/Khan/simple-markdown/pull/63', 'https://www.npmjs.com/advisories/815', 'https://github.com/advisories/GHSA-qj3f-9gmq-fwv5', 'https://www.npmjs.com/package/simple-markdown/v/0.4.4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFLP3KJVSV5VWMNEBRXLGRVYFXOV5KOG/', 'https://github.com/Khan/simple-markdown', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZG2I7VH7WLSEUQ77KYP5CRAVFT2RK2U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5EFW655O3BXZYAPB65XEREXB2DSNSOT/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9844'}
| null |
npm
|
GHSA-jxf5-7x3j-8j9m
|
Malicious Package in load-from-cwd-or-npm
|
Version 3.0.2 of `load-from-cwd-or-npm` contains malicious code. The malware breaks functionality of the `purescript-installer` package by injecting targeted code.
## Recommendation
Upgrade to version 3.0.4 or later. There is no indication of further compromise.
| null |
2021-09-30T20:05:11Z
|
2020-09-03T18:19:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1082'}
| null |
npm
|
GHSA-2589-w6xf-983r
|
Cross-site scripting in react-bootstrap-table
|
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
|
{'CVE-2021-23398'}
|
2021-07-01T21:48:39Z
|
2021-12-10T18:58:49Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23398', 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118', 'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286', 'https://github.com/AllenFang/react-bootstrap-table/issues/2071'}
| null |
npm
|
GHSA-82mg-x548-gq3j
|
LDAP Injection in ldapauth
|
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter.
## Recommendation
ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
|
{'CVE-2015-7294'}
|
2021-09-23T19:58:02Z
|
2020-08-31T22:49:46Z
|
HIGH
| null |
{'CWE-90'}
|
{'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'http://www.openwall.com/lists/oss-security/2015/09/18/4', 'https://github.com/vesse/node-ldapauth-fork', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'https://www.npmjs.com/advisories/19'}
| null |
npm
|
GHSA-88h9-fc6v-jcw7
|
Unintended Require in larvitbase-www
|
All versions of `larvitbase-www` are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:49:17Z
|
2020-09-03T20:28:51Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/1156', 'https://hackerone.com/reports/526258'}
| null |
npm
|
GHSA-4662-j96g-mv46
|
Arbitrary Code Injection in reduce-css-calc
|
Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server.
## Proof of Concept
```
const reduceCSSCalc = require('reduce-css-calc');
console.log(reduceCSSCalc(`calc( (Buffer(10000)))`));
console.log(reduceCSSCalc(`calc( (global['fs'] = require('fs')))`));
console.log(reduceCSSCalc(`calc( (fs['readFileSync']("/etc/passwd", "utf-8")))`));
```
## Recommendation
Update to version 1.2.5 or later.
|
{'CVE-2016-10548'}
|
2020-08-31T18:12:20Z
|
2018-06-07T19:43:06Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-4662-j96g-mv46', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10548', 'https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9', 'https://nodesecurity.io/advisories/144', 'https://www.npmjs.com/advisories/144'}
| null |
npm
|
GHSA-5wq6-v5cw-jvfr
|
Malicious Package in js-shas
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:12:55Z
|
2020-09-03T23:03:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1285'}
| null |
npm
|
GHSA-w5q7-3pr9-x44w
|
Denial of Service in serialize-to-js
|
Versions of `serialize-to-js` prior to 2.0.0 are vulnerable to Denial of Service. User input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely.
## Recommendation
Upgrade to version 2.0.0 or later.
| null |
2020-08-31T18:35:52Z
|
2020-09-02T15:59:19Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/790'}
| null |
npm
|
GHSA-crfh-jmv2-2f9v
|
Malicious Package in singale
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:43:43Z
|
2020-09-03T17:03:11Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1411'}
| null |
npm
|
GHSA-7frv-9phw-vrvr
|
Authorization bypass in Strapi
|
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
|
{'CVE-2020-27664'}
|
2021-04-21T18:06:14Z
|
2021-05-10T18:43:59Z
|
CRITICAL
| null |
{'CWE-862'}
|
{'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://github.com/strapi/strapi/pull/8442', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27664'}
| null |
npm
|
GHSA-wx77-rp39-c6vg
|
Regular Expression Denial of Service in markdown
|
All versions of `markdown` are vulnerable to Regular Expression Denial of Service (ReDoS). The `markdown.toHTML()` function has significantly degraded performance when parsing long strings containing underscores. This may lead to Denial of Service if the parser accepts user input.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2022-03-24T22:10:13Z
|
2020-09-04T15:11:03Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/evilstreak/markdown-js', 'https://www.npmjs.com/advisories/1330'}
| null |
npm
|
GHSA-3pcq-34w5-p4g2
|
forEachSeries and forEachLimit do not limit the number of requests
|
### Impact
This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects.
### Patches
The problem has been patched in 1.0.4.
### Workarounds
There is no workaround aside from upgrading to 1.0.4.
|
{'CVE-2021-41167'}
|
2021-10-27T17:05:58Z
|
2021-10-21T17:49:30Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/nicolas-van/modern-async', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167', 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
| null |
npm
|
GHSA-5c6f-jpx7-cwq6
|
Directory Traversal in enserver
|
Affected versions of `enserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16209'}
|
2020-08-31T18:22:38Z
|
2020-09-01T18:13:11Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/425', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16209', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver', 'https://www.npmjs.com/advisories/425'}
| null |
npm
|
GHSA-jp99-5h8w-gmxc
|
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm
|
All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:02Z
|
2020-09-04T15:03:13Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1320'}
| null |
npm
|
GHSA-6x8c-mvpv-5366
|
Directory Traversal in shit-server
|
Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16147'}
|
2020-08-31T18:22:50Z
|
2020-09-01T18:18:32Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16147', 'https://www.npmjs.com/advisories/430', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server', 'https://nodesecurity.io/advisories/430'}
| null |
npm
|
GHSA-2c83-wfv3-q25f
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown
|
### Impact
A Remote Command Execution vulnerability was found in the rebber module,
which allowed execution of arbitrary commands. The reported problem came
from CodeBlocks, which could be escaped to insert malicious LaTeX.
Anyone using `rebber` without sanitation of code content or a custom
macro is impacted by this vulnerability. Here is an example of a Markdown
content that will exploit the vulnerability:
````markdown
```
\end{CodeBlock}
\immediate\write18{COMMAND > outputrce}
\input{outputrce}
\begin{CodeBlock}{text}
```
````
Will insert into the generated LaTeX the result of executing
`COMMAND` on the system.
### Patches
The vulnerability has been patched in version 5.2.1.
If impacted, you should update to this version as soon as possible.
### Workarounds
It is possible to mitigate the vulnerability without upgrading by using a
custom code macro. Please make sure this custom macro escapes your
closing LaTeX sequence. For the example above, use:
```javascript
const escaped = content.replace(new RegExp('\\\\end\\s*{CodeBlock}', 'g'), '')
```
### For more information
If you have any questions or comments about this advisory, open an issue in [ZMarkdown](https://github.com/zestedesavoir/zmarkdown/issues).
| null |
2021-09-07T14:04:47Z
|
2021-09-07T23:07:56Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/zestedesavoir/zmarkdown', 'https://github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-2c83-wfv3-q25f'}
| null |
npm
|
GHSA-8r4g-cg4m-x23c
|
Denial of Service in node-static
|
All versions of node-static are vulnerable to a Denial of Service. The package fails to catch an exception when user input includes null bytes. This allows attackers to access `http://host/%00` and crash the server.
| null |
2021-12-20T22:16:43Z
|
2021-09-22T18:22:02Z
|
MODERATE
| null |
{'CWE-400', 'CWE-248'}
|
{'https://www.npmjs.com/package/node-static', 'https://github.com/cloudhead/node-static', 'https://github.com/cloudhead/node-static/pull/213', 'https://www.npmjs.com/advisories/1208', 'https://github.com/cloudhead/node-static/blob/643a528ec7bbd05a59c4030655d94810570afb3f/CHANGES.md#-unreleased'}
| null |
npm
|
GHSA-gc25-3vc5-2jf9
|
Sandbox Breakout / Arbitrary Code Execution in sandbox
|
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:54:57Z
|
2020-09-04T15:00:58Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1318'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.