ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-chh2-rvhg-wqwr
Malicious Package in json-serializer
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:50:40Z
2020-09-03T21:02:10Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1194'}
null
npm
GHSA-j9q7-3rhf-4ppv
Downloads Resources over HTTP in windows-selenium-chromedriver
Affected versions of `windows-selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-selenium-chromedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10687'}
2021-01-14T15:57:21Z
2020-09-01T16:11:08Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/285', 'https://www.npmjs.com/advisories/285', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10687'}
null
npm
GHSA-9wjh-jr2j-6r4x
Remote Code Execution in pi_video_recording
All versions of `pi_video_recording` are vulnerable to Remote Code Execution. Due to insufficient input validation the server executes arbitrary code through the /api/record/start endpoint. After running the server, `curl -POST -H "Content-Type: application/json" -d '{"filename": " || touch /tmp/worked;"}' http://localhost:5000/api/record/start`creates a file in the /tmp/ directory ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:35:14Z
2020-09-02T15:55:58Z
HIGH
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/773'}
null
npm
GHSA-h2r4-4xgf-3865
Downloads Resources over HTTP in product-monitor
Affected versions of `product-monitor` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `product-monitor`. ## Recommendation Update to versions 2.2.5 or later.
{'CVE-2016-10567'}
2021-01-08T18:44:26Z
2019-02-18T23:35:32Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/171', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10567', 'https://nodesecurity.io/advisories/171', 'https://github.com/advisories/GHSA-h2r4-4xgf-3865'}
null
npm
GHSA-c53x-wwx2-pg96
Cross-Site Scripting in @berslucas/liljs
Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation Upgrade to version 1.0.2 or later.
null
2021-09-28T17:27:43Z
2020-09-03T17:03:58Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2', 'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
null
npm
GHSA-pm52-wwrw-c282
Command Injection in wiki-plugin-datalog
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system. ## Recommendation Upgrade to version 0.1.6 or later.
null
2021-08-16T14:32:10Z
2019-06-13T18:59:06Z
HIGH
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926'}
null
npm
GHSA-wm7q-rxch-43mx
Byass due to validation before canonicalization in serve
Versions of `serve` before 6.5.2 are vulnerable to the bypass of the ignore functionality. The bypass is possible because validation happens before canonicalization of paths and filenames. Example: Here we have a server that ignores the file test.txt. ``` const serve = require('serve') const server = serve(__dirname, { port: 1337, ignore: ['test.txt'] }) ``` Using the URL encoded form of a letter (%65 instead of e) attacker can bypass the ignore control accessing the file. `curl http://localhost:1337/t%65st.txt` Additionally this technique can be used to get directory listings of ignored directories. ## Recommendation Update to version 6.5.2 or later.
null
2020-08-31T18:29:10Z
2020-09-01T19:38:33Z
HIGH
null
null
{'https://hackerone.com/reports/308721', 'https://www.npmjs.com/advisories/594'}
null
npm
GHSA-f499-jv47-9wxf
Directory Traversal in desafio
Affected versions of `desafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation no patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16164'}
2020-08-31T18:21:46Z
2018-08-06T21:40:02Z
MODERATE
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16164', 'https://nodesecurity.io/advisories/397', 'https://github.com/advisories/GHSA-f499-jv47-9wxf', 'https://www.npmjs.com/advisories/397'}
null
npm
GHSA-x8qc-rrcw-4r46
Symlink reference outside of node_modules in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.
{'CVE-2019-16776'}
2021-04-27T14:40:26Z
2019-12-13T15:39:26Z
LOW
null
{'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2020:0573', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://access.redhat.com/errata/RHEA-2020:0330', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/advisories/GHSA-x8qc-rrcw-4r46', 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46', 'https://www.npmjs.com/advisories/1436'}
null
npm
GHSA-qmjg-g86h-6rc9
Hijacked Environment Variables in d3.js
The `d3.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16044'}
2020-08-31T18:25:25Z
2018-07-23T21:00:28Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-qmjg-g86h-6rc9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16044', 'https://nodesecurity.io/advisories/497', 'https://www.npmjs.com/advisories/497'}
null
npm
GHSA-w42g-7vfc-xf37
Introspection in schema validation in Apollo Server
We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions. ### Impact If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled. The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory. > **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary. In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)). The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP). **The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors. ### Affected packages The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server. Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`. > Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form. ### Resolution The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.) ### Workarounds Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**: ```js const server = new ApolloServer({ subscriptions: false, /* Other options, such as typeDefs, resolvers, schema, etc. */ }); ``` ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist. ### Credit and appreciation Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing. Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing.
null
2020-08-31T19:02:14Z
2020-06-05T19:38:14Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1527', 'https://www.npmjs.com/advisories/1531', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1534', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1526', 'https://www.npmjs.com/advisories/1530', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1533', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1528'}
null
npm
GHSA-p77h-hv6g-fmfp
Sensitive Data Exposure in ibm_db
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode. ## Recommendation Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
null
2021-09-29T18:49:03Z
2020-09-03T20:43:16Z
MODERATE
null
null
{'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db'}
null
npm
GHSA-g9cg-h3jm-cwrc
Prototype Pollution in @hapi/subtext
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. ## Recommendation Upgrade to versions 6.1.3, 7.0.3 or later.
null
2021-10-04T21:00:50Z
2020-09-03T15:47:23Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1480'}
null
npm
GHSA-7h42-5vj2-cq39
High severity vulnerability that affects tiny-json-http
brianleroux tiny-json-http version all versions since commit 9b8e74a232bba4701844e07bcba794173b0238a8 (Oct 29 2016) contains a Missing SSL certificate validation vulnerability in The libraries core functionality is affected. that can result in Exposes the user to man-in-the-middle attacks.
{'CVE-2018-1000096'}
2021-09-03T17:41:03Z
2018-03-13T20:42:00Z
HIGH
null
{'CWE-295'}
{'https://github.com/brianleroux/tiny-json-http/pull/15', 'https://github.com/advisories/GHSA-7h42-5vj2-cq39', 'https://github.com/brianleroux/tiny-json-http', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000096'}
null
npm
GHSA-jv7g-9g6q-cxvw
Path Traversal in convert-svg packages
This affects all versions of package convert-svg-core; all versions of package convert-svg-to-png; all versions of package convert-svg-to-jpeg. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file.
{'CVE-2021-23631'}
2022-01-27T13:51:45Z
2022-01-27T14:04:28Z
HIGH
null
{'CWE-22'}
{'https://github.com/neocotic/convert-svg', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23631', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245', 'https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14'}
null
npm
GHSA-hv96-xxx2-5v7w
Downloads Resources over HTTP in nw
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`. ## Recommendation Update to version 0.23.6-1 or later.
{'CVE-2016-10588'}
2021-06-10T23:26:24Z
2019-02-18T23:51:04Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nodesecurity.io/advisories/166'}
null
npm
GHSA-82rf-q3pr-4f6p
Sensitive data exposure in NATS
Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment. The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected. Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. Affected versions: Security impact: * NPM package nats.js: + mainline is unaffected + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 Logic flaw: * NPM package nats.ws: + status: preview + flawed from 1.0.0-85, fixed in 1.0.0-111 * Deno repository https://github.com/nats-io/nats.deno + status: preview + flawed in all git tags prior to fix + fixed with git tag v1.0.0-9 Impact: For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
{'CVE-2020-26149'}
2021-10-04T21:25:47Z
2020-10-08T22:11:32Z
HIGH
null
{'CWE-522'}
{'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://github.com/nats-io/nats.ws', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9'}
null
npm
GHSA-w7rc-rwvf-8q5r
The `size` option isn't honored after following a redirect in node-fetch
### Impact Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing. ### Patches We released patched versions for both stable and beta channels: - For `v2`: 2.6.1 - For `v3`: 3.0.0-beta.9 ### Workarounds None, it is strongly recommended to update as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+) * Contact one of the core maintainers.
{'CVE-2020-15168'}
2021-01-07T22:57:38Z
2020-09-10T17:46:21Z
LOW
null
{'CWE-20', 'CWE-770'}
{'https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15168', 'https://www.npmjs.com/package/node-fetch'}
null
npm
GHSA-28f8-hqmc-7ph8
Malicious Package in ember-power-timepicker
Version 1.0.8 of `ember-power-timepicker` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:40:57Z
2020-09-11T21:19:09Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/931'}
null
npm
GHSA-8g64-9cm2-838j
Malicious Package in bugfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:36:41Z
2020-09-03T22:29:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1266'}
null
npm
GHSA-vw7g-jq9m-3q9v
Unauthorized File Access in glance
Versions of `glance` prior to 3.0.7 are vulnerable to Unauthorized File Access. The package provides a `--nodot` option meant to hide files and directories with names that begin with a `.`, such as `.git` but fails to hide files inside a folder that begins with `.`. ## Recommendation Upgrade to version 3.0.7 or later.
null
2020-08-31T18:36:38Z
2020-09-02T18:23:35Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/811', 'https://hackerone.com/reports/490379'}
null
npm
GHSA-v82v-rq72-phq9
Server side request forgery in @isomorphic-git/cors-proxy
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
{'CVE-2021-23664'}
2022-01-31T22:00:02Z
2022-01-26T22:13:05Z
HIGH
null
{'CWE-918'}
{'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://github.com/isomorphic-git/cors-proxy', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
null
npm
GHSA-w36g-q975-37rg
Improper Input Validation (RCE)
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
{'CVE-2021-26814'}
2021-03-12T22:48:12Z
2021-03-18T19:30:20Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26814', 'https://github.com/wazuh/wazuh/releases/tag/v4.0.4', 'https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html'}
null
npm
GHSA-g7h8-p22m-2rvx
Prototype Pollution in flat-wrap
All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:16Z
2020-09-04T15:08:46Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1327'}
null
npm
GHSA-mfcp-34xw-p57x
Authentication Bypass in saml2-js
Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely. ## Recommendation Upgrade to version 2.0.5 or later.
null
2021-09-29T20:12:42Z
2020-09-03T21:20:52Z
MODERATE
null
{'CWE-287'}
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/Clever/saml2', 'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637'}
null
npm
GHSA-4964-cjrr-jg97
Malicious Package in jqeury
Version 3.3.1 of `jqeury` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:55:10Z
2020-09-02T21:38:43Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/906'}
null
npm
GHSA-ch52-vgq2-943f
Regular Expression Denial of Service in marked
Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input. ## Recommendation Upgrade to version 0.7.0 or later.
null
2020-08-31T18:46:28Z
2020-09-03T18:15:53Z
LOW
null
null
{'https://www.npmjs.com/advisories/1076'}
null
npm
GHSA-2hpj-g53m-9gj6
Downloads Resources over HTTP in closure-util
Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`. ## Recommendation To mitigate this issue: 1. Install the package using npm's `--ignore-scripts` flag. 2. Navigate to the package directory, and open `default-config.json` in a text editor 3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents 4. run `npm i` in the package directory.
{'CVE-2016-10583'}
2021-08-30T21:55:14Z
2019-02-18T23:58:03Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10583', 'https://nodesecurity.io/advisories/165', 'https://www.npmjs.com/advisories/165', 'https://github.com/advisories/GHSA-2hpj-g53m-9gj6'}
null
npm
GHSA-2mj8-pj3j-h362
Symlink reference outside of node_modules in bin-links
Versions of `bin-links` prior to 1.1.5 are vulnerable to a Symlink reference outside of node_modules. It is possible to create symlinks to files outside of the`node_modules` folder through the `bin` field. This may allow attackers to access unauthorized files. ## Recommendation Upgrade to version 1.1.5 or later.
null
2020-08-31T18:59:12Z
2020-09-04T17:17:39Z
LOW
null
null
{'https://www.npmjs.com/advisories/1435'}
null
npm
GHSA-q4j7-v27r-fgcx
Prototype Pollution in realms-shim
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
{'CVE-2021-23543'}
2022-01-11T18:13:17Z
2022-01-13T15:00:36Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/Agoric/realms-shim', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23543', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908', 'https://www.npmjs.com/package/realms-shim'}
null
npm
GHSA-8cc8-8vvx-fhgw
Downloads Resources over HTTP in jdf-sass
Affected versions of `jdf-sass` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jdf-sass`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10595'}
2021-01-08T19:10:31Z
2019-02-18T23:34:11Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/198', 'https://github.com/advisories/GHSA-8cc8-8vvx-fhgw', 'https://nodesecurity.io/advisories/198', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10595'}
null
npm
GHSA-wqgx-4q47-j2w5
Insecure Cryptography Algorithm in parsel
All versions of `parsel` use an insecure cryptography algorithm. The package uses `aes-256-cbc` without integrity checks, which renders the ciphertext vulnerable to bit-flipping attacks. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
null
2020-08-31T19:00:07Z
2020-09-04T17:36:04Z
CRITICAL
null
{'CWE-327'}
{'https://www.npmjs.com/advisories/1461'}
null
npm
GHSA-7pgq-hhq9-9r27
Directory Traversal in lab6drewfusbyu
Affected versions of `lab6drewfusbyu` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16141'}
2020-08-31T18:24:31Z
2018-07-23T20:48:38Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu', 'https://www.npmjs.com/advisories/474', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16141', 'https://github.com/advisories/GHSA-7pgq-hhq9-9r27', 'https://nodesecurity.io/advisories/474'}
null
npm
GHSA-pfxf-wh96-fvjc
Log Forging in generator-jhipster-kotlin
### Impact We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. ### Patches version 1.7.0. ### Workarounds In `AccountResource.kt` you should change the line ```kotlin log.warn("Password reset requested for non existing mail '$mail'"); ``` to ```kotlin log.warn("Password reset requested for non existing mail"); ``` ### References * https://cwe.mitre.org/data/definitions/117.html * https://owasp.org/www-community/attacks/Log_Injection * https://www.baeldung.com/jvm-log-forging ### For more information If you have any questions or comments about this advisory: * Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin)
{'CVE-2020-4072'}
2021-01-07T23:50:00Z
2020-06-25T20:02:51Z
MODERATE
null
{'CWE-117'}
{'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
null
npm
GHSA-m79w-4mqv-r39f
Downloads Resources over HTTP in windows-seleniumjar
Affected versions of `windows-seleniumjar` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10691'}
2021-01-08T18:30:31Z
2018-07-31T22:06:33Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10691', 'https://github.com/advisories/GHSA-m79w-4mqv-r39f', 'https://www.npmjs.com/advisories/296', 'https://nodesecurity.io/advisories/296'}
null
npm
GHSA-m3j9-p4x2-97q6
Directory Traversal in liyujing
Affected versions of `liyujing` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16120'}
2020-08-31T18:21:22Z
2020-09-01T17:22:49Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing', 'https://www.npmjs.com/advisories/387', 'https://nodesecurity.io/advisories/387', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16120'}
null
npm
GHSA-qp6m-jqfr-2f7v
Malicious Package in babel-laoder
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:17:24Z
2020-09-04T15:27:11Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/babel/babel-loader', 'https://snyk.io/vuln/SNYK-JS-BABELLAODER-536195', 'https://www.npmjs.com/advisories/1348'}
null
npm
GHSA-6m85-wvcr-pgw3
Prototype Pollution in safetydance
All versions of package safetydance are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7737'}
2021-04-22T22:33:20Z
2022-02-10T20:33:49Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7737', 'https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687', 'https://www.npmjs.com/package/safetydance'}
null
npm
GHSA-2pr6-76vf-7546
Denial of Service in js-yaml
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. ## Recommendation Upgrade to version 3.13.0.
null
2021-08-04T21:32:56Z
2019-06-05T14:35:29Z
MODERATE
null
{'CWE-400'}
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://github.com/nodeca/js-yaml/issues/475', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions'}
null
npm
GHSA-x3g3-334f-q6h4
Moderate severity vulnerability that affects editor.md
pandao Editor.md 1.5.0 has DOM XSS via input starting with a "<<" substring, which is mishandled during construction of an A element.
{'CVE-2018-19056'}
2021-09-21T22:01:01Z
2018-11-09T17:41:15Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-x3g3-334f-q6h4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056', 'https://github.com/pandao/editor.md', 'https://github.com/pandao/editor.md/issues/634'}
null
npm
GHSA-mrmf-qwxg-7c3h
XSS in Data URI in remarkable
Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript. ## Proof of Concept ``` [link](data:text/html,<script>alert('0')</script>) ``` ## Recommendation Update to v1.7.0 or later
{'CVE-2017-16006'}
2020-08-31T18:19:08Z
2018-11-09T17:48:20Z
HIGH
null
{'CWE-79'}
{'https://github.com/jonschlinkert/remarkable/issues/227', 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006', 'https://nodesecurity.io/advisories/319', 'https://www.npmjs.com/advisories/319'}
null
npm
GHSA-6394-6h9h-cfjg
Regular Expression Denial of Service
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
null
2021-02-25T17:23:12Z
2019-06-07T21:12:35Z
MODERATE
null
{'CWE-400'}
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
null
npm
GHSA-8vcr-vxm8-293m
Denial of Service in SheetsJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).
{'CVE-2021-32013'}
2022-03-03T05:13:18.637397Z
2021-07-22T19:48:13Z
MODERATE
null
{'CWE-400'}
{'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32013', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
npm
GHSA-cr4x-w2v7-4mmf
Malicious Package in bufver-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:36:13Z
2020-09-03T22:26:13Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1265'}
null
npm
GHSA-2j5x-56p6-hj6x
Path Traversal in statichttpserver
All versions of `statichttpserver` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5480'}
2020-08-31T18:48:50Z
2019-09-04T10:02:14Z
CRITICAL
null
{'CWE-22'}
{'https://hackerone.com/reports/570035', 'https://www.npmjs.com/advisories/1143', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5480'}
null
npm
GHSA-7f5c-rpf4-86p8
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs
The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.
{'CVE-2021-32822'}
2021-08-26T17:12:06Z
2021-09-02T17:16:46Z
MODERATE
null
{'CWE-538', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32822', 'https://github.com/pillarjs/hbs', 'https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/'}
null
npm
GHSA-2x4q-6jfv-8h9h
Path Traversal in glance
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`. ## Recommendation Update to version 3.0.4 or later.
{'CVE-2018-3715'}
2020-08-31T18:29:00Z
2018-07-26T14:53:14Z
HIGH
null
{'CWE-22'}
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://hackerone.com/reports/310106', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://www.npmjs.com/advisories/590', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h'}
null
npm
GHSA-63q7-h895-m982
Cross-site Scripting in dompurify
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
{'CVE-2020-26870'}
2022-04-28T17:58:51Z
2020-12-18T22:51:40Z
MODERATE
null
{'CWE-79'}
{'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://github.com/cure53/DOMPurify', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
null
npm
GHSA-8fw4-xh83-3j6q
Cross-Site Scripting in diagram-js
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript. ## Recommendation If you are using diagram-js 3.x, upgrade to version 3.3.1. If you are using diagram-js 2.x, upgrade to version 2.6.2.
null
2021-09-28T16:58:42Z
2020-09-11T21:18:05Z
MODERATE
null
{'CWE-79'}
{'https://github.com/bpmn-io/diagram-js', 'https://www.npmjs.com/advisories/982'}
null
npm
GHSA-f698-m2v9-5fh3
Command Injection in opencv
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands. ## Recommendation Upgrade to version 6.1.0.
null
2020-08-31T18:35:50Z
2019-06-04T20:11:44Z
LOW
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/789', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
null
npm
GHSA-xj6r-2jpm-qvxp
Code injection issue for java-spring-cloud-stream-template
The following was initially reported by @jonaslagoni: Given the following command: `ag ./dummy.json @asyncapi/java-spring-cloud-stream-template --force-write --output ./output` With the following AsyncAPI document: ```json { "asyncapi": "2.0.0", "info": { "title": "Streetlight", "version": "1.0.0" }, "defaultContentType": "json", "channels": { "security/audit/channel": { "description": "Channel for the turn on command which should turn on the streetlight", "parameters": { "streetlight_id": { "description": "The ID of the streetlight", "schema": { "type": "string" } } }, "publish": { "operationId": "test() { System.out.println(\"injected\"); return test(0); }\n public Consumer<CustomClass> someothername", "message": { "name": "TurnonCommand", "payload": { "$ref": "#/components/schemas/CustomClass" } } } } }, "components": { "schemas" : { "CustomClass": { "type": "object", "properties": { "prop": { "type": "string" } } } } } } ``` Which changes the following output: ```java ... @Bean public Consumer<CustomClass> test() { // Add business logic here. return null; } ... ``` To ```java ... @Bean public Consumer<CustomClass> test() { System.out.println("injected"); return someothername(); } public Consumer<CustomClass> someothername() { // Add business logic here. return null; } ... ```
{'CVE-2021-37694'}
2021-08-24T18:50:59Z
2021-08-25T14:45:52Z
HIGH
null
{'CWE-94'}
{'https://github.com/asyncapi/java-spring-cloud-stream-template', 'https://github.com/asyncapi/java-spring-cloud-stream-template/security/advisories/GHSA-xj6r-2jpm-qvxp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37694'}
null
npm
GHSA-3c48-6pcv-88rm
Macro in MathJax running untrusted Javascript within a web browser
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
{'CVE-2018-1999024'}
2022-04-26T18:17:56Z
2018-07-27T17:05:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mathjax/MathJax', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024'}
null
npm
GHSA-r9p9-mrjm-926w
Use of a Broken or Risky Cryptographic Algorithm
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
{'CVE-2020-28498'}
2021-03-08T16:02:43Z
2021-03-08T16:06:50Z
MODERATE
null
{'CWE-327'}
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
null
npm
GHSA-72hv-rp4q-q7f3
Hijacked Environment Variables in babelcli
The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16060'}
2020-08-31T18:25:29Z
2018-08-29T23:57:14Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16060', 'https://nodesecurity.io/advisories/499', 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3', 'https://www.npmjs.com/advisories/499'}
null
npm
GHSA-4w46-w44m-3jq3
Parse Server stores password in plain text
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
{'CVE-2020-26288'}
2021-01-07T22:32:25Z
2020-12-28T16:33:17Z
LOW
null
{'CWE-312'}
{'https://www.npmjs.com/advisories/1593', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
null
npm
GHSA-6cgh-hjpw-q3gq
Utils.readChallengeTx does not verify the server account signature
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
{'CVE-2021-32738'}
2021-07-02T18:25:08Z
2021-07-02T19:20:33Z
MODERATE
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3'}
null
npm
GHSA-j49g-mp79-5vm5
Exfiltrates data on installation in coffe-script
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffe-script` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16203'}
2021-01-08T18:37:35Z
2018-08-06T20:06:29Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-j49g-mp79-5vm5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203', 'https://www.npmjs.com/advisories/543', 'https://nodesecurity.io/advisories/543'}
null
npm
GHSA-792j-9wj3-j634
Command injection in github-todos
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
{'CVE-2021-44684'}
2021-12-08T20:28:47Z
2021-12-10T20:30:52Z
MODERATE
null
null
{'https://github.com/dwisiswant0/advisory/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44684', 'https://github.com/naholyr/github-todos/issues/34'}
null
npm
GHSA-jgrx-mgxx-jf9v
Regular Expression Denial of Service in tmpl
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
{'CVE-2021-3777'}
2022-05-04T03:26:16Z
2021-09-20T20:27:52Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://github.com/daaku/nodejs-tmpl', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
null
npm
GHSA-qg3g-2mgh-33j8
Sensitive Data Exposure in msrcrypto
Versions of `msrcrypto` prior to 1.4.1 are vulnerable to Sensitive Data Exposure. The package's Elliptic Curve Cryptography (ECC) implementation may leak information about a server's private ECC key. It can also allow attackers to craft invalid ECDSA signatures that pass as valid. There is no published proof-of-concept for this vulnerability. ## Recommendation Upgrade to version 1.4.1 or later.
{'CVE-2018-8319'}
2021-09-16T19:58:01Z
2018-09-10T15:19:49Z
CRITICAL
null
{'CWE-682'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8319', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8319', 'http://www.securitytracker.com/id/1041268', 'https://www.npmjs.com/advisories/1112', 'https://github.com/advisories/GHSA-qg3g-2mgh-33j8', 'http://www.securityfocus.com/bid/104655'}
null
npm
GHSA-fw5f-7c6c-3vmv
Cross-site Scripting in PrimeFaces
An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.
{'CVE-2020-10544'}
2021-05-03T20:39:02Z
2021-05-07T16:16:30Z
MODERATE
null
{'CWE-79'}
{'https://github.com/primefaces/primefaces/issues/5642', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10544'}
null
npm
GHSA-vm67-mh96-95mq
Malicious Package in bubfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:53:43Z
2020-09-03T21:40:48Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1232'}
null
npm
GHSA-rhwf-hqpr-q8g2
Code Injection in script-manager
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.
{'CVE-2020-8129'}
2021-04-07T19:36:21Z
2021-04-13T15:24:38Z
HIGH
null
{'CWE-94'}
{'https://hackerone.com/reports/660563', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8129'}
null
npm
GHSA-8m2f-74r2-x3f2
Code injection in accesslog
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
{'CVE-2022-25760'}
2022-03-18T22:41:34Z
2022-03-18T00:01:10Z
HIGH
null
{'CWE-94'}
{'https://github.com/carlos8f/node-accesslog', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25760', 'https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6', 'https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099'}
null
npm
GHSA-w8qv-6jwh-64r5
Regular Expression Denial of Service in browserslist
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
{'CVE-2021-23364'}
2021-05-20T22:03:36Z
2021-05-24T19:52:40Z
MODERATE
null
{'CWE-400'}
{'https://github.com/browserslist/browserslist/pull/593', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364'}
null
npm
GHSA-77qv-gh6f-pgh4
Command Injection in Limdu
### Impact The `trainBatch` function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. ### Patches Patched in version 0.95. ### Workarounds Do not use trainBatch with classifiers that rely on shell execution, such as SVM Perf, SVM Linear or Adaboost ### References No
{'CVE-2020-4066'}
2021-01-07T23:50:29Z
2020-06-22T15:24:06Z
LOW
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4066', 'https://github.com/erelsgl/limdu/security/advisories/GHSA-77qv-gh6f-pgh4'}
null
npm
GHSA-8h84-8j4f-p97q
Injection in bodymen
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10792'}
2021-04-07T20:24:23Z
2021-04-13T15:24:21Z
MODERATE
null
{'CWE-74'}
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}
null
npm
GHSA-mxjr-xmcg-fg7w
Arbitrary Code Injection in mobile-icon-resizer
mobile-icon-resizer resizes large images for use as icons for iOS and Android. mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3. mobile-icon-resizer takes an options object as an argument to define the resulting icons as such: ``` var options = { config: './config.js' } resize(options, function(err){}); ``` config.js would need to be a file on the filesystem and look something like: ``` var config = { iOS: { "images": [ /* iOS image definitions are not vulnerable */ ] }, android: { "images" : [ { "baseRatio" : "console.log('Executing script as baseRatio property')", "folder" : "drawable-ldpi" }, { "ratio" : "console.log('Executing script as ratio property')", "folder" : "drawable-mdpi" }, /* other android image defintiions ... */ ] } }; exports = module.exports = config; ``` The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed. ## Recommendation Update to version 0.4.3 or later.
null
2021-08-17T15:41:58Z
2019-06-27T17:25:21Z
MODERATE
null
{'CWE-94'}
{'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f', 'https://www.npmjs.com/advisories/317'}
null
npm
GHSA-rq8g-5pc5-wrhr
Insufficient Entropy in cryptiles
Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed. ## Recommendation Upgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package.
{'CVE-2018-1000620'}
2021-09-17T19:26:13Z
2018-09-11T18:22:50Z
CRITICAL
null
{'CWE-331'}
{'https://github.com/advisories/GHSA-rq8g-5pc5-wrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000620', 'https://www.npmjs.com/advisories/1464', 'https://github.com/hapijs/cryptiles/issues/34', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/476.json', 'https://www.npmjs.com/advisories/720', 'https://github.com/hapijs/cryptiles'}
null
npm
GHSA-cgvm-rvfv-c92r
Malicious Package in ecuvre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:01:46Z
2020-09-03T17:05:51Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1396'}
null
npm
GHSA-g95j-p8f6-pwh4
Downloads Resources over HTTP in headless-browser-lite
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`. ## Recommendation Update to version 2015.4.18-a or later.
{'CVE-2016-10625'}
2021-06-10T23:42:13Z
2019-02-18T23:56:58Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://nodesecurity.io/advisories/230', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'}
null
npm
GHSA-jvf4-g24p-2qgw
Arbitrary Code Execution in shiba
"All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad()."
{'CVE-2020-7738'}
2021-04-22T22:20:49Z
2021-05-10T18:37:34Z
HIGH
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-SHIBA-596466', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7738', 'https://www.npmjs.com/package/shiba'}
null
npm
GHSA-mwj7-r5vc-hmc9
Directory Traversal in hcbserver
Affected versions of `hcbserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16171'}
2020-08-31T18:22:13Z
2020-09-01T17:35:38Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver', 'https://www.npmjs.com/advisories/414', 'https://nodesecurity.io/advisories/414', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16171'}
null
npm
GHSA-2hw7-mxvj-m455
Path traversal in Node-RED-Dashboard
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
{'CVE-2021-3223'}
2021-01-27T23:26:39Z
2021-01-29T18:13:52Z
HIGH
null
{'CWE-22'}
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}
null
npm
GHSA-ww39-953v-wcq6
Regular expression denial of service in glob-parent
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
{'CVE-2020-28469'}
2022-03-30T21:18:41Z
2021-06-07T21:56:34Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905', 'https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9', 'https://github.com/gulpjs/glob-parent', 'https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092', 'https://github.com/gulpjs/glob-parent/pull/36', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28469', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
npm
GHSA-x2jj-x3q2-7hph
Directory Traversal in 11xiaoli
Affected versions of `11xiaoli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16160'}
2020-08-31T18:21:41Z
2020-09-01T17:28:09Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli', 'https://www.npmjs.com/advisories/395', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16160', 'https://nodesecurity.io/advisories/395'}
null
npm
GHSA-fpw3-x4xq-6vxq
Malicious Package in wepack-cli
All versions of `wepack-cli` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:46:23Z
2020-09-02T18:32:13Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/839'}
null
npm
GHSA-4v9w-pvwr-38h3
OS Command Injection in strong-nginx-controller
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
{'CVE-2020-7621'}
2021-07-28T21:54:53Z
2022-02-10T23:36:54Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7621', 'https://github.com/strongloop/strong-nginx-controller/blob/master/lib/server.js#L65,', 'https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248'}
null
npm
GHSA-j44m-qm6p-hp7m
Arbitrary File Overwrite in tar
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. ## Recommendation For tar 4.x, upgrade to version 4.4.2 or later. For tar 2.x, upgrade to version 2.2.2 or later.
{'CVE-2018-20834'}
2021-08-03T21:28:27Z
2019-05-01T18:37:31Z
HIGH
null
{'CWE-59'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://hackerone.com/reports/344595', 'https://www.npmjs.com/advisories/803', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://access.redhat.com/errata/RHSA-2019:1821'}
null
npm
GHSA-2w3f-9w3q-qw77
Prototype Pollution in config-handler
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.
{'CVE-2021-23448'}
2021-10-20T17:12:24Z
2021-10-12T18:30:37Z
CRITICAL
null
{'CWE-913'}
{'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947', 'https://github.com/jarradseers/config-handler/issues/1', 'https://github.com/jarradseers/config-handler', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448'}
null
npm
GHSA-hqq7-2q2v-82xq
Cross-site Scripting in sanitize-url
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
{'CVE-2021-23648'}
2022-03-21T17:20:05Z
2022-03-17T00:00:24Z
MODERATE
null
{'CWE-79'}
{'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://github.com/braintree/sanitize-url', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882'}
null
npm
GHSA-5wg4-74h6-q47v
Integer Overflow or Wraparound and Use of a Broken or Risky Cryptographic Algorithm in bcrypt
In bcrypt (npm package) before version 5.0.0, data is truncated wrong when its length is greater than 255 bytes.
{'CVE-2020-7689'}
2021-07-29T20:49:30Z
2020-08-20T14:38:49Z
MODERATE
null
{'CWE-327', 'CWE-190'}
{'https://github.com/kelektiv/node.bcrypt.js/pull/806', 'https://github.com/kelektiv/node.bcrypt.js/issues/776', 'https://github.com/kelektiv/node.bcrypt.js/pull/807', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7689', 'https://snyk.io/vuln/SNYK-JS-BCRYPT-572911'}
null
npm
GHSA-qj3f-9gmq-fwv5
Cross-Site Scripting in simple-markdown
Versions of `simple-markdown` prior to 0.4.4 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization the package may render output containing malicious JavaScript. This vulnerability can be exploited through input of links containing `data` or VBScript URIs and a base64-encoded payload. ## Recommendation Upgrade to version 0.4.4 or later.
{'CVE-2019-9844'}
2021-09-16T20:02:36Z
2019-04-09T19:47:29Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Khan/simple-markdown/pull/63', 'https://www.npmjs.com/advisories/815', 'https://github.com/advisories/GHSA-qj3f-9gmq-fwv5', 'https://www.npmjs.com/package/simple-markdown/v/0.4.4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFLP3KJVSV5VWMNEBRXLGRVYFXOV5KOG/', 'https://github.com/Khan/simple-markdown', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZG2I7VH7WLSEUQ77KYP5CRAVFT2RK2U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5EFW655O3BXZYAPB65XEREXB2DSNSOT/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9844'}
null
npm
GHSA-jxf5-7x3j-8j9m
Malicious Package in load-from-cwd-or-npm
Version 3.0.2 of `load-from-cwd-or-npm` contains malicious code. The malware breaks functionality of the `purescript-installer` package by injecting targeted code. ## Recommendation Upgrade to version 3.0.4 or later. There is no indication of further compromise.
null
2021-09-30T20:05:11Z
2020-09-03T18:19:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1082'}
null
npm
GHSA-2589-w6xf-983r
Cross-site scripting in react-bootstrap-table
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
{'CVE-2021-23398'}
2021-07-01T21:48:39Z
2021-12-10T18:58:49Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23398', 'https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118', 'https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286', 'https://github.com/AllenFang/react-bootstrap-table/issues/2071'}
null
npm
GHSA-82mg-x548-gq3j
LDAP Injection in ldapauth
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter. ## Recommendation ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
{'CVE-2015-7294'}
2021-09-23T19:58:02Z
2020-08-31T22:49:46Z
HIGH
null
{'CWE-90'}
{'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'http://www.openwall.com/lists/oss-security/2015/09/18/4', 'https://github.com/vesse/node-ldapauth-fork', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'https://www.npmjs.com/advisories/19'}
null
npm
GHSA-88h9-fc6v-jcw7
Unintended Require in larvitbase-www
All versions of `larvitbase-www` are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:49:17Z
2020-09-03T20:28:51Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1156', 'https://hackerone.com/reports/526258'}
null
npm
GHSA-4662-j96g-mv46
Arbitrary Code Injection in reduce-css-calc
Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server. ## Proof of Concept ``` const reduceCSSCalc = require('reduce-css-calc'); console.log(reduceCSSCalc(`calc( (Buffer(10000)))`)); console.log(reduceCSSCalc(`calc( (global['fs'] = require('fs')))`)); console.log(reduceCSSCalc(`calc( (fs['readFileSync']("/etc/passwd", "utf-8")))`)); ``` ## Recommendation Update to version 1.2.5 or later.
{'CVE-2016-10548'}
2020-08-31T18:12:20Z
2018-06-07T19:43:06Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/advisories/GHSA-4662-j96g-mv46', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10548', 'https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9', 'https://nodesecurity.io/advisories/144', 'https://www.npmjs.com/advisories/144'}
null
npm
GHSA-5wq6-v5cw-jvfr
Malicious Package in js-shas
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:12:55Z
2020-09-03T23:03:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1285'}
null
npm
GHSA-w5q7-3pr9-x44w
Denial of Service in serialize-to-js
Versions of `serialize-to-js` prior to 2.0.0 are vulnerable to Denial of Service. User input is not properly validated, allowing attackers to provide inputs that lead the execution to loop indefinitely. ## Recommendation Upgrade to version 2.0.0 or later.
null
2020-08-31T18:35:52Z
2020-09-02T15:59:19Z
HIGH
null
null
{'https://www.npmjs.com/advisories/790'}
null
npm
GHSA-crfh-jmv2-2f9v
Malicious Package in singale
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:43:43Z
2020-09-03T17:03:11Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1411'}
null
npm
GHSA-7frv-9phw-vrvr
Authorization bypass in Strapi
admin/src/containers/InputModalStepperProvider/index.js in Strapi before 3.2.5 has unwanted /proxy?url= functionality.
{'CVE-2020-27664'}
2021-04-21T18:06:14Z
2021-05-10T18:43:59Z
CRITICAL
null
{'CWE-862'}
{'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://github.com/strapi/strapi/pull/8442', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27664'}
null
npm
GHSA-wx77-rp39-c6vg
Regular Expression Denial of Service in markdown
All versions of `markdown` are vulnerable to Regular Expression Denial of Service (ReDoS). The `markdown.toHTML()` function has significantly degraded performance when parsing long strings containing underscores. This may lead to Denial of Service if the parser accepts user input. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2022-03-24T22:10:13Z
2020-09-04T15:11:03Z
LOW
null
{'CWE-400'}
{'https://github.com/evilstreak/markdown-js', 'https://www.npmjs.com/advisories/1330'}
null
npm
GHSA-3pcq-34w5-p4g2
forEachSeries and forEachLimit do not limit the number of requests
### Impact This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. ### Patches The problem has been patched in 1.0.4. ### Workarounds There is no workaround aside from upgrading to 1.0.4.
{'CVE-2021-41167'}
2021-10-27T17:05:58Z
2021-10-21T17:49:30Z
HIGH
null
{'CWE-400'}
{'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/nicolas-van/modern-async', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167', 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
null
npm
GHSA-5c6f-jpx7-cwq6
Directory Traversal in enserver
Affected versions of `enserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16209'}
2020-08-31T18:22:38Z
2020-09-01T18:13:11Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/425', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16209', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/enserver', 'https://www.npmjs.com/advisories/425'}
null
npm
GHSA-jp99-5h8w-gmxc
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm
All versions of `@zhaoyao91/eval-in-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:02Z
2020-09-04T15:03:13Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1320'}
null
npm
GHSA-6x8c-mvpv-5366
Directory Traversal in shit-server
Affected versions of `shit-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16147'}
2020-08-31T18:22:50Z
2020-09-01T18:18:32Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16147', 'https://www.npmjs.com/advisories/430', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server', 'https://nodesecurity.io/advisories/430'}
null
npm
GHSA-2c83-wfv3-q25f
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown
### Impact A Remote Command Execution vulnerability was found in the rebber module, which allowed execution of arbitrary commands. The reported problem came from CodeBlocks, which could be escaped to insert malicious LaTeX. Anyone using `rebber` without sanitation of code content or a custom macro is impacted by this vulnerability. Here is an example of a Markdown content that will exploit the vulnerability: ````markdown ``` \end{CodeBlock} \immediate\write18{COMMAND > outputrce} \input{outputrce} \begin{CodeBlock}{text} ``` ```` Will insert into the generated LaTeX the result of executing `COMMAND` on the system. ### Patches The vulnerability has been patched in version 5.2.1. If impacted, you should update to this version as soon as possible. ### Workarounds It is possible to mitigate the vulnerability without upgrading by using a custom code macro. Please make sure this custom macro escapes your closing LaTeX sequence. For the example above, use: ```javascript const escaped = content.replace(new RegExp('\\\\end\\s*{CodeBlock}', 'g'), '') ``` ### For more information If you have any questions or comments about this advisory, open an issue in [ZMarkdown](https://github.com/zestedesavoir/zmarkdown/issues).
null
2021-09-07T14:04:47Z
2021-09-07T23:07:56Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/zestedesavoir/zmarkdown', 'https://github.com/zestedesavoir/zmarkdown/security/advisories/GHSA-2c83-wfv3-q25f'}
null
npm
GHSA-8r4g-cg4m-x23c
Denial of Service in node-static
All versions of node-static are vulnerable to a Denial of Service. The package fails to catch an exception when user input includes null bytes. This allows attackers to access `http://host/%00` and crash the server.
null
2021-12-20T22:16:43Z
2021-09-22T18:22:02Z
MODERATE
null
{'CWE-400', 'CWE-248'}
{'https://www.npmjs.com/package/node-static', 'https://github.com/cloudhead/node-static', 'https://github.com/cloudhead/node-static/pull/213', 'https://www.npmjs.com/advisories/1208', 'https://github.com/cloudhead/node-static/blob/643a528ec7bbd05a59c4030655d94810570afb3f/CHANGES.md#-unreleased'}
null
npm
GHSA-gc25-3vc5-2jf9
Sandbox Breakout / Arbitrary Code Execution in sandbox
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:54:57Z
2020-09-04T15:00:58Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1318'}
null