ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-7p7h-4mm5-852v
|
Regular Expression Denial of Service in trim-newlines
|
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
|
{'CVE-2021-33623'}
|
2022-05-04T03:06:53Z
|
2021-06-07T22:10:39Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1', 'https://github.com/sindresorhus/trim-newlines', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91', 'https://www.npmjs.com/package/trim-newlines', 'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623'}
| null |
npm
|
GHSA-72mh-269x-7mh5
|
Improper Certificate Validation in xmlhttprequest-ssl
|
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
|
{'CVE-2021-31597'}
|
2021-05-20T21:59:29Z
|
2021-05-24T19:52:55Z
|
CRITICAL
| null |
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt'}
| null |
npm
|
GHSA-3r8f-gphx-9m2c
|
Path Traversal in mcstatic
|
All versions of `mcstatic` are vulnerable to path traversal.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
|
{'CVE-2018-3730'}
|
2020-08-31T18:30:58Z
|
2018-07-27T17:04:16Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/312907', 'https://www.npmjs.com/advisories/641', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3730', 'https://github.com/advisories/GHSA-3r8f-gphx-9m2c'}
| null |
npm
|
GHSA-r74q-wqx8-2pr3
|
Downloads Resources over HTTP in nodeschnaps
|
Affected versions of `nodeschnaps` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodeschnaps`.
## Recommendation
Update to version 1.0.3 or later.
|
{'CVE-2016-10622'}
|
2021-01-08T01:58:06Z
|
2019-02-18T23:47:31Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-r74q-wqx8-2pr3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10622', 'https://www.npmjs.com/advisories/212', 'https://nodesecurity.io/advisories/212'}
| null |
npm
|
GHSA-h45p-w933-jxh3
|
Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript
|
### Impact
This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages.
This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages.
For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit.
Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data.
### Patches
Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues.
Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
### Workarounds
None
### For more information
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
| null |
2021-06-01T18:59:14Z
|
2021-06-01T21:20:22Z
|
MODERATE
| null |
{'CWE-347'}
|
{'https://github.com/aws/aws-encryption-sdk-javascript/security/advisories/GHSA-h45p-w933-jxh3'}
| null |
npm
|
GHSA-q4m3-2j7h-f7xw
|
Cross-Site Scripting in jquery
|
Versions of `jquery` prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.9.0 or later.
|
{'CVE-2020-7656'}
|
2021-08-25T21:11:29Z
|
2020-05-20T16:18:01Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-JQUERY-569619', 'https://github.com/jquery/jquery', 'https://security.netapp.com/advisory/ntap-20200528-0001/', 'https://github.com/advisories/GHSA-q4m3-2j7h-f7xw', 'https://www.npmjs.com/advisories/1524', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7656'}
| null |
npm
|
GHSA-6qpr-9mc5-7gch
|
Command Injection in async-git
|
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
|
{'CVE-2020-28490'}
|
2021-03-18T22:57:13Z
|
2021-04-12T19:50:20Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d', 'https://www.npmjs.com/package/async-git', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://github.com/omrilotan/async-git/pull/14'}
| null |
npm
|
GHSA-cfc5-x58f-869w
|
Malicious Package in conistring
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:59:50Z
|
2020-09-03T19:40:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1389'}
| null |
npm
|
GHSA-65j7-66p7-9xgf
|
Malicious Package in font-scrubber
|
Version 1.2.2 of `font-scrubber` contains malicious code as a postinstall script. The package attempts to upload sensitive files from the system to a remote server. The files include configuration files, command history logs, SSH keys and /etc/passwd.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:59:50Z
|
2020-09-02T21:51:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/919'}
| null |
npm
|
GHSA-rv7p-mmwq-x674
|
Improper Input Validation and Code Injection in pdf-image
|
Lack of input validation in pdf-image npm package version <= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input.
|
{'CVE-2020-8132'}
|
2021-04-20T22:13:23Z
|
2021-05-10T18:46:58Z
|
HIGH
| null |
{'CWE-94', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8132', 'https://hackerone.com/reports/781664'}
| null |
npm
|
GHSA-6xm4-p6r2-mwrc
|
Malicious Package in cuffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:14:12Z
|
2020-09-03T22:47:30Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1270'}
| null |
npm
|
GHSA-3jfq-g458-7qm9
|
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`.
This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite.
### Patches
3.2.2 || 4.4.14 || 5.0.6 || 6.1.1
NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case.
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths.
```js
const path = require('path')
const tar = require('tar')
tar.x({
file: 'archive.tgz',
// either add this function...
onentry: (entry) => {
if (path.isAbsolute(entry.path)) {
entry.path = sanitizeAbsolutePathSomehow(entry.path)
entry.absolute = path.resolve(entry.path)
}
},
// or this one
filter: (file, entry) => {
if (path.isAbsolute(entry.path)) {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
|
{'CVE-2021-32804'}
|
2021-08-30T23:14:50Z
|
2021-08-03T19:06:36Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/advisories/1770', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/npm/node-tar'}
| null |
npm
|
GHSA-gc6c-5v9w-xmhw
|
Downloads Resources over HTTP in nodewebkit
|
Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`.
## Recommendation
No patch is currently available, and the package author has deprecated this package.
The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions.
|
{'CVE-2016-10580'}
|
2021-01-08T18:48:13Z
|
2019-02-18T23:51:27Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw', 'https://www.npmjs.com/advisories/173', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10580', 'https://nodesecurity.io/advisories/173'}
| null |
npm
|
GHSA-xwqw-rf2q-xmhf
|
Cross-Site Scripting in buefy
|
Versions of buefy prior to 0.7.2 are vulnerable to Cross-Site Scripting, allowing attackers to manipulate the DOM and execute remote code. The autocomplete list renders user input as HTML without encoding.
## Recommendation
Upgrade to version 0.7.2 or later.
| null |
2021-09-24T22:00:38Z
|
2020-09-01T21:23:38Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/buefy/buefy/issues/1097', 'https://github.com/buefy/buefy', 'https://www.npmjs.com/advisories/747'}
| null |
npm
|
GHSA-4pmg-jgm5-3jg6
|
Malicious Package in erquest
|
All versions of `erquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T21:14:54Z
|
2020-09-02T21:16:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/871'}
| null |
npm
|
GHSA-fm87-46vv-jqrr
|
Path Traversal in html-pages
|
Versions of `html-pages` before 2.1.0 are vulnerable to path traversal.
## Recommendation
Update to version 2.1.0 or later.
|
{'CVE-2018-3744'}
|
2020-08-31T18:31:55Z
|
2018-09-18T13:45:07Z
|
HIGH
| null |
{'CWE-35'}
|
{'https://github.com/danielcardoso/html-pages/issues/2', 'https://github.com/advisories/GHSA-fm87-46vv-jqrr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3744', 'https://www.npmjs.com/advisories/665', 'https://hackerone.com/reports/306607'}
| null |
npm
|
GHSA-v95x-h953-x7fg
|
Malicious Package in k0a_multer
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:19:28Z
|
2020-09-03T19:47:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1130'}
| null |
npm
|
GHSA-8fr3-hfg3-gpgp
|
Open Redirect in node-forge
|
parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path.
|
{'CVE-2022-0122'}
|
2022-01-13T18:49:59Z
|
2022-01-21T23:36:19Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://github.com/digitalbazaar/forge'}
| null |
npm
|
GHSA-mgff-xpg3-3gwc
|
Malicious Package in bsae-x
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:57:02Z
|
2020-09-03T19:42:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1380'}
| null |
npm
|
GHSA-r683-j2x4-v87g
|
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
|
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
|
{'CVE-2022-0235'}
|
2022-01-18T22:51:22Z
|
2022-01-21T23:55:52Z
|
HIGH
| null |
{'CWE-173', 'CWE-601', 'CWE-200'}
|
{'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235', 'https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7', 'https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60', 'https://github.com/node-fetch/node-fetch/pull/1453', 'https://github.com/node-fetch/node-fetch'}
| null |
npm
|
GHSA-32j9-6qqm-mq9g
|
Unhandled case in node-lmdb
|
The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check.
|
{'CVE-2022-21164'}
|
2022-03-30T20:16:16Z
|
2022-03-17T00:00:27Z
|
HIGH
| null |
{'CWE-241', 'CWE-703'}
|
{'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a', 'https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164', 'https://github.com/Venemo/node-lmdb'}
| null |
npm
|
GHSA-j7cg-h9v9-6vqp
|
"Prototype Pollution in irrelon-path and @irrelon/path"
|
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions.
|
{'CVE-2020-7708'}
|
2021-05-05T21:25:03Z
|
2021-05-06T17:29:19Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673', 'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7708', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672'}
| null |
npm
|
GHSA-7rg2-qxmf-hhx9
|
Session fixation in express-openid-connect
|
### Overview
Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities.
### Am I affected?
You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store.
### How to fix that?
Upgrade to version `>= 2.5.2`.
### Will this update impact my users?
The fix provided in patch will not affect your users.
|
{'CVE-2021-41246'}
|
2021-12-15T15:28:49Z
|
2021-12-09T19:08:58Z
|
MODERATE
| null |
{'CWE-384'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41246', 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f', 'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2', 'https://github.com/auth0/express-openid-connect', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9'}
| null |
npm
|
GHSA-5v2h-r2cx-5xgj
|
Inefficient Regular Expression Complexity in marked
|
### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from 'marked';
console.log(marked.parse(`[x]: x
\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](`));
```
_Who is impacted?_
Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.
### Patches
_Has the problem been patched?_
Yes
_What versions should users upgrade to?_
4.0.10
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources.
### References
_Are there any links users can visit to find out more?_
- https://marked.js.org/using_advanced#workers
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [marked](https://github.com/markedjs/marked)
|
{'CVE-2022-21681'}
|
2022-01-14T19:57:17Z
|
2022-01-14T21:04:46Z
|
HIGH
| null |
{'CWE-1333'}
|
{'https://github.com/markedjs/marked', 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681', 'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj'}
| null |
npm
|
GHSA-3wxq-7r8m-qpmg
|
Hijacked Environment Variables in ffmepg
|
The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16068'}
|
2020-08-31T18:25:45Z
|
2018-08-29T23:56:30Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/507', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068', 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg', 'https://www.npmjs.com/advisories/507'}
| null |
npm
|
GHSA-c7hr-j4mj-j2w6
|
Verification Bypass in jsonwebtoken
|
Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.
## Recommendation
Update to version 4.2.2 or later.
|
{'CVE-2015-9235'}
|
2020-08-31T18:07:57Z
|
2018-10-09T00:38:30Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9235', 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687', 'https://nodesecurity.io/advisories/17', 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html', 'https://github.com/advisories/GHSA-c7hr-j4mj-j2w6', 'https://www.npmjs.com/advisories/17'}
| null |
npm
|
GHSA-f5mh-hq6h-whxv
|
Directory Traversal in bitty
|
Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests.
## Recommendation
The `bitty` package is not currently maintained, and has not seen an update since 2015.
At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve).
|
{'CVE-2016-10561'}
|
2021-01-08T21:04:46Z
|
2019-02-18T23:38:29Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10561', 'https://nodesecurity.io/advisories/150', 'https://www.npmjs.com/advisories/150', 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv'}
| null |
npm
|
GHSA-h9rv-jmmf-4pgx
|
Cross-Site Scripting in serialize-javascript
|
Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 2.1.1 or later.
|
{'CVE-2019-16769'}
|
2021-01-08T18:42:22Z
|
2019-12-05T18:44:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1426', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769', 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx', 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}
| null |
npm
|
GHSA-f8fh-8rgm-227h
|
OS Command Injection in node-prompt-here
|
node-prompt-here through 1.0.1 allows execution of arbitrary commands. The "runCommand()" is called by "getDevices()" function in file "linux/manager.js", which is required by the "index. process.env.NM_CLI" in the file "linux/manager.js". This function is used to construct the argument of function "execSync()", which can be controlled by users without any sanitization.
|
{'CVE-2020-7602'}
|
2021-07-28T20:46:04Z
|
2021-05-07T16:16:16Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7602'}
| null |
npm
|
GHSA-xqfm-ff6g-24c7
|
Directory Traversal in dgard8.lab6
|
Affected versions of `dgard8.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16218'}
|
2020-08-31T18:23:23Z
|
2018-07-23T20:39:44Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/444', 'https://github.com/advisories/GHSA-xqfm-ff6g-24c7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16218', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6', 'https://www.npmjs.com/advisories/444'}
| null |
npm
|
GHSA-8xxm-h73r-ghfj
|
Validation bypass in frourio
|
## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。
### さらなる情報
このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。
* [frourio](https://github.com/frouriojs/frourio)にIssueを開く。
## English
### Impact
Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives)
### Patches
Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project.
### Workarounds
Validate objects from request with class-transformer in controllers by yourself, or prevent using validators.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [frourio](https://github.com/frouriojs/frourio)
|
{'CVE-2022-23623'}
|
2022-02-14T22:32:53Z
|
2022-02-07T22:37:45Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23623', 'https://github.com/frouriojs/frourio', 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af', 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj'}
| null |
npm
|
GHSA-7xvg-m3vx-2hhv
|
Downloads Resources over HTTP in webrtc-native
|
Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`.
## Recommendation
No direct patch is currently available for this vulnerability.
However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download.
The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source).
|
{'CVE-2016-10600'}
|
2021-01-08T19:13:15Z
|
2019-02-18T23:50:26Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/176', 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600', 'https://www.npmjs.com/advisories/176'}
| null |
npm
|
GHSA-f2jw-pr2c-9x96
|
Code injection in @rkesters/gnuplot
|
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
|
{'CVE-2021-29369'}
|
2022-05-04T03:05:58Z
|
2022-02-10T23:41:49Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29369', 'https://www.npmjs.com/package/@rkesters/gnuplot'}
| null |
npm
|
GHSA-m7qm-r2r5-f77q
|
Cross-Site Scripting in react-marked-markdown
|
All versions of `react-marked-markdown` are vulnerable to cross-site scripting (XSS) via `href` attributes. This is exploitable if user is provided to `react-marked-markdown`
Proof of concept:
```
import React from 'react'
import ReactDOM from 'react-dom'
import { MarkdownPreview } from 'react-marked-markdown'
ReactDOM.render(
<MarkdownPreview
markedOptions={{ sanitize: true }}
value={'[XSS](javascript: alert`1`)'}
/>,
document.getElementById('root')
)
```
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time if you allow user input into href values.
| null |
2021-09-24T20:35:29Z
|
2020-09-01T20:43:48Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/344069', 'https://www.npmjs.com/advisories/668', 'https://github.com/Vincent-P/react-marked-markdown/issues/61', 'https://github.com/Vincent-P/react-marked-markdown'}
| null |
npm
|
GHSA-7xf9-74cp-8hx3
|
Malicious Package in js-cha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:00:58Z
|
2020-09-03T22:59:21Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1281'}
| null |
npm
|
GHSA-hpmr-g4pq-jhgp
|
Denial of service in chrono-node
|
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
|
{'CVE-2021-23371'}
|
2021-04-23T18:47:21Z
|
2021-05-06T15:58:05Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-CHRONONODE-1083228', 'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23371', 'https://github.com/wanasit/chrono/issues/382'}
| null |
npm
|
GHSA-m9jw-237r-gvfv
|
SQL Injection in sequelize
|
Affected versions of `sequelize` are vulnerable to SQL Injection. The function `sequelize.json()` incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example:
```return User.findAll({
where: this.sequelize.json("data.id')) AS DECIMAL) = 1 DELETE YOLO INJECTIONS; -- ", 1)
});```
## Recommendation
If you are using `sequelize` 5.x, upgrade to version 5.15.1 or later.
If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later.
|
{'CVE-2019-10752'}
|
2021-08-18T21:54:56Z
|
2019-10-25T19:43:16Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e', 'https://github.com/sequelize/sequelize/commit/9bd0bc1,', 'https://www.npmjs.com/advisories/1146', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10752', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751,', 'https://github.com/sequelize/sequelize/pull/11329'}
| null |
npm
|
GHSA-4xgp-xrg3-c73w
|
Malicious Package in commqnder
|
All versions of `commqnder` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-30T22:02:56Z
|
2020-09-11T21:10:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/924'}
| null |
npm
|
GHSA-hj3m-v758-jwx5
|
Path Traversal in http-server-node
|
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
|
{'CVE-2021-23797'}
|
2022-01-04T18:43:28Z
|
2022-01-05T15:02:43Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656', 'https://github.com/yan-loong/http-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23797'}
| null |
npm
|
GHSA-m5h6-hr3q-22h5
|
npm Token Leak in npm
|
Affected versions of the `npm` package include the bearer token of the logged in user in every request made by the CLI, even if the request is not directed towards the user's active registry.
An attacker could create an HTTP server to collect tokens, and by various means including but not limited to install scripts, cause the npm CLI to make a request to that server, which would compromise the user's token.
This compromised token could be used to do anything that the user could do, including publishing new packages.
## Recommendation
1. Update npm with `npm install npm@latest -g`
2. [Revoke your Tokens](https://www.npmjs.com/settings/tokens)
3. Enable [Two-Factor Authentication](https://docs.npmjs.com/getting-started/using-two-factor-authentication)
|
{'CVE-2016-3956'}
|
2020-08-31T18:10:47Z
|
2018-07-31T22:58:35Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-3956', 'https://github.com/npm/npm/issues/8380', 'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29', 'http://www-01.ibm.com/support/docview.wss?uid=swg21980827', 'https://github.com/advisories/GHSA-m5h6-hr3q-22h5', 'https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401', 'https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/', 'http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability', 'https://www.npmjs.com/advisories/98'}
| null |
npm
|
GHSA-r9vm-rhmf-7hxx
|
OS Command Injection in im-resize
|
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
|
{'CVE-2019-10787'}
|
2021-03-29T23:01:10Z
|
2021-04-13T15:17:06Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10787', 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03', 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183'}
| null |
npm
|
GHSA-5g6j-8hv4-vfgj
|
Cross-Site Scripting in node-red
|
Versions of `node-red` prior to 0.18.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new items, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 0.18.6 or later.
| null |
2020-08-31T18:43:22Z
|
2020-09-11T21:21:19Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/349146', 'https://www.npmjs.com/advisories/993'}
| null |
npm
|
GHSA-wjpj-gmc3-5w56
|
Malicious Package in buvfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T15:46:02Z
|
2020-09-03T22:30:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1268'}
| null |
npm
|
GHSA-w65v-hx54-xrqx
|
Malicious Package in midway-xtpl
|
All versions of `midway-xtpl` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:35Z
|
2020-09-03T17:41:23Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1057'}
| null |
npm
|
GHSA-cr5w-6rv4-r2qg
|
Malicious Package in maleficent
|
All versions of `maleficent` contain malicious code. The package is a demonstration of possible risks when installing npm packages. It gathers system information such as: environment variables, OS information, network interface, AWS credentials, npm credentials and ssh keys. The package prints the information to a local file but does not upload it to a remote server.
## Recommendation
Remove the package from your environment. There is no further compromise.
| null |
2021-09-30T21:58:48Z
|
2020-09-03T02:37:45Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/951'}
| null |
npm
|
GHSA-wv39-cgmm-cq29
|
Malicious Package in buffmr-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:27:19Z
|
2020-09-03T22:23:00Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1261'}
| null |
npm
|
GHSA-rx32-c25r-79mx
|
Directory Traversal in serverhuwenhui
|
Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16102'}
|
2020-08-31T18:20:36Z
|
2020-09-01T16:54:41Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16102', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui', 'https://nodesecurity.io/advisories/366', 'https://www.npmjs.com/advisories/366'}
| null |
npm
|
GHSA-x3m6-rprw-862w
|
Malicious Package in node-buc
|
All versions of `node-buc` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:50Z
|
2020-09-03T17:43:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1059'}
| null |
npm
|
GHSA-6pwf-whc8-hjf6
|
Downloads Resources over HTTP in baryton-saxophone
|
Affected versions of `baryton-saxophone` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `baryton-saxophone`.
## Recommendation
Update to version 3.0.1 or later.
|
{'CVE-2016-10573'}
|
2021-01-08T19:20:39Z
|
2019-02-18T23:35:18Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/240', 'https://www.npmjs.com/advisories/240', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10573', 'https://github.com/advisories/GHSA-6pwf-whc8-hjf6'}
| null |
npm
|
GHSA-gj77-59wh-66hg
|
Regular Expression Denial of Service (ReDoS) in Prism
|
Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS).
### Impact
When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text.
- ASCIIDoc
- ERB
Other languages are __not__ affected and can be used to highlight untrusted text.
### Patches
This problem has been fixed in Prism v1.24.
### References
- PrismJS/prism#2774
- PrismJS/prism#2688
|
{'CVE-2021-32723'}
|
2022-02-08T21:21:38Z
|
2021-06-28T18:33:18Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/PrismJS/prism', 'https://github.com/PrismJS/prism/pull/2688', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32723', 'https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg', 'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/PrismJS/prism/pull/2774'}
| null |
npm
|
GHSA-vmh4-322v-cfpc
|
Cross-Site Scripting in cmmn-js-properties-panel
|
Versions of `cmmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.8.0 or later.
| null |
2020-08-31T18:46:35Z
|
2020-09-03T18:18:06Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1080'}
| null |
npm
|
GHSA-9m87-6fj3-c5xh
|
Untrusted Search Path in PNPM
|
PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
|
{'CVE-2022-26183'}
|
2022-03-30T21:04:52Z
|
2022-03-23T00:00:24Z
|
HIGH
| null |
{'CWE-426'}
|
{'https://github.com/pnpm/pnpm/releases/tag/v6.15.1', 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26183', 'https://github.com/pnpm/pnpm'}
| null |
npm
|
GHSA-m2mx-rfpw-jghv
|
DLL Injection in kerberos
|
Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine.
## Recommendation
Upgrade to version 1.0.0 or later.
| null |
2020-08-31T19:01:58Z
|
2020-09-04T18:01:59Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1514'}
| null |
npm
|
GHSA-c5xm-m64m-f2vq
|
Malicious Package in cxct
|
All versions of `cxct` contain malicious code. The package finds and exfiltrates cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:13:30Z
|
2020-09-04T15:23:47Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1344'}
| null |
npm
|
GHSA-73hr-6785-f5p8
|
Malicious Package in donotinstallthis
|
The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise.
## Recommendation
Remove the package from your environment.
| null |
2021-09-30T21:24:59Z
|
2020-09-02T21:24:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/887'}
| null |
npm
|
GHSA-xqg8-cv3h-xppv
|
SQL Injection in sequelize
|
Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter.
## Proof of Concept
```javascript
Test.findAndCountAll({
where: { id :1 },
order : [['id', 'UNTRUSTED USER INPUT']]
})
```
## Recommendation
Update to version 2.0.0-rc8 or later
|
{'CVE-2015-1369'}
|
2021-09-22T15:12:11Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/33', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369', 'https://github.com/sequelize/sequelize', 'https://nodesecurity.io/advisories/sequelize-sql-injection-order', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/sequelize/sequelize/issues/2906', 'https://github.com/sequelize/sequelize/pull/2919', 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv'}
| null |
npm
|
GHSA-9j49-mfvp-vmhm
|
Code Injection in pac-resolver
|
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
|
{'CVE-2021-23406'}
|
2021-08-25T19:28:31Z
|
2021-09-02T17:10:06Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/TooTallNate/', 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406', 'https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0', 'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506', 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e'}
| null |
npm
|
GHSA-qr4p-c9wr-phr6
|
Prototype pollution in set-in
|
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28273'}
|
2021-03-18T23:53:31Z
|
2021-03-19T21:01:46Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273', 'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28273'}
| null |
npm
|
GHSA-f9vc-q3hh-qhfv
|
Content Injection in remarkable
|
Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used.
### Proof of Concept
Markdown Source:
```
[link](<javascript:alert(1)>)
```
Rendered HTML:
```
<a href="javascript:alert(1)">link</a>
```
## Recommendation
Update to version 1.4.1 or later
|
{'CVE-2014-10065'}
|
2020-08-31T18:08:29Z
|
2020-08-31T22:56:00Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-10065', 'https://www.npmjs.com/advisories/30', 'https://nodesecurity.io/advisories/30', 'https://github.com/jonschlinkert/remarkable/issues/97'}
| null |
npm
|
GHSA-q854-j362-cfq9
|
Cross-site Scripting in jsoneditor
|
Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.
|
{'CVE-2020-23849'}
|
2021-10-08T21:54:35Z
|
2021-10-12T16:22:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/josdejong/jsoneditor/issues/1029', 'https://github.com/josdejong/jsoneditor', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}
| null |
npm
|
GHSA-hp68-xhvj-x6j6
|
Insufficient patch for Regular Expression Denial of Service (ReDoS) to jsx-slack v4.5.1
|
We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack.
This vulnerability affects to jsx-slack v4.5.1 and earlier versions.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources.
```javascript
/** @jsxImportSource jsx-slack */
import { Section } from 'jsx-slack'
console.log(
<Section>
<blockquote>
{[...Array(40)].map(() => (
<p>亜</p>
))}
</blockquote>
</Section>
)
```
v4.5.1 has released by passing the test against ASCII characters but missed the case of multibyte characters.
https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q
### Patches
jsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `<blockquote>` with multibyte characters.
### References
- https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc
### Credits
Thanks to @hieki for finding out this vulnerability.
|
{'CVE-2021-43843'}
|
2022-01-04T20:19:23Z
|
2022-01-06T18:34:18Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2', 'https://github.com/yhatt/jsx-slack/security/', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43843', 'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc'}
| null |
npm
|
GHSA-wmpv-c2jp-j2xg
|
ERC1155Supply vulnerability in OpenZeppelin Contracts
|
When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation.
### Impact
If a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated.
### Patches
A fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
If accurate supply is relevant, do not mint tokens to untrusted receivers.
### Credits
The issue was identified and reported by @ChainSecurityAudits.
### For more information
Read [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown.
If you have any questions or comments about this advisory, email us at security@openzeppelin.com.
| null |
2021-11-15T22:27:38Z
|
2021-11-15T23:28:18Z
|
LOW
| null | null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wmpv-c2jp-j2xg', 'https://github.com/OpenZeppelin/openzeppelin-contracts'}
| null |
npm
|
GHSA-855m-jchh-9qjc
|
Malicious Package in commnader
|
All versions of `commnader` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:01:42Z
|
2020-09-02T20:19:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/850'}
| null |
npm
|
GHSA-7g8m-5qh9-9pgw
|
Directory Traversal in wind-mvc
|
Affected versions of `wind-mvc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16220'}
|
2020-08-31T18:22:20Z
|
2020-09-01T18:07:51Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/417', 'https://nodesecurity.io/advisories/417', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16220', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc'}
| null |
npm
|
GHSA-gvr4-7xgc-gx3w
|
Cross-Site Scripting in fileview
|
All versions of `fileview` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15602'}
|
2020-08-31T18:59:48Z
|
2020-04-01T16:36:15Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/itworkcenter/fileview/pull/2', 'https://www.npmjs.com/advisories/1452', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15602', 'https://github.com/itworkcenter/fileview/issues/1', 'https://hackerone.com/reports/507159'}
| null |
npm
|
GHSA-w5m8-5v9m-xhx5
|
Critical severity vulnerability that affects Haraka
|
Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.
|
{'CVE-2016-1000282'}
|
2021-09-21T17:56:29Z
|
2019-02-12T17:26:10Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/outflanknl/Exploits/blob/master/harakiri-CVE-2016-1000282.py', 'https://github.com/advisories/GHSA-w5m8-5v9m-xhx5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000282'}
| null |
npm
|
GHSA-52c9-458g-whrf
|
Malicious Package in js-3ha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:00:43Z
|
2020-09-03T22:58:17Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1280'}
| null |
npm
|
GHSA-rc77-xxq6-4mff
|
Command Injection in hot-formula-parser
|
Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server.
Parsing the following formula creates a `test` file in the present directory:
`"SUM([(function(){require('child_process').execSync('touch test')})(),2])"`
## Recommendation
Upgrade to version 3.0.1 or later.
|
{'CVE-2020-6836'}
|
2021-08-25T21:04:44Z
|
2020-05-06T19:32:33Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e', 'https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/', 'https://github.com/handsontable/formula-parser', 'https://www.npmjs.com/advisories/1439', 'https://github.com/handsontable/formula-parser/pull/58', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836'}
| null |
npm
|
GHSA-wwf2-5cj8-jx6w
|
Hijacked Environment Variables in nodesqlite
|
The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16049'}
|
2020-08-31T18:25:13Z
|
2018-07-23T20:50:21Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w', 'https://nodesecurity.io/advisories/492', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16049', 'https://www.npmjs.com/advisories/492'}
| null |
npm
|
GHSA-x65c-4fgj-5fc3
|
Cross-site Scripting in pandao
|
pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.
|
{'CVE-2019-14653'}
|
2021-08-17T21:58:07Z
|
2019-08-23T00:05:00Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/pandao/editor.md/issues/715', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653'}
| null |
npm
|
GHSA-536q-8gxx-m782
|
Cross-Site Scripting in dojo
|
Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.2 or later.
|
{'CVE-2010-2273'}
|
2020-08-31T18:42:32Z
|
2019-09-11T23:02:57Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://secunia.com/advisories/40007', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833', 'https://www.npmjs.com/advisories/972', 'https://github.com/dojo/dojo/pull/307', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958', 'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896', 'http://www-01.ibm.com/support/docview.wss?uid=swg21431472', 'http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/', 'https://bugs.dojotoolkit.org/ticket/10773', 'http://bugs.dojotoolkit.org/ticket/10773', 'http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/', 'http://secunia.com/advisories/38964', 'http://www.vupen.com/english/advisories/2010/1281', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856', 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273'}
| null |
npm
|
GHSA-cr8h-x88h-jwj2
|
Downloads Resources over HTTP in wixtoolset
|
Affected versions of `wixtoolset` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wixtoolset`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10663'}
|
2021-01-08T18:55:56Z
|
2019-02-18T23:44:45Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10663', 'https://github.com/wixtoolset/issues/issues/6187', 'https://github.com/advisories/GHSA-cr8h-x88h-jwj2', 'https://www.npmjs.com/advisories/264', 'https://nodesecurity.io/advisories/264'}
| null |
npm
|
GHSA-rjvj-673q-4hfw
|
Command Injection in traceroute
|
All versions of `traceroute` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `trace` function is vulnerable and can be abused if the `host` value is controlled by an attacker.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T20:53:02Z
|
2020-09-04T17:54:31Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/npm:traceroute:20160311', 'https://www.npmjs.com/advisories/1465', 'https://github.com/jaw187/node-traceroute'}
| null |
npm
|
GHSA-q2qh-cgc2-qhr3
|
Directory Traversal in serve
|
Affected versions of `serve` do not properly handle `%2e` (.) and `%2f` (/) characters, and allow the, characters to be used in paths. This can be used to traverse the directory tree and list content of any directory the user running the process has access to.
Mitigating factors:
This vulnerability only allows listing of directory contents and does not allow reading of arbitrary files.
## Recommendation
Update to version 6.4.9 later.
|
{'CVE-2018-3712'}
|
2020-08-31T18:27:50Z
|
2018-07-27T17:07:50Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3712', 'https://github.com/advisories/GHSA-q2qh-cgc2-qhr3', 'https://github.com/zeit/serve/pull/316', 'https://www.npmjs.com/advisories/561', 'https://hackerone.com/reports/307666'}
| null |
npm
|
GHSA-hhff-3c89-5m7p
|
Directory Traversal in byucslabsix
|
Affected versions of `byucslabsix` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16166'}
|
2020-08-31T18:21:50Z
|
2018-07-23T20:45:42Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16166', 'https://nodesecurity.io/advisories/399', 'https://www.npmjs.com/advisories/399', 'https://github.com/advisories/GHSA-hhff-3c89-5m7p'}
| null |
npm
|
GHSA-whjr-jj69-7prm
|
Malicious Package in import-mysql
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:15:59Z
|
2020-09-03T19:44:35Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1127'}
| null |
npm
|
GHSA-rffp-mc78-wjf7
|
Command Injection in cocos-utils
|
All versions of `cocos-utils` are vulnerable to Remote Code Execution. The `unzip()` function concatenates user input to `exec()` which may allow attackers to execute arbitrary commands on the server.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:37:21Z
|
2020-09-02T18:26:48Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/829'}
| null |
npm
|
GHSA-hh8v-jmh3-9437
|
Cross-site scripting in SocksJS-node
|
htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.
|
{'CVE-2020-8823'}
|
2021-04-06T21:51:28Z
|
2021-04-13T15:25:33Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.sockjs.org', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823', 'https://www.npmjs.com/package/sockjs', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}
| null |
npm
|
GHSA-g84j-95x2-7g67
|
Downloads Resources over HTTP in tomita
|
Affected versions of `tomita` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10662'}
|
2021-01-08T18:48:34Z
|
2019-02-18T23:44:50Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10662', 'https://nodesecurity.io/advisories/267', 'https://www.npmjs.com/advisories/267', 'https://github.com/advisories/GHSA-g84j-95x2-7g67'}
| null |
npm
|
GHSA-fj93-7wm4-8x2g
|
Cross-Site Scripting in jquery-mobile
|
All version of `jquery-mobile` are vulnerable to Cross-Site Scripting. The package checks for content in `location.hash` and if a URL is found it does an XmlHttpRequest (XHR) to the URL and renders the response with `innerHTML`. It fails to validate the `Content-Type` of the response, allowing attackers to include malicious payloads as part of query parameters that are reflected back to the user. A response such as `{"q":"<iframe/src='javascript:alert(1)'></iframe>","results":[]}` would be parsed as HTML and the JavaScript payload executed.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-27T21:03:58Z
|
2020-09-02T21:22:47Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/jquery/jquery-mobile/pull/8650', 'https://github.com/jquery/jquery-mobile/', 'https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685', 'https://snyk.io/vuln/SNYK-JS-JQUERYMOBILE-174599', 'https://www.npmjs.com/advisories/883', 'https://github.com/jquery/jquery-mobile/issues/8640', 'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50', 'https://github.com/jquery/jquery-mobile/pull/8649'}
| null |
npm
|
GHSA-gmw6-94gg-2rc2
|
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.
This is accomplished by extracting package contents into a project's `node_modules` folder.
If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system.
Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed.
1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.)
2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe.
### Patches
2.8.2 (included in npm v7.20.7 and above)
### Workarounds
Do not run `npm install` on untrusted codebases, without first ensuring that the `node_modules` directory in the project is not a symbolic link.
### Fix
Prior to extracting any package contents, the `node_modules` folder into which it is extracted is verified to be a real directory. If it is not, then it is removed.
Caveat: if you are currently relying on creating a symbolic link to the `node_modules` folder in order to share dependencies between projects, then that will no longer be possible. Please use the `npm link` command, explicit `file:...` dependencies, and/or `workspaces` to share dependencies in a development environment.
|
{'CVE-2021-39135'}
|
2021-09-08T14:45:22Z
|
2021-08-31T16:03:34Z
|
MODERATE
| null |
{'CWE-61', 'CWE-59'}
|
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/arborist', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2', 'https://www.npmjs.com/package/@npmcli/arborist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39135'}
| null |
npm
|
GHSA-jcgr-9698-82jx
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build
|
### Impact
If you are using the esbuild target or command you are at risk of code/option injection. Attackers can use the command line option to maliciously change your settings in order to damage your project.
### Patches
The problem has been patched in v1.0.0 as it uses a proper method to pass configs to esbuild/estrella.
### Workarounds
There is no work around. You should update asap.
### Notes
This notice is mainly just to make sure people update to the latest version. This isn't that bad, but should encourage you to update.
| null |
2021-05-27T21:05:29Z
|
2021-05-28T15:53:40Z
|
LOW
| null |
{'CWE-77'}
|
{'https://github.com/Floffah/build/security/advisories/GHSA-jcgr-9698-82jx'}
| null |
npm
|
GHSA-394c-5j6w-4xmx
|
Regular Expression Denial of Service (ReDoS) in ua-parser-js
|
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
|
{'CVE-2020-7793'}
|
2021-04-08T21:32:22Z
|
2022-02-09T22:46:53Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7793', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388', 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599'}
| null |
npm
|
GHSA-mg8r-9g6j-hwv9
|
Authentication Bypass in hapi-auth-jwt2
|
Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode.
## Recommendation
Update to version 5.1.2 or later.
|
{'CVE-2016-10525'}
|
2021-09-15T18:58:17Z
|
2019-02-18T23:39:00Z
|
CRITICAL
| null |
{'CWE-287'}
|
{'https://github.com/dwyl/hapi-auth-jwt2/pull/112', 'https://github.com/dwyl/hapi-auth-jwt2/issues/111', 'https://www.npmjs.com/advisories/81', 'https://nodesecurity.io/advisories/81', 'https://github.com/dwyl/hapi-auth-jwt2', 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525'}
| null |
npm
|
GHSA-2mw7-wggm-m6w3
|
Low severity vulnerability that affects ethereumjs-vm
|
ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute.
|
{'CVE-2018-19183'}
|
2021-08-31T19:28:40Z
|
2018-11-21T22:22:46Z
|
HIGH
| null |
{'CWE-119'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19183', 'https://github.com/ethereumjs/ethereumjs-vm/issues/386', 'https://github.com/ethereumjs/ethereumjs-vm', 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3'}
| null |
npm
|
GHSA-q4cq-539c-3mmm
|
Directory Traversal in serveryztyzt
|
Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16103'}
|
2020-08-31T18:20:20Z
|
2020-09-01T16:48:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16103', 'https://nodesecurity.io/advisories/354', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt', 'https://www.npmjs.com/advisories/354'}
| null |
npm
|
GHSA-m33v-338h-4v9f
|
Path traversal in Node-Red
|
### Impact
This vulnerability allows arbitrary path traversal via the Projects API.
If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API.
### Patches
The issue has been patched in Node-RED 1.2.8
### Workarounds
The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED.
The primary workaround is not give untrusted users read access to the Node-RED editor.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@nodered.org](mailto:team@nodered.org)
### Acknowledgements
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
|
{'CVE-2021-21298'}
|
2021-02-26T16:23:34Z
|
2021-02-26T16:31:23Z
|
LOW
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/package/@node-red/runtime', 'https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21298', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456'}
| null |
npm
|
GHSA-vmhw-fhj6-m3g5
|
Path Traversal in angular-http-server
|
Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal.
## Recommendation
Update to version 1.4.4 or later.
| null |
2020-08-31T18:31:33Z
|
2019-05-31T23:46:33Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/656', 'https://hackerone.com/reports/330349', 'https://nodesecurity.io/advisories/656', 'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'}
| null |
npm
|
GHSA-f34m-x9pj-62vq
|
Cross-Site Scripting Vulnerability in @joeattardi/emoji-button
|
### Impact
There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2:
- A URL for a custom emoji
- An i18n string
In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.
### Patches
This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document.
### Workarounds
There is no workaround other than upgrading to a non-vulnerable version.
### Credit
This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team.
|
{'CVE-2021-43785'}
|
2021-12-01T14:34:05Z
|
2021-12-01T18:29:02Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e', 'https://github.com/joeattardi/emoji-button', 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785', 'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq'}
| null |
npm
|
GHSA-3mpp-xfvh-qh37
|
node-ipc behavior change
|
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
| null |
2022-03-16T23:54:35Z
|
2022-03-16T23:54:35Z
|
LOW
| null | null |
{'https://github.com/RIAEvangelist/node-ipc', 'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0'}
| null |
npm
|
GHSA-g7j3-p357-cw8p
|
Directory Traversal in f2e-server
|
Affected versions of `f2e-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to version 1.12.12 or later.
|
{'CVE-2017-16038'}
|
2021-09-10T20:27:46Z
|
2018-07-24T16:29:12Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/shy2850/node-server', 'https://github.com/shy2850/node-server/pull/12/files', 'https://github.com/advisories/GHSA-g7j3-p357-cw8p', 'https://www.npmjs.com/advisories/346', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16038', 'https://github.com/shy2850/node-server/issues/10', 'https://nodesecurity.io/advisories/346'}
| null |
npm
|
GHSA-4x7w-frcq-v4m3
|
Path Traversal in @wturyn/swagger-injector
|
All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:49:56Z
|
2020-09-03T20:38:47Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1173'}
| null |
npm
|
GHSA-g93h-75m9-3qq4
|
Downloads Resources over HTTP in pngcrush-installer
|
Affected versions of `pngcrush-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pngcrush-installer`.
## Recommendation
Update to version 1.8.10 or later.
|
{'CVE-2016-10570'}
|
2021-01-08T18:48:00Z
|
2019-02-18T23:52:27Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-g93h-75m9-3qq4', 'https://www.npmjs.com/advisories/189', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10570', 'https://nodesecurity.io/advisories/189'}
| null |
npm
|
GHSA-pmv6-gf98-p3r5
|
Command Injection in kill-port
|
Versions of `kill-port` prior to 1.3.2 are vulnerable to Command Injection. The package does not validate user input on the `kill` function. This may allow attackers to run arbitrary commands in the system if user input (such as the port number) is passed directly to the function.
## Recommendation
Upgrade to version 1.3.2 or later.
|
{'CVE-2019-5414'}
|
2020-08-31T18:42:18Z
|
2019-03-25T16:17:18Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/966', 'https://github.com/advisories/GHSA-pmv6-gf98-p3r5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5414', 'https://hackerone.com/reports/389561'}
| null |
npm
|
GHSA-93f3-23rq-pjfp
|
Sensitive information exposure through logs in npm CLI
|
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
|
{'CVE-2020-15095'}
|
2021-01-07T23:47:37Z
|
2020-07-07T18:56:16Z
|
LOW
| null |
{'CWE-532'}
|
{'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095', 'https://security.gentoo.org/glsa/202101-07', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html', 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp', 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'}
| null |
npm
|
GHSA-pxmp-fwjc-4x7q
|
HTML Injection in marky-markdown
|
All versions of `marky-markdown` are vulnerable to HTML Injection due to a validation bypass. The package only allows iframes where the source is `youtube.com` but it is possible to bypass the validation with sources where `youtube.com` is the sub-domain, such as `youtube.com.evil.co`. This
## Recommendation
This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
| null |
2021-10-04T20:56:09Z
|
2020-09-03T15:45:23Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/npm/marky-markdown', 'https://www.npmjs.com/advisories/1471'}
| null |
npm
|
GHSA-6jx3-rqcx-g3ww
|
Downloads Resources over HTTP in air-sdk
|
Affected versions of `air-sdk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `air-sdk`.
## Recommendation
No patch is currently available for this vulnerability, and the package hasn't seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10603'}
|
2021-01-08T19:21:29Z
|
2019-02-18T23:33:48Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/200', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10603', 'https://nodesecurity.io/advisories/200', 'https://github.com/advisories/GHSA-6jx3-rqcx-g3ww'}
| null |
npm
|
GHSA-f7r3-p866-q9qr
|
Denial of Service in ircdkit
|
Versions of `ircdkit` before 1.0.3 are vulnerable to a remote denial of service.
## Recommendation
Upgrade to version 1.0.4.
| null |
2021-08-04T21:22:45Z
|
2019-06-03T17:27:49Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c', 'https://snyk.io/vuln/SNYK-JS-IRCDKIT-173688', 'https://github.com/Twipped/ircdkit/issues/1', 'https://www.npmjs.com/advisories/735'}
| null |
npm
|
GHSA-fgp6-8g62-qx6w
|
Malicious Package in smartsearchwp
|
All versions of `smartsearchwp` contain malicious code. The package is malware intended to steal credentials from websites it is loaded in. It traverses DOM elements looking for fields such as `username` and `password` and uploads it to a remote server. The package also port-scans the local gateway and uploads the information to the remote server. It has a feature to fetch commands from the remote server and execute them with `eval`. The npm security team analysis found several bugs in the malware that prevent it from actually performing its actions. The malicious code is also not invoked upon installation or require; it would require transpiling TypeScript code and using it in a website.
## Recommendation
Remove the package from your environment. There is no indication of further compromise.
| null |
2021-09-30T21:58:23Z
|
2020-09-03T17:01:45Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1011'}
| null |
npm
|
GHSA-5hxw-r847-qfwp
|
Moderate severity vulnerability that affects opencv.js
|
opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
|
{'CVE-2017-16066'}
|
2020-06-16T21:16:22Z
|
2018-08-29T23:47:07Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16066', 'https://github.com/advisories/GHSA-5hxw-r847-qfwp', 'https://nodesecurity.io/advisories/505'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.