ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-7p7h-4mm5-852v
Regular Expression Denial of Service in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
{'CVE-2021-33623'}
2022-05-04T03:06:53Z
2021-06-07T22:10:39Z
HIGH
null
{'CWE-400'}
{'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1', 'https://github.com/sindresorhus/trim-newlines', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91', 'https://www.npmjs.com/package/trim-newlines', 'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33623'}
null
npm
GHSA-72mh-269x-7mh5
Improper Certificate Validation in xmlhttprequest-ssl
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
{'CVE-2021-31597'}
2021-05-20T21:59:29Z
2021-05-24T19:52:55Z
CRITICAL
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://people.kingsds.network/wesgarland/xmlhttprequest-ssl-vuln.txt'}
null
npm
GHSA-3r8f-gphx-9m2c
Path Traversal in mcstatic
All versions of `mcstatic` are vulnerable to path traversal. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
{'CVE-2018-3730'}
2020-08-31T18:30:58Z
2018-07-27T17:04:16Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/312907', 'https://www.npmjs.com/advisories/641', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3730', 'https://github.com/advisories/GHSA-3r8f-gphx-9m2c'}
null
npm
GHSA-r74q-wqx8-2pr3
Downloads Resources over HTTP in nodeschnaps
Affected versions of `nodeschnaps` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodeschnaps`. ## Recommendation Update to version 1.0.3 or later.
{'CVE-2016-10622'}
2021-01-08T01:58:06Z
2019-02-18T23:47:31Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-r74q-wqx8-2pr3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10622', 'https://www.npmjs.com/advisories/212', 'https://nodesecurity.io/advisories/212'}
null
npm
GHSA-h45p-w933-jxh3
Improper Verification of Cryptographic Signature in aws-encryption-sdk-javascript
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
null
2021-06-01T18:59:14Z
2021-06-01T21:20:22Z
MODERATE
null
{'CWE-347'}
{'https://github.com/aws/aws-encryption-sdk-javascript/security/advisories/GHSA-h45p-w933-jxh3'}
null
npm
GHSA-q4m3-2j7h-f7xw
Cross-Site Scripting in jquery
Versions of `jquery` prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 1.9.0 or later.
{'CVE-2020-7656'}
2021-08-25T21:11:29Z
2020-05-20T16:18:01Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-JQUERY-569619', 'https://github.com/jquery/jquery', 'https://security.netapp.com/advisory/ntap-20200528-0001/', 'https://github.com/advisories/GHSA-q4m3-2j7h-f7xw', 'https://www.npmjs.com/advisories/1524', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7656'}
null
npm
GHSA-6qpr-9mc5-7gch
Command Injection in async-git
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
{'CVE-2020-28490'}
2021-03-18T22:57:13Z
2021-04-12T19:50:20Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d', 'https://www.npmjs.com/package/async-git', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://github.com/omrilotan/async-git/pull/14'}
null
npm
GHSA-cfc5-x58f-869w
Malicious Package in conistring
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:50Z
2020-09-03T19:40:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1389'}
null
npm
GHSA-65j7-66p7-9xgf
Malicious Package in font-scrubber
Version 1.2.2 of `font-scrubber` contains malicious code as a postinstall script. The package attempts to upload sensitive files from the system to a remote server. The files include configuration files, command history logs, SSH keys and /etc/passwd. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:59:50Z
2020-09-02T21:51:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/919'}
null
npm
GHSA-rv7p-mmwq-x674
Improper Input Validation and Code Injection in pdf-image
Lack of input validation in pdf-image npm package version &lt;= 2.0.0 may allow an attacker to run arbitrary code if PDF file path is constructed based on untrusted user input.
{'CVE-2020-8132'}
2021-04-20T22:13:23Z
2021-05-10T18:46:58Z
HIGH
null
{'CWE-94', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8132', 'https://hackerone.com/reports/781664'}
null
npm
GHSA-6xm4-p6r2-mwrc
Malicious Package in cuffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:14:12Z
2020-09-03T22:47:30Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1270'}
null
npm
GHSA-3jfq-g458-7qm9
Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. ### Patches 3.2.2 || 4.4.14 || 5.0.6 || 6.1.1 NOTE: an adjacent issue [CVE-2021-32803](https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw) affects this release level. Please ensure you update to the latest patch levels that address CVE-2021-32803 as well if this adjacent issue affects your `node-tar` use case. ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. ```js const path = require('path') const tar = require('tar') tar.x({ file: 'archive.tgz', // either add this function... onentry: (entry) => { if (path.isAbsolute(entry.path)) { entry.path = sanitizeAbsolutePathSomehow(entry.path) entry.absolute = path.resolve(entry.path) } }, // or this one filter: (file, entry) => { if (path.isAbsolute(entry.path)) { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{'CVE-2021-32804'}
2021-08-30T23:14:50Z
2021-08-03T19:06:36Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/advisories/1770', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/npm/node-tar'}
null
npm
GHSA-gc6c-5v9w-xmhw
Downloads Resources over HTTP in nodewebkit
Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`. ## Recommendation No patch is currently available, and the package author has deprecated this package. The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions.
{'CVE-2016-10580'}
2021-01-08T18:48:13Z
2019-02-18T23:51:27Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw', 'https://www.npmjs.com/advisories/173', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10580', 'https://nodesecurity.io/advisories/173'}
null
npm
GHSA-xwqw-rf2q-xmhf
Cross-Site Scripting in buefy
Versions of buefy prior to 0.7.2 are vulnerable to Cross-Site Scripting, allowing attackers to manipulate the DOM and execute remote code. The autocomplete list renders user input as HTML without encoding. ## Recommendation Upgrade to version 0.7.2 or later.
null
2021-09-24T22:00:38Z
2020-09-01T21:23:38Z
HIGH
null
{'CWE-79'}
{'https://github.com/buefy/buefy/issues/1097', 'https://github.com/buefy/buefy', 'https://www.npmjs.com/advisories/747'}
null
npm
GHSA-4pmg-jgm5-3jg6
Malicious Package in erquest
All versions of `erquest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T21:14:54Z
2020-09-02T21:16:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/871'}
null
npm
GHSA-fm87-46vv-jqrr
Path Traversal in html-pages
Versions of `html-pages` before 2.1.0 are vulnerable to path traversal. ## Recommendation Update to version 2.1.0 or later.
{'CVE-2018-3744'}
2020-08-31T18:31:55Z
2018-09-18T13:45:07Z
HIGH
null
{'CWE-35'}
{'https://github.com/danielcardoso/html-pages/issues/2', 'https://github.com/advisories/GHSA-fm87-46vv-jqrr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3744', 'https://www.npmjs.com/advisories/665', 'https://hackerone.com/reports/306607'}
null
npm
GHSA-v95x-h953-x7fg
Malicious Package in k0a_multer
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:19:28Z
2020-09-03T19:47:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1130'}
null
npm
GHSA-8fr3-hfg3-gpgp
Open Redirect in node-forge
parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path.
{'CVE-2022-0122'}
2022-01-13T18:49:59Z
2022-01-21T23:36:19Z
MODERATE
null
{'CWE-601'}
{'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://github.com/digitalbazaar/forge'}
null
npm
GHSA-mgff-xpg3-3gwc
Malicious Package in bsae-x
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:57:02Z
2020-09-03T19:42:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1380'}
null
npm
GHSA-r683-j2x4-v87g
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
{'CVE-2022-0235'}
2022-01-18T22:51:22Z
2022-01-21T23:55:52Z
HIGH
null
{'CWE-173', 'CWE-601', 'CWE-200'}
{'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235', 'https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7', 'https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60', 'https://github.com/node-fetch/node-fetch/pull/1453', 'https://github.com/node-fetch/node-fetch'}
null
npm
GHSA-32j9-6qqm-mq9g
Unhandled case in node-lmdb
The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check.
{'CVE-2022-21164'}
2022-03-30T20:16:16Z
2022-03-17T00:00:27Z
HIGH
null
{'CWE-241', 'CWE-703'}
{'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a', 'https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164', 'https://github.com/Venemo/node-lmdb'}
null
npm
GHSA-j7cg-h9v9-6vqp
"Prototype Pollution in irrelon-path and @irrelon/path"
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions.
{'CVE-2020-7708'}
2021-05-05T21:25:03Z
2021-05-06T17:29:19Z
CRITICAL
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673', 'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7708', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672'}
null
npm
GHSA-7rg2-qxmf-hhx9
Session fixation in express-openid-connect
### Overview Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. ### Am I affected? You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store. ### How to fix that? Upgrade to version `>= 2.5.2`. ### Will this update impact my users? The fix provided in patch will not affect your users.
{'CVE-2021-41246'}
2021-12-15T15:28:49Z
2021-12-09T19:08:58Z
MODERATE
null
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41246', 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f', 'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2', 'https://github.com/auth0/express-openid-connect', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9'}
null
npm
GHSA-5v2h-r2cx-5xgj
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from 'marked'; console.log(marked.parse(`[x]: x \\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](`)); ``` _Who is impacted?_ Anyone who runs untrusted markdown through marked and does not use a worker with a time limit. ### Patches _Has the problem been patched?_ Yes _What versions should users upgrade to?_ 4.0.10 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources. ### References _Are there any links users can visit to find out more?_ - https://marked.js.org/using_advanced#workers - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked)
{'CVE-2022-21681'}
2022-01-14T19:57:17Z
2022-01-14T21:04:46Z
HIGH
null
{'CWE-1333'}
{'https://github.com/markedjs/marked', 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681', 'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj'}
null
npm
GHSA-3wxq-7r8m-qpmg
Hijacked Environment Variables in ffmepg
The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16068'}
2020-08-31T18:25:45Z
2018-08-29T23:56:30Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/507', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068', 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg', 'https://www.npmjs.com/advisories/507'}
null
npm
GHSA-c7hr-j4mj-j2w6
Verification Bypass in jsonwebtoken
Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm. ## Recommendation Update to version 4.2.2 or later.
{'CVE-2015-9235'}
2020-08-31T18:07:57Z
2018-10-09T00:38:30Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9235', 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687', 'https://nodesecurity.io/advisories/17', 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html', 'https://github.com/advisories/GHSA-c7hr-j4mj-j2w6', 'https://www.npmjs.com/advisories/17'}
null
npm
GHSA-f5mh-hq6h-whxv
Directory Traversal in bitty
Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests. ## Recommendation The `bitty` package is not currently maintained, and has not seen an update since 2015. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve).
{'CVE-2016-10561'}
2021-01-08T21:04:46Z
2019-02-18T23:38:29Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10561', 'https://nodesecurity.io/advisories/150', 'https://www.npmjs.com/advisories/150', 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv'}
null
npm
GHSA-h9rv-jmmf-4pgx
Cross-Site Scripting in serialize-javascript
Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 2.1.1 or later.
{'CVE-2019-16769'}
2021-01-08T18:42:22Z
2019-12-05T18:44:37Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1426', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769', 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx', 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}
null
npm
GHSA-f8fh-8rgm-227h
OS Command Injection in node-prompt-here
node-prompt-here through 1.0.1 allows execution of arbitrary commands. The &quot;runCommand()&quot; is called by &quot;getDevices()&quot; function in file &quot;linux/manager.js&quot;, which is required by the &quot;index. process.env.NM_CLI&quot; in the file &quot;linux/manager.js&quot;. This function is used to construct the argument of function &quot;execSync()&quot;, which can be controlled by users without any sanitization.
{'CVE-2020-7602'}
2021-07-28T20:46:04Z
2021-05-07T16:16:16Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7602'}
null
npm
GHSA-xqfm-ff6g-24c7
Directory Traversal in dgard8.lab6
Affected versions of `dgard8.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16218'}
2020-08-31T18:23:23Z
2018-07-23T20:39:44Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/444', 'https://github.com/advisories/GHSA-xqfm-ff6g-24c7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16218', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6', 'https://www.npmjs.com/advisories/444'}
null
npm
GHSA-8xxm-h73r-ghfj
Validation bypass in frourio
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。 ### さらなる情報 このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。 * [frourio](https://github.com/frouriojs/frourio)にIssueを開く。 ## English ### Impact Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives) ### Patches Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project. ### Workarounds Validate objects from request with class-transformer in controllers by yourself, or prevent using validators. ### For more information If you have any questions or comments about this advisory: * Open an issue in [frourio](https://github.com/frouriojs/frourio)
{'CVE-2022-23623'}
2022-02-14T22:32:53Z
2022-02-07T22:37:45Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23623', 'https://github.com/frouriojs/frourio', 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af', 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj'}
null
npm
GHSA-7xvg-m3vx-2hhv
Downloads Resources over HTTP in webrtc-native
Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`. ## Recommendation No direct patch is currently available for this vulnerability. However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download. The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source).
{'CVE-2016-10600'}
2021-01-08T19:13:15Z
2019-02-18T23:50:26Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/176', 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600', 'https://www.npmjs.com/advisories/176'}
null
npm
GHSA-f2jw-pr2c-9x96
Code injection in @rkesters/gnuplot
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
{'CVE-2021-29369'}
2022-05-04T03:05:58Z
2022-02-10T23:41:49Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29369', 'https://www.npmjs.com/package/@rkesters/gnuplot'}
null
npm
GHSA-m7qm-r2r5-f77q
Cross-Site Scripting in react-marked-markdown
All versions of `react-marked-markdown` are vulnerable to cross-site scripting (XSS) via `href` attributes. This is exploitable if user is provided to `react-marked-markdown` Proof of concept: ``` import React from 'react' import ReactDOM from 'react-dom' import { MarkdownPreview } from 'react-marked-markdown' ReactDOM.render( <MarkdownPreview markedOptions={{ sanitize: true }} value={'[XSS](javascript: alert`1`)'} />, document.getElementById('root') ) ``` ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time if you allow user input into href values.
null
2021-09-24T20:35:29Z
2020-09-01T20:43:48Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/344069', 'https://www.npmjs.com/advisories/668', 'https://github.com/Vincent-P/react-marked-markdown/issues/61', 'https://github.com/Vincent-P/react-marked-markdown'}
null
npm
GHSA-7xf9-74cp-8hx3
Malicious Package in js-cha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:00:58Z
2020-09-03T22:59:21Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1281'}
null
npm
GHSA-hpmr-g4pq-jhgp
Denial of service in chrono-node
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
{'CVE-2021-23371'}
2021-04-23T18:47:21Z
2021-05-06T15:58:05Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-CHRONONODE-1083228', 'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23371', 'https://github.com/wanasit/chrono/issues/382'}
null
npm
GHSA-m9jw-237r-gvfv
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection. The function `sequelize.json()` incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example: ```return User.findAll({ where: this.sequelize.json("data.id')) AS DECIMAL) = 1 DELETE YOLO INJECTIONS; -- ", 1) });``` ## Recommendation If you are using `sequelize` 5.x, upgrade to version 5.15.1 or later. If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later.
{'CVE-2019-10752'}
2021-08-18T21:54:56Z
2019-10-25T19:43:16Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e', 'https://github.com/sequelize/sequelize/commit/9bd0bc1,', 'https://www.npmjs.com/advisories/1146', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10752', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751,', 'https://github.com/sequelize/sequelize/pull/11329'}
null
npm
GHSA-4xgp-xrg3-c73w
Malicious Package in commqnder
All versions of `commqnder` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-30T22:02:56Z
2020-09-11T21:10:29Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/924'}
null
npm
GHSA-hj3m-v758-jwx5
Path Traversal in http-server-node
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
{'CVE-2021-23797'}
2022-01-04T18:43:28Z
2022-01-05T15:02:43Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656', 'https://github.com/yan-loong/http-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23797'}
null
npm
GHSA-m5h6-hr3q-22h5
npm Token Leak in npm
Affected versions of the `npm` package include the bearer token of the logged in user in every request made by the CLI, even if the request is not directed towards the user's active registry. An attacker could create an HTTP server to collect tokens, and by various means including but not limited to install scripts, cause the npm CLI to make a request to that server, which would compromise the user's token. This compromised token could be used to do anything that the user could do, including publishing new packages. ## Recommendation 1. Update npm with `npm install npm@latest -g` 2. [Revoke your Tokens](https://www.npmjs.com/settings/tokens) 3. Enable [Two-Factor Authentication](https://docs.npmjs.com/getting-started/using-two-factor-authentication)
{'CVE-2016-3956'}
2020-08-31T18:10:47Z
2018-07-31T22:58:35Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-3956', 'https://github.com/npm/npm/issues/8380', 'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29', 'http://www-01.ibm.com/support/docview.wss?uid=swg21980827', 'https://github.com/advisories/GHSA-m5h6-hr3q-22h5', 'https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401', 'https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/', 'http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability', 'https://www.npmjs.com/advisories/98'}
null
npm
GHSA-r9vm-rhmf-7hxx
OS Command Injection in im-resize
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
{'CVE-2019-10787'}
2021-03-29T23:01:10Z
2021-04-13T15:17:06Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10787', 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03', 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183'}
null
npm
GHSA-5g6j-8hv4-vfgj
Cross-Site Scripting in node-red
Versions of `node-red` prior to 0.18.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new items, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 0.18.6 or later.
null
2020-08-31T18:43:22Z
2020-09-11T21:21:19Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/349146', 'https://www.npmjs.com/advisories/993'}
null
npm
GHSA-wjpj-gmc3-5w56
Malicious Package in buvfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T15:46:02Z
2020-09-03T22:30:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1268'}
null
npm
GHSA-w65v-hx54-xrqx
Malicious Package in midway-xtpl
All versions of `midway-xtpl` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:35Z
2020-09-03T17:41:23Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1057'}
null
npm
GHSA-cr5w-6rv4-r2qg
Malicious Package in maleficent
All versions of `maleficent` contain malicious code. The package is a demonstration of possible risks when installing npm packages. It gathers system information such as: environment variables, OS information, network interface, AWS credentials, npm credentials and ssh keys. The package prints the information to a local file but does not upload it to a remote server. ## Recommendation Remove the package from your environment. There is no further compromise.
null
2021-09-30T21:58:48Z
2020-09-03T02:37:45Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/951'}
null
npm
GHSA-wv39-cgmm-cq29
Malicious Package in buffmr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:27:19Z
2020-09-03T22:23:00Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1261'}
null
npm
GHSA-rx32-c25r-79mx
Directory Traversal in serverhuwenhui
Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16102'}
2020-08-31T18:20:36Z
2020-09-01T16:54:41Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16102', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui', 'https://nodesecurity.io/advisories/366', 'https://www.npmjs.com/advisories/366'}
null
npm
GHSA-x3m6-rprw-862w
Malicious Package in node-buc
All versions of `node-buc` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:50Z
2020-09-03T17:43:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1059'}
null
npm
GHSA-6pwf-whc8-hjf6
Downloads Resources over HTTP in baryton-saxophone
Affected versions of `baryton-saxophone` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `baryton-saxophone`. ## Recommendation Update to version 3.0.1 or later.
{'CVE-2016-10573'}
2021-01-08T19:20:39Z
2019-02-18T23:35:18Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/240', 'https://www.npmjs.com/advisories/240', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10573', 'https://github.com/advisories/GHSA-6pwf-whc8-hjf6'}
null
npm
GHSA-gj77-59wh-66hg
Regular Expression Denial of Service (ReDoS) in Prism
Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). ### Impact When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text. - ASCIIDoc - ERB Other languages are __not__ affected and can be used to highlight untrusted text. ### Patches This problem has been fixed in Prism v1.24. ### References - PrismJS/prism#2774 - PrismJS/prism#2688
{'CVE-2021-32723'}
2022-02-08T21:21:38Z
2021-06-28T18:33:18Z
HIGH
null
{'CWE-400'}
{'https://github.com/PrismJS/prism', 'https://github.com/PrismJS/prism/pull/2688', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32723', 'https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg', 'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/PrismJS/prism/pull/2774'}
null
npm
GHSA-vmh4-322v-cfpc
Cross-Site Scripting in cmmn-js-properties-panel
Versions of `cmmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website. ## Recommendation Upgrade to version 0.8.0 or later.
null
2020-08-31T18:46:35Z
2020-09-03T18:18:06Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1080'}
null
npm
GHSA-9m87-6fj3-c5xh
Untrusted Search Path in PNPM
PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
{'CVE-2022-26183'}
2022-03-30T21:04:52Z
2022-03-23T00:00:24Z
HIGH
null
{'CWE-426'}
{'https://github.com/pnpm/pnpm/releases/tag/v6.15.1', 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26183', 'https://github.com/pnpm/pnpm'}
null
npm
GHSA-m2mx-rfpw-jghv
DLL Injection in kerberos
Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine. ## Recommendation Upgrade to version 1.0.0 or later.
null
2020-08-31T19:01:58Z
2020-09-04T18:01:59Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1514'}
null
npm
GHSA-c5xm-m64m-f2vq
Malicious Package in cxct
All versions of `cxct` contain malicious code. The package finds and exfiltrates cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:13:30Z
2020-09-04T15:23:47Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1344'}
null
npm
GHSA-73hr-6785-f5p8
Malicious Package in donotinstallthis
The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise. ## Recommendation Remove the package from your environment.
null
2021-09-30T21:24:59Z
2020-09-02T21:24:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/887'}
null
npm
GHSA-xqg8-cv3h-xppv
SQL Injection in sequelize
Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter. ## Proof of Concept ```javascript Test.findAndCountAll({ where: { id :1 }, order : [['id', 'UNTRUSTED USER INPUT']] }) ``` ## Recommendation Update to version 2.0.0-rc8 or later
{'CVE-2015-1369'}
2021-09-22T15:12:11Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-89'}
{'https://www.npmjs.com/advisories/33', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369', 'https://github.com/sequelize/sequelize', 'https://nodesecurity.io/advisories/sequelize-sql-injection-order', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/sequelize/sequelize/issues/2906', 'https://github.com/sequelize/sequelize/pull/2919', 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv'}
null
npm
GHSA-9j49-mfvp-vmhm
Code Injection in pac-resolver
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
{'CVE-2021-23406'}
2021-08-25T19:28:31Z
2021-09-02T17:10:06Z
HIGH
null
{'CWE-94'}
{'https://github.com/TooTallNate/', 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406', 'https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0', 'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506', 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e'}
null
npm
GHSA-qr4p-c9wr-phr6
Prototype pollution in set-in
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28273'}
2021-03-18T23:53:31Z
2021-03-19T21:01:46Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273', 'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28273'}
null
npm
GHSA-f9vc-q3hh-qhfv
Content Injection in remarkable
Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used. ### Proof of Concept Markdown Source: ``` [link](<javascript:alert(1)>) ``` Rendered HTML: ``` <a href="javascript:alert(1)">link</a> ``` ## Recommendation Update to version 1.4.1 or later
{'CVE-2014-10065'}
2020-08-31T18:08:29Z
2020-08-31T22:56:00Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-10065', 'https://www.npmjs.com/advisories/30', 'https://nodesecurity.io/advisories/30', 'https://github.com/jonschlinkert/remarkable/issues/97'}
null
npm
GHSA-q854-j362-cfq9
Cross-site Scripting in jsoneditor
Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.
{'CVE-2020-23849'}
2021-10-08T21:54:35Z
2021-10-12T16:22:30Z
MODERATE
null
{'CWE-79'}
{'https://github.com/josdejong/jsoneditor/issues/1029', 'https://github.com/josdejong/jsoneditor', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}
null
npm
GHSA-hp68-xhvj-x6j6
Insufficient patch for Regular Expression Denial of Service (ReDoS) to jsx-slack v4.5.1
We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack. This vulnerability affects to jsx-slack v4.5.1 and earlier versions. ### Impact If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources. ```javascript /** @jsxImportSource jsx-slack */ import { Section } from 'jsx-slack' console.log( <Section> <blockquote> {[...Array(40)].map(() => ( <p>亜</p> ))} </blockquote> </Section> ) ``` v4.5.1 has released by passing the test against ASCII characters but missed the case of multibyte characters. https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q ### Patches jsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `<blockquote>` with multibyte characters. ### References - https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc ### Credits Thanks to @hieki for finding out this vulnerability.
{'CVE-2021-43843'}
2022-01-04T20:19:23Z
2022-01-06T18:34:18Z
MODERATE
null
{'CWE-400'}
{'https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2', 'https://github.com/yhatt/jsx-slack/security/', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43843', 'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc'}
null
npm
GHSA-wmpv-c2jp-j2xg
ERC1155Supply vulnerability in OpenZeppelin Contracts
When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation. ### Impact If a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated. ### Patches A fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds If accurate supply is relevant, do not mint tokens to untrusted receivers. ### Credits The issue was identified and reported by @ChainSecurityAudits. ### For more information Read [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown. If you have any questions or comments about this advisory, email us at security@openzeppelin.com.
null
2021-11-15T22:27:38Z
2021-11-15T23:28:18Z
LOW
null
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wmpv-c2jp-j2xg', 'https://github.com/OpenZeppelin/openzeppelin-contracts'}
null
npm
GHSA-855m-jchh-9qjc
Malicious Package in commnader
All versions of `commnader` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:01:42Z
2020-09-02T20:19:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/850'}
null
npm
GHSA-7g8m-5qh9-9pgw
Directory Traversal in wind-mvc
Affected versions of `wind-mvc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16220'}
2020-08-31T18:22:20Z
2020-09-01T18:07:51Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/417', 'https://nodesecurity.io/advisories/417', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16220', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wind-mvc'}
null
npm
GHSA-gvr4-7xgc-gx3w
Cross-Site Scripting in fileview
All versions of `fileview` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15602'}
2020-08-31T18:59:48Z
2020-04-01T16:36:15Z
HIGH
null
{'CWE-79'}
{'https://github.com/itworkcenter/fileview/pull/2', 'https://www.npmjs.com/advisories/1452', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15602', 'https://github.com/itworkcenter/fileview/issues/1', 'https://hackerone.com/reports/507159'}
null
npm
GHSA-w5m8-5v9m-xhx5
Critical severity vulnerability that affects Haraka
Haraka version 2.8.8 and earlier comes with a plugin for processing attachments for zip files. Versions 2.8.8 and earlier can be vulnerable to command injection.
{'CVE-2016-1000282'}
2021-09-21T17:56:29Z
2019-02-12T17:26:10Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/outflanknl/Exploits/blob/master/harakiri-CVE-2016-1000282.py', 'https://github.com/advisories/GHSA-w5m8-5v9m-xhx5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000282'}
null
npm
GHSA-52c9-458g-whrf
Malicious Package in js-3ha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:00:43Z
2020-09-03T22:58:17Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1280'}
null
npm
GHSA-rc77-xxq6-4mff
Command Injection in hot-formula-parser
Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server. Parsing the following formula creates a `test` file in the present directory: `"SUM([(function(){require('child_process').execSync('touch test')})(),2])"` ## Recommendation Upgrade to version 3.0.1 or later.
{'CVE-2020-6836'}
2021-08-25T21:04:44Z
2020-05-06T19:32:33Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e', 'https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/', 'https://github.com/handsontable/formula-parser', 'https://www.npmjs.com/advisories/1439', 'https://github.com/handsontable/formula-parser/pull/58', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836'}
null
npm
GHSA-wwf2-5cj8-jx6w
Hijacked Environment Variables in nodesqlite
The `nodesqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16049'}
2020-08-31T18:25:13Z
2018-07-23T20:50:21Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-wwf2-5cj8-jx6w', 'https://nodesecurity.io/advisories/492', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16049', 'https://www.npmjs.com/advisories/492'}
null
npm
GHSA-x65c-4fgj-5fc3
Cross-site Scripting in pandao
pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.
{'CVE-2019-14653'}
2021-08-17T21:58:07Z
2019-08-23T00:05:00Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pandao/editor.md/issues/715', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653'}
null
npm
GHSA-536q-8gxx-m782
Cross-Site Scripting in dojo
Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.4.2 or later.
{'CVE-2010-2273'}
2020-08-31T18:42:32Z
2019-09-11T23:02:57Z
MODERATE
null
{'CWE-79'}
{'http://secunia.com/advisories/40007', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833', 'https://www.npmjs.com/advisories/972', 'https://github.com/dojo/dojo/pull/307', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958', 'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896', 'http://www-01.ibm.com/support/docview.wss?uid=swg21431472', 'http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/', 'https://bugs.dojotoolkit.org/ticket/10773', 'http://bugs.dojotoolkit.org/ticket/10773', 'http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/', 'http://secunia.com/advisories/38964', 'http://www.vupen.com/english/advisories/2010/1281', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856', 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273'}
null
npm
GHSA-cr8h-x88h-jwj2
Downloads Resources over HTTP in wixtoolset
Affected versions of `wixtoolset` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wixtoolset`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10663'}
2021-01-08T18:55:56Z
2019-02-18T23:44:45Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10663', 'https://github.com/wixtoolset/issues/issues/6187', 'https://github.com/advisories/GHSA-cr8h-x88h-jwj2', 'https://www.npmjs.com/advisories/264', 'https://nodesecurity.io/advisories/264'}
null
npm
GHSA-rjvj-673q-4hfw
Command Injection in traceroute
All versions of `traceroute` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `trace` function is vulnerable and can be abused if the `host` value is controlled by an attacker. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:53:02Z
2020-09-04T17:54:31Z
CRITICAL
null
{'CWE-77'}
{'https://snyk.io/vuln/npm:traceroute:20160311', 'https://www.npmjs.com/advisories/1465', 'https://github.com/jaw187/node-traceroute'}
null
npm
GHSA-q2qh-cgc2-qhr3
Directory Traversal in serve
Affected versions of `serve` do not properly handle `%2e` (.) and `%2f` (/) characters, and allow the, characters to be used in paths. This can be used to traverse the directory tree and list content of any directory the user running the process has access to. Mitigating factors: This vulnerability only allows listing of directory contents and does not allow reading of arbitrary files. ## Recommendation Update to version 6.4.9 later.
{'CVE-2018-3712'}
2020-08-31T18:27:50Z
2018-07-27T17:07:50Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3712', 'https://github.com/advisories/GHSA-q2qh-cgc2-qhr3', 'https://github.com/zeit/serve/pull/316', 'https://www.npmjs.com/advisories/561', 'https://hackerone.com/reports/307666'}
null
npm
GHSA-hhff-3c89-5m7p
Directory Traversal in byucslabsix
Affected versions of `byucslabsix` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16166'}
2020-08-31T18:21:50Z
2018-07-23T20:45:42Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/byucslabsix', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16166', 'https://nodesecurity.io/advisories/399', 'https://www.npmjs.com/advisories/399', 'https://github.com/advisories/GHSA-hhff-3c89-5m7p'}
null
npm
GHSA-whjr-jj69-7prm
Malicious Package in import-mysql
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:15:59Z
2020-09-03T19:44:35Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1127'}
null
npm
GHSA-rffp-mc78-wjf7
Command Injection in cocos-utils
All versions of `cocos-utils` are vulnerable to Remote Code Execution. The `unzip()` function concatenates user input to `exec()` which may allow attackers to execute arbitrary commands on the server. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:37:21Z
2020-09-02T18:26:48Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/829'}
null
npm
GHSA-hh8v-jmh3-9437
Cross-site scripting in SocksJS-node
htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.
{'CVE-2020-8823'}
2021-04-06T21:51:28Z
2021-04-13T15:25:33Z
MODERATE
null
{'CWE-79'}
{'https://www.sockjs.org', 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823', 'https://www.npmjs.com/package/sockjs', 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}
null
npm
GHSA-g84j-95x2-7g67
Downloads Resources over HTTP in tomita
Affected versions of `tomita` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10662'}
2021-01-08T18:48:34Z
2019-02-18T23:44:50Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10662', 'https://nodesecurity.io/advisories/267', 'https://www.npmjs.com/advisories/267', 'https://github.com/advisories/GHSA-g84j-95x2-7g67'}
null
npm
GHSA-fj93-7wm4-8x2g
Cross-Site Scripting in jquery-mobile
All version of `jquery-mobile` are vulnerable to Cross-Site Scripting. The package checks for content in `location.hash` and if a URL is found it does an XmlHttpRequest (XHR) to the URL and renders the response with `innerHTML`. It fails to validate the `Content-Type` of the response, allowing attackers to include malicious payloads as part of query parameters that are reflected back to the user. A response such as `{"q":"<iframe/src='javascript:alert(1)'></iframe>","results":[]}` would be parsed as HTML and the JavaScript payload executed. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-27T21:03:58Z
2020-09-02T21:22:47Z
HIGH
null
{'CWE-79'}
{'https://github.com/jquery/jquery-mobile/pull/8650', 'https://github.com/jquery/jquery-mobile/', 'https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685', 'https://snyk.io/vuln/SNYK-JS-JQUERYMOBILE-174599', 'https://www.npmjs.com/advisories/883', 'https://github.com/jquery/jquery-mobile/issues/8640', 'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50', 'https://github.com/jquery/jquery-mobile/pull/8649'}
null
npm
GHSA-gmw6-94gg-2rc2
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. ### Patches 2.8.2 (included in npm v7.20.7 and above) ### Workarounds Do not run `npm install` on untrusted codebases, without first ensuring that the `node_modules` directory in the project is not a symbolic link. ### Fix Prior to extracting any package contents, the `node_modules` folder into which it is extracted is verified to be a real directory. If it is not, then it is removed. Caveat: if you are currently relying on creating a symbolic link to the `node_modules` folder in order to share dependencies between projects, then that will no longer be possible. Please use the `npm link` command, explicit `file:...` dependencies, and/or `workspaces` to share dependencies in a development environment.
{'CVE-2021-39135'}
2021-09-08T14:45:22Z
2021-08-31T16:03:34Z
MODERATE
null
{'CWE-61', 'CWE-59'}
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/arborist', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2', 'https://www.npmjs.com/package/@npmcli/arborist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39135'}
null
npm
GHSA-jcgr-9698-82jx
Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build
### Impact If you are using the esbuild target or command you are at risk of code/option injection. Attackers can use the command line option to maliciously change your settings in order to damage your project. ### Patches The problem has been patched in v1.0.0 as it uses a proper method to pass configs to esbuild/estrella. ### Workarounds There is no work around. You should update asap. ### Notes This notice is mainly just to make sure people update to the latest version. This isn't that bad, but should encourage you to update.
null
2021-05-27T21:05:29Z
2021-05-28T15:53:40Z
LOW
null
{'CWE-77'}
{'https://github.com/Floffah/build/security/advisories/GHSA-jcgr-9698-82jx'}
null
npm
GHSA-394c-5j6w-4xmx
Regular Expression Denial of Service (ReDoS) in ua-parser-js
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
{'CVE-2020-7793'}
2021-04-08T21:32:22Z
2022-02-09T22:46:53Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7793', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388', 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599'}
null
npm
GHSA-mg8r-9g6j-hwv9
Authentication Bypass in hapi-auth-jwt2
Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode. ## Recommendation Update to version 5.1.2 or later.
{'CVE-2016-10525'}
2021-09-15T18:58:17Z
2019-02-18T23:39:00Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/dwyl/hapi-auth-jwt2/pull/112', 'https://github.com/dwyl/hapi-auth-jwt2/issues/111', 'https://www.npmjs.com/advisories/81', 'https://nodesecurity.io/advisories/81', 'https://github.com/dwyl/hapi-auth-jwt2', 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525'}
null
npm
GHSA-2mw7-wggm-m6w3
Low severity vulnerability that affects ethereumjs-vm
ethereumjs-vm 2.4.0 allows attackers to cause a denial of service (vm.runCode failure and REVERT) via a "code: Buffer.from(my_code, 'hex')" attribute.
{'CVE-2018-19183'}
2021-08-31T19:28:40Z
2018-11-21T22:22:46Z
HIGH
null
{'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19183', 'https://github.com/ethereumjs/ethereumjs-vm/issues/386', 'https://github.com/ethereumjs/ethereumjs-vm', 'https://github.com/advisories/GHSA-2mw7-wggm-m6w3'}
null
npm
GHSA-q4cq-539c-3mmm
Directory Traversal in serveryztyzt
Affected versions of `serveryztyzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16103'}
2020-08-31T18:20:20Z
2020-09-01T16:48:14Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16103', 'https://nodesecurity.io/advisories/354', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryztyzt', 'https://www.npmjs.com/advisories/354'}
null
npm
GHSA-m33v-338h-4v9f
Path traversal in Node-Red
### Impact This vulnerability allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API. ### Patches The issue has been patched in Node-RED 1.2.8 ### Workarounds The vulnerability applies only to the Projects feature which is not enabled by default in Node-RED. The primary workaround is not give untrusted users read access to the Node-RED editor. ### For more information If you have any questions or comments about this advisory: * Email us at [team@nodered.org](mailto:team@nodered.org) ### Acknowledgements Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
{'CVE-2021-21298'}
2021-02-26T16:23:34Z
2021-02-26T16:31:23Z
LOW
null
{'CWE-22'}
{'https://www.npmjs.com/package/@node-red/runtime', 'https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21298', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456'}
null
npm
GHSA-vmhw-fhj6-m3g5
Path Traversal in angular-http-server
Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal. ## Recommendation Update to version 1.4.4 or later.
null
2020-08-31T18:31:33Z
2019-05-31T23:46:33Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/656', 'https://hackerone.com/reports/330349', 'https://nodesecurity.io/advisories/656', 'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'}
null
npm
GHSA-f34m-x9pj-62vq
Cross-Site Scripting Vulnerability in @joeattardi/emoji-button
### Impact There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2: - A URL for a custom emoji - An i18n string In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code. ### Patches This vulnerability is fixed starting in version 4.6.2. This is resolved by properly escaping strings that are inserted into the HTML document. ### Workarounds There is no workaround other than upgrading to a non-vulnerable version. ### Credit This issue was discovered by GitHub team member [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh) and was reported by the GitHub Security Lab team.
{'CVE-2021-43785'}
2021-12-01T14:34:05Z
2021-12-01T18:29:02Z
HIGH
null
{'CWE-79'}
{'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e', 'https://github.com/joeattardi/emoji-button', 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785', 'https://github.com/joeattardi/emoji-button/security/advisories/GHSA-f34m-x9pj-62vq'}
null
npm
GHSA-3mpp-xfvh-qh37
node-ipc behavior change
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
null
2022-03-16T23:54:35Z
2022-03-16T23:54:35Z
LOW
null
null
{'https://github.com/RIAEvangelist/node-ipc', 'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0'}
null
npm
GHSA-g7j3-p357-cw8p
Directory Traversal in f2e-server
Affected versions of `f2e-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 1.12.12 or later.
{'CVE-2017-16038'}
2021-09-10T20:27:46Z
2018-07-24T16:29:12Z
HIGH
null
{'CWE-22'}
{'https://github.com/shy2850/node-server', 'https://github.com/shy2850/node-server/pull/12/files', 'https://github.com/advisories/GHSA-g7j3-p357-cw8p', 'https://www.npmjs.com/advisories/346', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16038', 'https://github.com/shy2850/node-server/issues/10', 'https://nodesecurity.io/advisories/346'}
null
npm
GHSA-4x7w-frcq-v4m3
Path Traversal in @wturyn/swagger-injector
All versions of `@wturyn/swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:49:56Z
2020-09-03T20:38:47Z
CRITICAL
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1173'}
null
npm
GHSA-g93h-75m9-3qq4
Downloads Resources over HTTP in pngcrush-installer
Affected versions of `pngcrush-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pngcrush-installer`. ## Recommendation Update to version 1.8.10 or later.
{'CVE-2016-10570'}
2021-01-08T18:48:00Z
2019-02-18T23:52:27Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-g93h-75m9-3qq4', 'https://www.npmjs.com/advisories/189', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10570', 'https://nodesecurity.io/advisories/189'}
null
npm
GHSA-pmv6-gf98-p3r5
Command Injection in kill-port
Versions of `kill-port` prior to 1.3.2 are vulnerable to Command Injection. The package does not validate user input on the `kill` function. This may allow attackers to run arbitrary commands in the system if user input (such as the port number) is passed directly to the function. ## Recommendation Upgrade to version 1.3.2 or later.
{'CVE-2019-5414'}
2020-08-31T18:42:18Z
2019-03-25T16:17:18Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/966', 'https://github.com/advisories/GHSA-pmv6-gf98-p3r5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5414', 'https://hackerone.com/reports/389561'}
null
npm
GHSA-93f3-23rq-pjfp
Sensitive information exposure through logs in npm CLI
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
{'CVE-2020-15095'}
2021-01-07T23:47:37Z
2020-07-07T18:56:16Z
LOW
null
{'CWE-532'}
{'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095', 'https://security.gentoo.org/glsa/202101-07', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html', 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp', 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'}
null
npm
GHSA-pxmp-fwjc-4x7q
HTML Injection in marky-markdown
All versions of `marky-markdown` are vulnerable to HTML Injection due to a validation bypass. The package only allows iframes where the source is `youtube.com` but it is possible to bypass the validation with sources where `youtube.com` is the sub-domain, such as `youtube.com.evil.co`. This ## Recommendation This package is no longer maintained. Please upgrade to `@npmcorp/marky-markdown`
null
2021-10-04T20:56:09Z
2020-09-03T15:45:23Z
MODERATE
null
{'CWE-79'}
{'https://github.com/npm/marky-markdown', 'https://www.npmjs.com/advisories/1471'}
null
npm
GHSA-6jx3-rqcx-g3ww
Downloads Resources over HTTP in air-sdk
Affected versions of `air-sdk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `air-sdk`. ## Recommendation No patch is currently available for this vulnerability, and the package hasn't seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10603'}
2021-01-08T19:21:29Z
2019-02-18T23:33:48Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/200', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10603', 'https://nodesecurity.io/advisories/200', 'https://github.com/advisories/GHSA-6jx3-rqcx-g3ww'}
null
npm
GHSA-f7r3-p866-q9qr
Denial of Service in ircdkit
Versions of `ircdkit` before 1.0.3 are vulnerable to a remote denial of service. ## Recommendation Upgrade to version 1.0.4.
null
2021-08-04T21:22:45Z
2019-06-03T17:27:49Z
LOW
null
{'CWE-400'}
{'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c', 'https://snyk.io/vuln/SNYK-JS-IRCDKIT-173688', 'https://github.com/Twipped/ircdkit/issues/1', 'https://www.npmjs.com/advisories/735'}
null
npm
GHSA-fgp6-8g62-qx6w
Malicious Package in smartsearchwp
All versions of `smartsearchwp` contain malicious code. The package is malware intended to steal credentials from websites it is loaded in. It traverses DOM elements looking for fields such as `username` and `password` and uploads it to a remote server. The package also port-scans the local gateway and uploads the information to the remote server. It has a feature to fetch commands from the remote server and execute them with `eval`. The npm security team analysis found several bugs in the malware that prevent it from actually performing its actions. The malicious code is also not invoked upon installation or require; it would require transpiling TypeScript code and using it in a website. ## Recommendation Remove the package from your environment. There is no indication of further compromise.
null
2021-09-30T21:58:23Z
2020-09-03T17:01:45Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1011'}
null
npm
GHSA-5hxw-r847-qfwp
Moderate severity vulnerability that affects opencv.js
opencv.js was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
{'CVE-2017-16066'}
2020-06-16T21:16:22Z
2018-08-29T23:47:07Z
MODERATE
null
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16066', 'https://github.com/advisories/GHSA-5hxw-r847-qfwp', 'https://nodesecurity.io/advisories/505'}
null