ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-rjhc-w3fj-j6x9
Malicious Package in alipayjsapi
All versions of `alipayjsapi` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T18:35:42Z
2020-09-03T17:32:45Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1048'}
null
npm
GHSA-86wf-436m-h424
Resource Exhaustion Denial of Service in http-proxy-agent
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
{'CVE-2019-10196'}
2021-03-31T21:09:25Z
2022-01-06T20:30:13Z
MODERATE
null
{'CWE-665'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10196', 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245', 'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb', 'https://www.npmjs.com/advisories/607'}
null
npm
GHSA-2mqv-4j3r-vjvp
Open redirect in @auth0/nextjs-auth0
### Overview Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability. ### Am I affected? You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`. ### How to fix that? Upgrade to version `>=1.6.2` ### Will this update impact my users? The fix provided in the patch will not affect your users.
{'CVE-2021-43812'}
2021-12-16T18:42:05Z
2021-12-16T18:52:21Z
MODERATE
null
{'CWE-601'}
{'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp', 'https://github.com/auth0/nextjs-auth0'}
null
npm
GHSA-j9wj-26p5-fj2v
Directory Traversal in gaoxuyan
Affected versions of `gaoxuyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16153'}
2020-08-31T18:21:00Z
2020-09-01T17:17:29Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/378', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16153', 'https://nodesecurity.io/advisories/378'}
null
npm
GHSA-hx7j-43w2-7rj7
Prototype pollution in nconf-toml
Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25946'}
2021-10-05T17:22:38Z
2021-06-07T22:12:13Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/RobLoach/nconf-toml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946', 'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8'}
null
npm
GHSA-7r96-8g3x-g36m
Improper Verification of Cryptographic Signature
### Impact The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid. ### Patches Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method. ### Workarounds In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy)
null
2022-01-04T19:36:52Z
2021-06-28T17:16:56Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b', 'https://github.com/TogaTech/tEnvoy', 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'}
null
npm
GHSA-mc84-xr9p-938r
High severity vulnerability that affects generator-jhipster
## Generated code uses repository configuration that downloads over HTTP instead of HTTPS ### Impact Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time. ### Patches Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1. If you are not able to upgrade make sure not to use a Maven repository via `http` in your build file. ### Workarounds Replace all custom repository definitions in `build.gradle` or `pom.xml` with their `https` version. e.g. ```xml <repository> <id>oss.sonatype.org-snapshot</id> <url>https://oss.sonatype.org/content/repositories/snapshots</url> // <-- must be httpS <releases> <enabled>false</enabled> </releases> <snapshots> <enabled>true</enabled> </snapshots> </repository> ``` ```gradle maven { url "https://repo.spring.io/plugins-release" } // <-- must be httpS ``` ### References * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/jhipster/generator-jhipster/issues](https://github.com/jhipster/generator-jhipster/issues)
null
2021-09-15T18:50:22Z
2019-09-23T18:31:05Z
HIGH
null
{'CWE-829', 'CWE-494'}
{'https://github.com/advisories/GHSA-mc84-xr9p-938r', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-536074', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mc84-xr9p-938r', 'https://github.com/jhipster/generator-jhipster/'}
null
npm
GHSA-2hwp-g4g7-mwwj
Reflected Cross-Site Scripting in jquery.terminal
Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization. ## Recommendation Upgrade to version 1.21.0 or later
null
2020-08-31T18:35:05Z
2019-05-29T20:25:35Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/769', 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}
null
npm
GHSA-rvg8-pwq2-xj7q
Out-of-bounds Read in base64url
Versions of `base64url` before 3.0.0 are vulnerable to to out-of-bounds reads as it allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below. ## Recommendation Update to version 3.0.0 or later.
null
2021-09-24T20:34:56Z
2020-09-01T20:42:44Z
MODERATE
null
{'CWE-125'}
{'https://hackerone.com/reports/321687', 'https://github.com/brianloveswords/base64url/pull/25', 'https://github.com/brianloveswords/base64url', 'https://www.npmjs.com/advisories/658'}
null
npm
GHSA-c56f-grv3-gpfr
Regular expression denial of service in forms
The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.
{'CVE-2021-23388'}
2021-06-02T19:27:50Z
2021-06-07T22:10:13Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23388', 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0', 'https://snyk.io/vuln/SNYK-JS-FORMS-1296389', 'https://github.com/caolan/forms/pull/214'}
null
npm
GHSA-4hfc-fv33-ph9p
Malicious Package in sj-tw-abc
All versions of `sj-tw-abc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:15:37Z
2020-09-03T23:26:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1310'}
null
npm
GHSA-65q2-x652-xx84
Downloads Resources over HTTP in dalek-browser-ie
Affected versions of `dalek-browser-ie` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10605'}
2021-01-08T19:46:44Z
2019-02-18T23:50:04Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-65q2-x652-xx84', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10605', 'https://nodesecurity.io/advisories/209', 'https://www.npmjs.com/advisories/209'}
null
npm
GHSA-jgrh-5m3h-9c5f
Web Cache Poisoning in find-my-way
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.
{'CVE-2020-7764'}
2020-11-10T20:19:42Z
2020-11-09T22:17:13Z
MODERATE
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7764', 'https://www.npmjs.com/package/find-my-way', 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac', 'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269'}
null
npm
GHSA-jvfv-jhw9-jmpp
Malicious Package in b5ffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:22:21Z
2020-09-03T21:23:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1228'}
null
npm
GHSA-8j36-q8x7-pm6q
OS Command Injection in systeminformation
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
{'CVE-2020-7778'}
2021-04-13T18:32:29Z
2022-02-09T23:14:11Z
HIGH
null
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7778', 'https://gist.github.com/EffectRenan/b434438938eed0b21b376cedf5c81e80'}
null
npm
GHSA-x6wp-rfwh-hcx7
Regular Expression Denial of Service in content
Affected versions of `content` are vulnerable to a regular expression denial of service when parsing malicious `Content-Type` and `Content-Disposition` headers. ## Recommendation Update to version 3.0.6 or later.
{'CVE-2017-16111'}
2020-08-31T18:26:37Z
2018-07-24T19:55:05Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16111', 'https://www.npmjs.com/advisories/530', 'https://github.com/advisories/GHSA-x6wp-rfwh-hcx7', 'https://nodesecurity.io/advisories/530'}
null
npm
GHSA-39pj-gq8q-9pfj
Authentication Weakness in keystone
Versions of `keystone` prior to 0.3.16 are affected by a partial authentication bypass vulnerability. In the default sign in functionality, if an attacker provides a full and correct password, yet only provides part of the associated email address, authentication will be granted. ## Recommendation Update to version 0.3.16 or later.
{'CVE-2015-9240'}
2021-08-31T20:54:56Z
2018-06-07T19:43:20Z
HIGH
null
{'CWE-1255'}
{'https://nodesecurity.io/advisories/60', 'https://www.npmjs.com/package/keystone', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9240', 'https://www.npmjs.com/advisories/60', 'https://github.com/advisories/GHSA-39pj-gq8q-9pfj'}
null
npm
GHSA-9mrq-cjgh-32g2
Low severity vulnerability that affects smartbanner.js
## rel noopener vulnerability ### Impact Clicking on smartbanner _View_ link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile 3rd parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. ### Patches `rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. ### Workarounds If you can not upgrade to `v1.14.1`: 1. Ensure _View_ link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams 2. If _View_ link is going to a 3rd party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links. Following combination of smartbanner meta tags can be used to achieve the above: ```html <meta name="smartbanner:enabled-platforms" content="none"> <meta name="smartbanner:include-user-agent-regex" content="Mobile.*Safari"> ``` ### References * [About rel=noopener](https://mathiasbynens.github.io/rel-noopener/) * [Safari 12.1 Release Notes](https://developer.apple.com/documentation/safari_release_notes/safari_12_1_release_notes#3130296) ### For more information If you have any questions or comments about this advisory: * Open an issue in [smartbanner.js](https://github.com/ain/smartbanner.js/issues/new)
null
2021-12-03T14:38:19Z
2019-09-13T13:22:33Z
LOW
null
null
{'https://github.com/advisories/GHSA-9mrq-cjgh-32g2', 'https://github.com/ain/smartbanner.js/', 'https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2'}
null
npm
GHSA-jchg-g94r-64qg
Malicious Package in mogobd
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:20:03Z
2020-09-03T19:50:10Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1132'}
null
npm
GHSA-4wcx-c9c4-89p2
Malicious Package in react-datepicker-plus
Versions 2.4.3 and 2.4.2 of `react-datepicker-plus` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:08:42Z
2020-09-11T21:23:30Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/946'}
null
npm
GHSA-vjcj-5g2r-vxqc
Moderate severity vulnerability that affects editor.md
Pandao Editor.md 1.5.0 allows XSS via crafted attributes of an invalid IMG element.
{'CVE-2018-16330'}
2021-09-20T22:06:15Z
2018-09-06T03:22:00Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-vjcj-5g2r-vxqc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16330', 'https://github.com/pandao/editor.md', 'https://github.com/pandao/editor.md/issues/612'}
null
npm
GHSA-9pcf-h8q9-63f6
Sandbox Breakout / Arbitrary Code Execution in safe-eval
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload chaining a function's callee and caller constructors can escape the sandbox and execute arbitrary code. For example, the payload ``` ((() => { const targetKey = Object.keys(this)[0]; Object.defineProperty(this, targetKey, { get: function() { return arguments.callee.caller.constructor( "return global.process.mainModule.require('child_process').execSync('pwd').toString()" )(); } }); })();``` may be used to print the `pwd` to the console. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:44:49Z
2020-09-03T17:12:41Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1033'}
null
npm
GHSA-8hqw-qp6r-vqcm
Malicious Package in bitcoin-sweep
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:42:42Z
2020-09-04T16:40:00Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1366'}
null
npm
GHSA-hvxq-j2r4-4jm8
Regular Expression Denial of Service in sql-injection
All versions of `sql-injection` are vulnerable to Regular Expression Denial of Service. The package processes a request's body with regular expressions that may take exponentially longer to execute for large inputs. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:49:33Z
2020-09-03T20:31:04Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1163'}
null
npm
GHSA-j3rh-8vwq-wh84
Use of Cryptographically Weak Pseudo-Random Number Generator in JHipster Kotlin
JHipster Kotlin is using an insecure source of randomness to generate all of it's random values. JHipster Kotlin relies upon apache commons lang3 `RandomStringUtils`. From the documentation: > Caveat: Instances of Random, upon which the implementation of this class relies, are not cryptographically secure. > \- https://commons.apache.org/proper/commons-lang/javadocs/api-3.9/org/apache/commons/lang3/RandomStringUtils.html Here are the examples of JHipster Kotlin'ss use of an insecure PRNG: https://github.com/jhipster/jhipster-kotlin/blob/193ae8f13c0be686f9687e78bacfedb144c47d8c/generators/server/templates/src/main/kotlin/package/service/util/RandomUtil.kt.ejs#L32 ## Proof Of Concepts Already Exist There has been a POC of taking one RNG value generated `RandomStringUtils` and reversing it to generate all of the past/future RNG values public since March 3rd, 2018. https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd POC Repository: https://github.com/alex91ar/randomstringutils ## Potential Impact Technical All that is required is to get one password reset token from a JHipster Kotlin generated service and using the POC above, you can reverse what all future password reset tokens to be generated by this server. This allows an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts. ## Potential Impact Scale Not as large as for the original jhipster project as the kotlin blueprint is not that widely used. ### Patches Update your generated applications to > 1.2.0 ### Workarounds Change the content of `RandomUtil.kt` like this: ```kotlin import java.security.SecureRandom import org.apache.commons.lang3.RandomStringUtils private const val DEF_COUNT = 20 object RandomUtil { private val secureRandom: SecureRandom = SecureRandom() init { secureRandom.nextBytes(byteArrayOf(64.toByte())) } private fun generateRandomAlphanumericString(): String { return RandomStringUtils.random(DEF_COUNT, 0, 0, true, true, null, secureRandom) } /** * Generate a password. * * @return the generated password. */ fun generatePassword(): String = generateRandomAlphanumericString() } ``` Important is to exchange **every** call of `RandomStringUtils.randomAlphaNumeric`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [JHipster Kotlin](https://github.com/jhipster/jhipster-kotlin)
{'CVE-2019-16303'}
2021-09-22T18:41:06Z
2020-06-26T16:48:13Z
CRITICAL
null
{'CWE-338'}
{'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16303', 'https://lists.apache.org/thread.html/rc3f00f5d3d2ec0e2381a3b9096d5f5b4d46ec1587ee7e251a3dbb897@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rc87fa35a48b5d70b06af6fb81785ed82e82686eb83307aae6d250dc9@%3Cissues.commons.apache.org%3E', 'https://www.npmjs.com/advisories/1188', 'https://github.com/jhipster/generator-jhipster/issues/10401', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-j3rh-8vwq-wh84', 'https://www.npmjs.com/advisories/1187', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://github.com/jhipster/jhipster-kotlin/issues/183', 'https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-466980', 'https://lists.apache.org/thread.html/r6d243e7e3f25daeb242dacf3def411fba32a9388d3ff84918cb28ddd@%3Cissues.commons.apache.org%3E', 'https://github.com/jhipster/generator-jhipster'}
null
npm
GHSA-j88m-953w-8r2c
Moderate severity vulnerability that affects rendertron
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
{'CVE-2017-18352'}
2021-09-14T19:19:42Z
2019-01-07T19:14:21Z
MODERATE
null
{'CWE-79'}
{'https://github.com/GoogleChrome/rendertron', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/advisories/GHSA-j88m-953w-8r2c', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
null
npm
GHSA-gmch-cm2p-9qw9
Cross-site Scripting in lightning-server
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
{'CVE-2020-7747'}
2021-04-21T18:19:08Z
2021-05-10T18:39:15Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7747', 'https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230'}
null
npm
GHSA-h466-j336-74wx
Prototype Pollution in mpath
Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation Update to version `0.5.1` or later.
{'CVE-2018-16490'}
2020-08-31T18:35:26Z
2019-02-07T18:17:26Z
MODERATE
null
{'CWE-400'}
{'https://hackerone.com/reports/390860', 'https://github.com/advisories/GHSA-h466-j336-74wx', 'https://www.npmjs.com/advisories/779', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}
null
npm
GHSA-6r7x-hc8m-985r
Cross-site Scripting in Joplin
Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS).
{'CVE-2020-9038'}
2022-01-04T19:44:56Z
2020-10-13T17:29:25Z
MODERATE
null
{'CWE-79'}
{'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038', 'https://github.com/laurent22/joplin', 'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html', 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20'}
null
npm
GHSA-92qm-hc53-jjrj
Downloads Resources over HTTP in ibapi
Affected versions of `ibapi` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `ibapi`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10593'}
2021-09-16T20:44:02Z
2019-02-18T23:34:17Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://gitlord.com/summary/~dchem%2Fnode-ibapi-addon.git', 'https://nodesecurity.io/advisories/182', 'https://www.npmjs.com/advisories/182', 'https://gitlord.com/r/~dchem/node-ibapi-addon.git', 'https://gitlord.com/commitdiff/~dchem%2Fnode-ibapi-addon.git/c00dd7c98cca0423052148337e523eeb7776da68', 'https://www.npmjs.com/package/ibapi/v/2.5.6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10593'}
null
npm
GHSA-78j5-gcmf-vqc8
Cross-Site Scripting (XSS) in Verdaccio
### Impact What kind of vulnerability is it? Who is impacted? Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials. ### Patches Has the problem been patched? What versions should users upgrade to? Users that still using `v3` must upgrade to **>3.12.0** or those have no problem to migrate to a major version **>=4.0.0** also fix the issue. ### Workarounds Is there a way for users to fix or remediate the vulnerability without upgrading? No, the users must update. ### References Are there any links users can visit to find out more? https://www.npmjs.com/advisories/832 https://www.npmjs.com/advisories/833 The issue was reported by the NPMJS Security Team ### For more information If you have any questions or comments about this advisory: * Read the Security Policy to find the ways to be in contact with us.
{'CVE-2019-14772'}
2021-10-06T22:02:18Z
2019-05-29T18:02:59Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/832', 'https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14772', 'https://github.com/verdaccio/verdaccio', 'https://www.npmjs.com/advisories/833'}
null
npm
GHSA-rrvm-gqq8-q2wx
Malicious Package in require-port
Version 1.0.0 of `require-port` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:45:41Z
2020-09-03T21:05:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1197'}
null
npm
GHSA-9gqh-q4cx-f2h9
Downloads Resources over HTTP in ipip
Affected versions of `ipip` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability, and the README states that the package is deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10594'}
2021-09-16T20:43:33Z
2019-02-18T23:50:41Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10594', 'https://github.com/ChiChou/node-ipip', 'https://nodesecurity.io/advisories/184', 'https://www.npmjs.com/advisories/184'}
null
npm
GHSA-wfp9-vr4j-f49j
NoSQL Injection in sequelize
Versions of `sequelize` prior to 4.12.0 are vulnerable to NoSQL Injection. Query operators such as `$gt` are not properly sanitized and may allow an attacker to alter data queries, leading to NoSQL Injection. ## Recommendation Upgrade to version 4.12.0 or later
null
2020-08-31T18:36:59Z
2019-06-04T20:04:27Z
HIGH
null
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174147', 'https://www.npmjs.com/advisories/820', 'https://www.npmjs.com/advisories/820/versions', 'https://github.com/sequelize/sequelize/issues/7310'}
null
npm
GHSA-qh38-wrgf-cj2c
Directory Traversal in iter-server
Affected versions of `iter-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16183'}
2020-08-31T18:23:46Z
2020-09-01T18:48:05Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/454', 'https://www.npmjs.com/advisories/454', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16183', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-server'}
null
npm
GHSA-vcqg-cmv3-wj57
Directory Traversal in rtcmulticonnection-client
Affected versions of `rtcmulticonnection-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16125'}
2021-09-16T20:52:29Z
2018-07-23T22:48:49Z
HIGH
null
{'CWE-22', 'CWE-12'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16125', 'https://github.com/advisories/GHSA-vcqg-cmv3-wj57', 'https://github.com/muaz-khan/Reliable-Signaler', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/rtcmulticonnection-client', 'https://www.npmjs.com/advisories/385', 'https://nodesecurity.io/advisories/385'}
null
npm
GHSA-h4j5-c7cj-74xg
Arbitrary Code Injection
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
{'CVE-2020-28502'}
2021-05-04T18:02:15Z
2021-05-04T18:02:34Z
HIGH
null
{'CWE-94'}
{'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082937', 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js#L480', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUESTSSL-1082936', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28502', 'https://github.com/mjwwit/node-XMLHttpRequest/blob/ae38832a0f1347c5e96dda665402509a3458e302/lib/XMLHttpRequest.js#L531', 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6'}
null
npm
GHSA-8fv7-vm2p-5495
Directory Traversal in welcomyzt
`welcomyzt` is a simple file server. `welcomyzt` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16123'}
2020-08-31T18:21:24Z
2020-09-01T17:23:53Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/388', 'https://www.npmjs.com/advisories/388', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16123', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket'}
null
npm
GHSA-5mm9-55c9-p5r7
Malicious Package in mogoose
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:26:48Z
2020-09-03T19:53:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1135'}
null
npm
GHSA-r87w-47m8-22w3
Template Injection in jsrender
Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input. ## Proof of Concept ``` <POC-REQUEST> {{for ~x!=1?(constructor.constructor("return arguments.callee.caller")()):~y(10)}} {{:#data}} {{/for}} </POC-REQUEST> ``` ``` <POC-RESPONSE> function anonymous(data,view,j,u) { // template var v,t=j._tag,ret="" +t("for",view,this,[ {view:view,tmpl:1, params:{args:['~x!=1?(constructor.constructor(\"return arguments.callee.caller\")()):~y(10)']}, args:[view.hlp("x")!=1?(data.constructor.constructor("return arguments.callee.caller")()):view.hlp("y")(10)], props:{}}]); return ret; } <POC-RESPONSE> ``` ## Recommendation Update to version 0.9.74 or later.
{'CVE-2016-3942'}
2021-09-23T21:26:38Z
2020-09-01T15:24:24Z
MODERATE
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-3942', 'https://www.npmjs.com/advisories/97', 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6', 'https://github.com/BorisMoore/jsrender', 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173'}
null
npm
GHSA-j4rw-x3vg-c8r7
Prototype Pollution in node-oojs
All versions of package node-oojs up to and including version 1.4.0 are vulnerable to Prototype Pollution via the setPath function.
{'CVE-2020-7721'}
2021-05-05T18:40:32Z
2021-05-06T18:12:37Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7721', 'https://snyk.io/vuln/SNYK-JS-NODEOOJS-598678'}
null
npm
GHSA-m8cr-q935-8j67
Path Traversal in buttle
All versions of `buttle` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2018-3766'}
2021-01-08T18:29:58Z
2018-09-18T13:47:57Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3766', 'https://github.com/advisories/GHSA-m8cr-q935-8j67', 'https://www.npmjs.com/advisories/990', 'https://hackerone.com/reports/358112'}
null
npm
GHSA-84cm-v6jp-gjmr
OS command injection in git-diff-apply
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
{'CVE-2019-10776'}
2021-08-19T17:14:36Z
2020-02-14T23:09:24Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10776', 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5', 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,'}
null
npm
GHSA-v5v3-8jqf-vg27
Downloads Resources over HTTP in aerospike
Affected versions of `aerospike` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `aerospike`. ## Recommendation Update to version 2.4.2 or later
{'CVE-2016-10558'}
2021-01-08T01:57:37Z
2019-02-18T23:54:22Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/167', 'https://nodesecurity.io/advisories/167', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10558', 'https://github.com/advisories/GHSA-v5v3-8jqf-vg27'}
null
npm
GHSA-hg7w-2pf7-mxm2
Malicious Package in wbe3
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T16:37:42Z
2020-09-03T17:02:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1414'}
null
npm
GHSA-72p5-2r6g-fm6v
Moderate severity vulnerability that affects total.js
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format).
{'CVE-2019-10260'}
2021-06-11T14:16:33Z
2019-04-02T15:46:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-72p5-2r6g-fm6v', 'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad', 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10260'}
null
npm
GHSA-q4h9-46xg-m3x9
UUPSUpgradeable vulnerability in @openzeppelin/contracts-upgradeable
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301). ### References A post-mortem will be published in a few days in the [OpenZeppelin Forum](https://forum.openzeppelin.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
null
2021-09-14T22:17:40Z
2021-09-15T20:22:13Z
CRITICAL
null
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-q4h9-46xg-m3x9', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable'}
null
npm
GHSA-vp93-gcx5-4w52
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize JSON schemas, allowing attackers to execute arbitrary JavaScript using `<script>` tags in the method descriptions. ## Recommendation Upgrade to version 2.2.1 or later.
null
2021-09-28T17:00:47Z
2020-09-11T21:21:19Z
MODERATE
null
{'CWE-79'}
{'https://github.com/swagger-api/swagger-ui/issues/1864', 'https://www.npmjs.com/advisories/986', 'https://github.com/swagger-api/swagger-ui'}
null
npm
GHSA-wqfc-cr59-h64p
Missing Encryption of Sensitive Data in yarn
Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.
{'CVE-2019-5448'}
2021-08-17T19:40:44Z
2019-07-31T04:22:15Z
HIGH
null
{'CWE-319', 'CWE-311'}
{'https://github.com/ChALkeR/notes/blob/master/Yarn-vuln.md', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5448', 'https://hackerone.com/reports/640904', 'https://yarnpkg.com/blog/2019/07/12/recommended-security-update/'}
null
npm
GHSA-x2jc-pwfj-h9p3
SQL Injection in sequelize
Affected versions of `sequelize` use MySQL's backslash-based escape syntax when connecting to SQLite, despite the fact that SQLite uses PostgreSQL's escape syntax, which can result in a SQL Injection vulnerability. ## Recommendation Update to version 1.7.0-alpha3 or later.
{'CVE-2016-10554'}
2020-08-31T18:11:14Z
2019-02-18T23:54:28Z
MODERATE
null
{'CWE-89'}
{'https://nodesecurity.io/advisories/113', 'https://github.com/advisories/GHSA-x2jc-pwfj-h9p3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10554', 'https://www.npmjs.com/advisories/113', 'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d'}
null
npm
GHSA-6g33-f262-xjp4
Cryptographically Weak PRNG in randomatic
Affected versions of `randomatic` generate random values using a cryptographically weak psuedo-random number generator. This may result in predictable values instead of random values as intended. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2017-16028'}
2021-01-08T20:58:33Z
2018-10-09T00:57:21Z
LOW
null
{'CWE-330'}
{'https://github.com/tableflip/react-native-meteor-oauth/blob/a7eb738b74c469f5db20296b44b7cae4e2337435/src/meteor-oauth.js#L66', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16028', 'https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c182180907227fe1#diff-b9cfc7f2cdf78a7f4b91a753d10865a2', 'https://github.com/advisories/GHSA-6g33-f262-xjp4', 'https://nodesecurity.io/advisories/157', 'https://www.npmjs.com/advisories/157'}
null
npm
GHSA-mqgv-67vx-g4m5
Prototype Pollution in js-data
All versions of package js-data prior to 3.0.10 are vulnerable to Prototype Pollution via the deepFillIn function.
{'CVE-2020-28442'}
2022-02-09T22:45:52Z
2022-02-09T22:45:52Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-JSDATA-1023655', 'https://github.com/js-data/js-data/pull/574', 'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28442'}
null
npm
GHSA-22q9-hqm5-mhmc
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to encode output in GET requests. The request is meant to respond with Content-Type `application/json` which does not trigger the vulnerability but if the web server changes the header to `text/html` it may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.2.1 or later.
null
2021-09-28T17:01:08Z
2020-09-11T21:22:24Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/987', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/issues/1154'}
null
npm
GHSA-fx6f-fpfv-5hmc
Malicious Package in uploader-plugin
Version 1.0.2 of `uploader-plugin` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:14Z
2020-09-03T19:10:12Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1100'}
null
npm
GHSA-m794-qv59-gj7c
Malicious Package in signqle
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:43:26Z
2020-09-03T17:03:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1410'}
null
npm
GHSA-747p-jfqv-f43r
Downloads Resources over HTTP in mystem3
Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`. ## Recommendation Update to version 1.0.8 or later.
{'CVE-2016-10626'}
2021-06-11T14:04:48Z
2019-02-18T23:47:26Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/229', 'https://www.npmjs.com/advisories/229', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626', 'https://github.com/advisories/GHSA-747p-jfqv-f43r', 'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'}
null
npm
GHSA-m34x-wgrh-g897
Directory traversal vulnerability in Next.js
Next.js 4 before 4.2.3 has Directory Traversal under the `/_next` request namespace.
{'CVE-2018-6184'}
2022-04-28T20:13:30Z
2018-01-24T19:38:52Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-6184', 'https://github.com/zeit/next.js', 'https://github.com/advisories/GHSA-m34x-wgrh-g897', 'https://github.com/vercel/next.js/releases/tag/4.2.3'}
null
npm
GHSA-f5c9-x9j6-87qp
Prototype pollution in dotty
Prototype pollution vulnerability in 'dotty' before version 0.1.1 allows attackers to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25912'}
2021-02-03T07:41:22Z
2021-02-05T20:43:08Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/package/dotty', 'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25912'}
null
npm
GHSA-49wp-qq6x-g2rf
Cross-site Request Forgery in fastify-csrf
The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: `cookieOpts: { path: '/', sameSite: true }` 2. The CSRF token was available in the GET query parameter
{'CVE-2020-28482'}
2021-01-20T19:49:01Z
2021-01-20T21:30:34Z
MODERATE
null
{'CWE-352'}
{'https://www.npmjs.com/package/fastify-csrf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28482', 'https://github.com/fastify/fastify-csrf/pull/26', 'https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044', 'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'}
null
npm
GHSA-rgx6-rjj4-c388
Cross-site Scripting in ckeditor4
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled.
{'CVE-2021-33829'}
2021-11-18T15:22:36Z
2021-06-21T17:16:42Z
MODERATE
null
{'CWE-79'}
{'https://www.drupal.org/sa-core-2021-003', 'https://ckeditor.com/blog/ckeditor-4.16.1-with-accessibility-enhancements/#improvements-for-comments-in-html-parser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33829', 'https://www.npmjs.com/package/ckeditor4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-xp63-6vf5-xf3v
Command injection in codecov (npm package)
### Impact The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix was incomplete. It only blocked `&`, and command injection is still possible using backticks instead to bypass the sanitizer. We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `codecov-node` project [here](https://lgtm.com/query/7714424068617023832/). ### Patches This has been patched in version 3.7.1 ### Workarounds None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection. ### References * [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh) ### For more information If you have any questions or comments about this advisory: * Contact us via our [Security Email](mailto:security@codecov.io)
{'CVE-2020-15123'}
2021-01-07T23:47:13Z
2020-07-20T17:20:20Z
MODERATE
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15123', 'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d', 'https://github.com/codecov/codecov-node/pull/180', 'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-xf3v', 'https://lgtm.com/query/7714424068617023832', 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh'}
null
npm
GHSA-qhv9-728r-6jqg
ReDoS via long string of semicolons in tough-cookie
Affected versions of `tough-cookie` may be vulnerable to regular expression denial of service when long strings of semicolons exist in the `Set-Cookie` header. ## Recommendation Update to version 2.3.0 or later.
{'CVE-2016-1000232'}
2021-09-16T19:58:53Z
2018-10-10T18:57:02Z
MODERATE
null
{'CWE-20'}
{'https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae', 'https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/', 'https://github.com/salesforce/tough-cookie', 'https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://access.redhat.com/security/cve/cve-2016-1000232', 'https://github.com/advisories/GHSA-qhv9-728r-6jqg', 'https://www.npmjs.com/advisories/130', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000232', 'https://access.redhat.com/errata/RHSA-2016:2101'}
null
npm
GHSA-6q4w-3wp4-q5wf
Denial of Service in get-ip-range
The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
{'CVE-2021-27191'}
2022-05-03T02:57:48Z
2021-04-13T15:15:57Z
HIGH
null
{'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191', 'https://www.npmjs.com/package/get-ip-range', 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6', 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}
null
npm
GHSA-xj62-87pg-vcv3
Regular Expression Denial of Service in jshamcrest
The `jshamcrest` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in to the emailAddress validator. ## Proof of concept ``` var js = require('jshamcrest') var emailAddress = new js.JsHamcrest.Matchers.emailAddress(); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=1;i<=10000000;i=i+1) { console.log("COUNT: " + i); var str = '66666666666666666666666666666@ffffffffffffffffffffffffffffffff.' + genstr(i, 'a') + '{' console.log("LENGTH: " + str.length); var start = process.hrtime(); emailAddress.matches(str) var end = process.hrtime(start); console.log(end); } ``` ### Results It takes about 116 characters to get a 1.6 second event loop block. ``` [ 1, 633084590 ] COUNT: 51 LENGTH: 116 ``` # Timeline - October 25, 2015 - Vulnerability Identified - October 25, 2015 - Maintainers notified (no response) ## Recommendation The `jshamcrest` package currently has no patched versions available. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=validator).
{'CVE-2016-10521'}
2021-01-08T00:03:52Z
2019-02-18T23:38:51Z
HIGH
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-xj62-87pg-vcv3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10521', 'https://www.npmjs.com/advisories/53', 'https://nodesecurity.io/advisories/53'}
null
npm
GHSA-7qg7-6g3g-8vxg
Malicious Package in bwffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T15:46:17Z
2020-09-03T22:46:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1269'}
null
npm
GHSA-hx78-272p-mqqh
Authorization Bypass in graphql-shield
Versions of `graphql-shield` prior to 6.0.6 are vulnerable to an Authorization Bypass. The rule caching option `no_cache` relies on keys generated by cryptographically insecure functions, which may cause rules to be incorrectly cached. This allows attackers to access information they should not have access to in case of a key collision. ## Recommendation Upgrade to version 6.0.6 or later.
null
2020-08-31T18:47:59Z
2020-09-03T19:21:11Z
LOW
null
{'CWE-285'}
{'https://www.npmjs.com/advisories/1121'}
null
npm
GHSA-r96p-v3cr-gfv8
Cross-site Scripting (XSS) in @scullyio/scully
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
{'CVE-2020-28470'}
2021-07-29T20:42:20Z
2021-04-13T15:28:01Z
HIGH
null
{'CWE-79'}
{'https://github.com/scullyio/scully/pull/1182', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470', 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829'}
null
npm
GHSA-5vm8-hhgr-jcjp
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser for `form` elements. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs, and then submitting the form. However, as TinyMCE does not allow forms to be submitted while editing, the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. This impacts all users who are using TinyMCE 5.7.0 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.7.1 by improved URL sanitization logic. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.7.1 or higher - Manually sanitize `form` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter). - Disable `form` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting. #### Example: Sanitizing using a node filter ```js editor.parser.addNodeFilter('form', function(nodes) { nodes.forEach(function(node) { if (node.attributes) { node.attributes.forEach(function(attr) { var name = attr.name; var value = attr.value; // Sanitize the attribute value here or remove it entirely var sanitizedValue = ...; node.attr(name, santizedValue); }); } }); }); ``` #### Example: Using invalid_elements ```js invalid_elements: 'form' ``` ### Acknowledgements Tiny Technologies would like to thank Mikhail Khramenkov at Solar Security Research Team for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes571/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2021-05-27T21:29:43Z
2021-05-28T19:18:53Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5vm8-hhgr-jcjp'}
null
npm
GHSA-6g8v-hpgw-h2v7
Prototype pollution in gsap
There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0.
{'CVE-2020-28478'}
2021-01-20T05:34:02Z
2021-01-20T21:21:50Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-GSAP-1054614', 'https://github.com/greensock/GSAP/releases/tag/3.6.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478', 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150', 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147', 'https://www.npmjs.com/package/gsap/v/3.6.0'}
null
npm
GHSA-5gwh-g79j-vh4q
Command Injection in pdf-image
Versions of `pdf-image` before 2.0.0 are vulnerable to command injection. This vulnerability is exploitable if the attacker has control over the `pdfFilePath` variable passed into `pdf-image`. ## Recommendation Update to version 2.0.0 or later.
{'CVE-2018-3757'}
2021-09-24T20:36:09Z
2020-09-01T20:44:52Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3757', 'https://hackerone.com/reports/340208', 'https://github.com/roest01/node-pdf-image', 'https://www.npmjs.com/advisories/670', 'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83'}
null
npm
GHSA-x5rq-j2xg-h7qm
Regular Expression Denial of Service (ReDoS) in lodash
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
{'CVE-2019-1010266'}
2022-03-09T22:54:28Z
2019-07-19T16:13:07Z
MODERATE
null
{'CWE-400'}
{'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266', 'https://github.com/lodash/lodash/wiki/Changelog', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/lodash/lodash/issues/3359', 'https://snyk.io/vuln/SNYK-JS-LODASH-73639'}
null
npm
GHSA-qjg4-w4c6-f6c6
Command injection in mversion
### Impact This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. ### Patches Patched by version 2.0.0. Previous releases are deprecated in npm. ### Workarounds Make sure to escape git commit messages when using the commitMessage option for the update function.
{'CVE-2020-4059'}
2021-01-08T21:00:24Z
2020-06-18T19:23:17Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4059', 'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338', 'https://github.com/mikaelbr/mversion/security/advisories/GHSA-qjg4-w4c6-f6c6'}
null
npm
GHSA-8mrf-g42m-5qc8
Downloads Resources over HTTP in dalek-browser-chrome-canary
Affected versions of `dalek-browser-chrome-canary` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome-canary`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10584'}
2021-01-08T19:09:14Z
2019-02-18T23:51:14Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-8mrf-g42m-5qc8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10584', 'https://nodesecurity.io/advisories/181', 'https://www.npmjs.com/advisories/181'}
null
npm
GHSA-3fv6-q5xv-fhpw
Malicious Package in coffee-project
Version 1.7.5 of `coffee-project` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.7.5 of this module is found installed you will want to replace it with a version before or after 1.7.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:12Z
2020-09-01T19:50:23Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/621'}
null
npm
GHSA-hwj9-h5mp-3pm3
Regular Expression Denial of Service in postcss
The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.
{'CVE-2021-23368'}
2021-06-15T15:12:13Z
2021-05-10T15:29:24Z
MODERATE
null
{'CWE-400'}
{'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5', 'https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E', 'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595', 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734', 'https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23368', 'https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E'}
null
npm
GHSA-85cp-p426-42f5
Prototype Pollution in deep-get-set
All versions of package deep-get-set prior to version 1.1.1 are vulnerable to Prototype Pollution via the main function.
{'CVE-2020-7715'}
2021-05-05T18:16:57Z
2021-05-06T18:12:59Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7715', 'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4'}
null
npm
GHSA-f5w6-r7rg-mcgq
Regular Expression Denial of Service in validator
Versions of `validator` prior to 3.22.1 are affected by a regular expression denial of service vulnerability in the `isURL` method. ## Recommendation Update to version 3.22.1 or later.
{'CVE-2014-8882'}
2021-09-23T21:03:25Z
2020-08-31T23:01:13Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/npm:validator:20130705', 'https://github.com/chriso/validator.js/issues/152#issuecomment-48107184', 'https://www.npmjs.com/advisories/42', 'https://github.com/chriso/validator.js', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8882'}
null
npm
GHSA-7ww4-c3mj-93cf
Downloads Resources over HTTP in pm2-kafka
Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10693'}
2021-01-14T15:56:19Z
2020-09-01T16:16:33Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10693', 'https://www.npmjs.com/advisories/299', 'https://nodesecurity.io/advisories/299'}
null
npm
GHSA-9xgh-xgw5-p5cw
Hijacked Environment Variables in nodemssql
The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16057'}
2020-08-31T18:24:55Z
2018-11-09T17:42:54Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/484', 'https://www.npmjs.com/advisories/484', 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}
null
npm
GHSA-7fpw-cfc4-3p2c
High severity vulnerability that affects passport-wsfed-saml2
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
{'CVE-2017-16897'}
2021-09-02T21:17:05Z
2017-12-28T22:51:45Z
HIGH
null
{'CWE-290'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16897', 'https://auth0.com/docs/security/bulletins/cve-2017-16897', 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}
null
npm
GHSA-fr76-2wp8-fp92
Insecure template handling in Express-handlebars
Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability. A fix is discussed in https://github.com/express-handlebars/express-handlebars/pull/163
{'CVE-2021-32820'}
2022-02-10T23:35:21Z
2022-02-10T23:35:21Z
HIGH
null
{'CWE-200'}
{'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72', 'https://github.com/express-handlebars/express-handlebars#danger-', 'https://github.com/express-handlebars/express-handlebars/pull/163', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820', 'https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/', 'https://www.npmjs.com/package/express-handlebars', 'https://github.com/express-handlebars/express-handlebars/blob/78c47a235c4ad7bc2674bddd8ec2721567ed8c72/README.md#danger-'}
null
npm
GHSA-h6q6-9hqw-rwfv
Misinterpretation of malicious XML input
### Impact xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to 0.5.0 (once it is released) ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom`
{'CVE-2021-21366'}
2021-03-12T16:21:24Z
2021-03-12T22:39:39Z
LOW
null
{'CWE-436', 'CWE-115'}
{'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://www.npmjs.com/package/xmldom', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'}
null
npm
GHSA-29gp-92wp-94q8
Remote Code Execution in react-dev-utils
`react-dev-utils` on Windows is vulnerable to remote code execution. ## Recommendation Update to one of the follow versions, depending on the release line that you are using. - 1.0.4 - 2.0.2 - 3.1.2 - 4.2.2 - 5.0.2 - 6.0.0-next.a671462c
{'CVE-2018-6342'}
2021-01-08T20:09:17Z
2019-01-04T17:41:20Z
HIGH
null
{'CWE-78'}
{'https://github.com/facebook/create-react-app/pull/4866', 'https://www.npmjs.com/advisories/695', 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5', 'https://github.com/advisories/GHSA-29gp-92wp-94q8', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}
null
npm
GHSA-m9r7-q9fc-qwx5
Malicious Package in maybemaliciouspackage
All versions of `maybemaliciouspackage` contain malicious code. The package prints the system's SSH keys to the console as a postinstall script. ## Recommendation Remove the package from your environment. There are no further signs of compromise.
null
2021-09-30T17:43:47Z
2020-09-03T17:22:24Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1042'}
null
npm
GHSA-hqv3-qq72-78cv
Directory Traversal in startserver
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
{'CVE-2021-23430'}
2021-08-25T19:03:15Z
2021-09-02T17:09:40Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388', 'https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23430', 'https://github.com/xudafeng/startserver'}
null
npm
GHSA-jxqq-cqm6-pfq9
Regular Expression Denial of Service in slug
Affected versions of `slug` are vulnerable to a regular expression denial of service when parsing untrusted user input. The issue is low severity, as it takes 50,000 characters to cause the event loop to block for 2 seconds, About 50k characters can block the event loop for 2 seconds. ## Recommendation Update to version 0.9.2 or later.
{'CVE-2017-16117'}
2020-08-31T18:26:54Z
2018-07-24T20:06:45Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/537', 'https://github.com/advisories/GHSA-jxqq-cqm6-pfq9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16117', 'https://github.com/dodo/node-slug/issues/82', 'https://nodesecurity.io/advisories/537'}
null
npm
GHSA-g87g-4x3w-f8jp
Directory Traversal in serverwzl
Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16105'}
2020-08-31T18:20:29Z
2020-09-01T16:51:28Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16105', 'https://www.npmjs.com/advisories/363', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl', 'https://nodesecurity.io/advisories/363'}
null
npm
GHSA-qxrj-x7rm-2h49
Malicious Package in dhkey
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:01:13Z
2020-09-03T17:05:59Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1394'}
null
npm
GHSA-pq37-4c4g-v38c
Cross-site Scripting in vditor
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
{'CVE-2022-0341'}
2022-03-23T13:54:04Z
2022-03-15T00:01:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/vanessa219/vditor', 'https://github.com/Vanessa219/vditor/issues/1102', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628'}
null
npm
GHSA-4j54-mmmv-hjpm
Malicious Package in slush-fullstack-framework
Version 0.9.2 of `slush-fullstack-framework` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:33Z
2020-09-03T19:17:51Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1108'}
null
npm
GHSA-qf8x-vqjv-92gr
Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter
Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading it.
{'CVE-2022-24901'}
2022-05-04T18:59:46Z
2022-05-04T18:59:46Z
HIGH
null
{'CWE-287', 'CWE-295'}
{'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999', 'https://github.com/parse-community/parse-server/', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901'}
null
npm
GHSA-pv6r-vchh-cxg9
Denial of Service in apostrophe
Versions of `apostrophe` prior to 2.97.1 are vulnerable to Denial of Service. The `apostrophe-jobs` module sets a callback for incoming jobs and doesn't clear it regardless of its status. This causes the server to accumulate callbacks, allowing an attacker to start a large number of jobs and exhaust system memory. ## Recommendation Upgrade to version 2.97.1 or later.
null
2020-08-31T18:50:15Z
2020-09-03T20:42:09Z
LOW
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1183'}
null
npm
GHSA-238x-q7xf-p4xw
Downloads Resources over HTTP in arrayfire-js
Affected versions of `arrayfire-js` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `arrayfire-js`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10598'}
2021-01-08T20:10:36Z
2019-02-18T23:50:32Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/192', 'https://www.npmjs.com/advisories/192', 'https://github.com/advisories/GHSA-238x-q7xf-p4xw', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10598'}
null
npm
GHSA-m8xj-5v73-3hh8
curlrequest allows execution of arbitrary commands
curlrequest through 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands by using a semicolon char in any of the `options` values.
{'CVE-2020-7646'}
2021-08-25T21:07:36Z
2020-05-13T16:29:43Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/node-js-libs/curlrequest', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7646', 'https://github.com/node-js-libs/curlrequest/blob/master/index.js#L239,', 'https://snyk.io/vuln/SNYK-JS-CURLREQUEST-568274'}
null
npm
GHSA-gm9g-2g8v-fvxj
Prototype Pollution in upmerge
All versions of `upmerge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-16T20:59:20Z
2019-06-06T15:32:28Z
MODERATE
null
{'CWE-345', 'CWE-400'}
{'https://github.com/jazzfog/UpMerge', 'https://www.npmjs.com/advisories/809', 'https://snyk.io/vuln/SNYK-JS-UPMERGE-174133', 'https://hackerone.com/reports/439120'}
null
npm
GHSA-9cw2-jqp5-7x39
Multiple Content Injection Vulnerabilities in marked
Versions 0.3.0 and earlier of `marked` are affected by two cross-site scripting vulnerabilities, even when `sanitize: true` is set. The attack vectors for this vulnerability are GFM Codeblocks and JavaScript URLs. ## Recommendation Upgrade to version 0.3.1 or later.
{'CVE-2014-3743'}
2021-09-23T20:56:39Z
2020-08-31T22:52:52Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-1850', 'https://www.npmjs.com/advisories/22'}
null
npm
GHSA-27v7-qhfv-rqq8
Insecure Credential Storage in web3
All versions of `web3` are vulnerable to Insecure Credential Storage. The package stores encrypted wallets in local storage and requires a password to load the wallet. Once the wallet is loaded, the private key is accessible via LocalStorage. Exploiting this vulnerability likely requires a Cross-Site Scripting vulnerability to access the private key. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-08-31T20:56:47Z
2019-05-30T17:26:30Z
LOW
null
null
{'https://snyk.io/vuln/SNYK-JS-WEB3-174533', 'https://github.com/ethereum/web3.js', 'https://www.npmjs.com/advisories/877', 'https://github.com/ethereum/web3.js/issues/2739'}
null
npm
GHSA-pxcc-hj8w-fmm7
Command injection vulnerability in @prisma/sdk in getPackedPackage function
### Impact As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase. ### Patches Fixed in - @prisma/sdk@2.20.0 (latest channel) - @prisma/sdk@2.20.0-dev.29 (dev channel) Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245) ### Acknowledgements This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh). ### For more information If you have any questions or comments about this advisory: - Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions) - Email us at security@prisma.io
{'CVE-2021-21414'}
2021-03-31T18:00:32Z
2021-04-06T17:25:12Z
HIGH
null
{'CWE-78'}
{'https://security.netapp.com/advisory/ntap-20210618-0003/', 'https://github.com/prisma/prisma/pull/6245', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414', 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}
null
npm
GHSA-73v8-v6g4-vrpm
Arbitrary File Overwrite in decompress-zip
Vulnerable versions of `decompress-zip` are affected by the Zip-Slip vulnerability, an arbitrary file write vulnerability. The vulnerability occurs because `decompress-zip` does not verify that extracted files do not resolve to targets outside of the extraction root directory. ## Recommendation For `decompress-zip` 0.2.x upgrade to 0.2.2 or later. For `decompress-zip` 0.3.x upgrade to 0.3.2 or later.
null
2020-08-31T18:35:21Z
2020-09-02T15:58:13Z
HIGH
null
null
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/488.json', 'https://www.npmjs.com/advisories/777'}
null
npm
GHSA-79jw-6wg7-r9g4
Use of Potentially Dangerous Function in mixme
### Impact In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). ### Patches The problem is corrected starting with version 0.5.1. ### References Issue: https://github.com/adaltas/node-mixme/issues/1 Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
{'CVE-2021-29491'}
2021-05-07T21:13:59Z
2021-05-06T15:45:39Z
HIGH
null
{'CWE-913'}
{'https://security.netapp.com/advisory/ntap-20210622-0002/', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29491'}
null