ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-r773-pmw3-f4mr
|
Open Redirect in koa-remove-trailing-slashes
|
The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::removeTrailingSlashes(), as the web server uses relative URLs instead of absolute URLs.
|
{'CVE-2021-23384'}
|
2021-05-19T17:57:27Z
|
2022-02-10T23:47:27Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/vgno/koa-remove-trailing-slashes/blame/6a01ba8fd019bd3ece44879c553037ad96ba7d47/index.js%23L31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23384', 'https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708'}
| null |
npm
|
GHSA-fm7r-2pr7-rw2p
|
Malicious Package in yeoman-genrator
|
Version 3.1.1 of `yeoman-genrator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:57:05Z
|
2020-09-02T21:45:02Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/912'}
| null |
npm
|
GHSA-p6h4-93qp-jhcm
|
Command injection in Parse Server through prototype pollution
|
### Impact
This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows.
### Patches
Upgrade to Parse Server >=4.10.7. If you are using a prerelease version of Parse Server 5.0 (alpha, beta) we will publish a timely fix for these. However, as a general reminder we do not consider prerelease versions to be suitable for production deployment.
Note that as part of the fix a new security feature scans for sensitive keywords in request data to prevent JavaScript prototype pollution. If such a keyword is found, the request is rejected with HTTP response code `400` and Parse Error `105` (`INVALID_KEY_NAME`). By default these keywords are: `{_bsontype: "Code"}`, `constructor`, `__proto__`. If you are using any of these keywords in your request data, you can override the default keywords by setting the new Parse Server option `requestKeywordDenylist` to `[]` and specify your own keywords as needed.
### Workarounds
Although the fix is more broad and includes several aspects of the vulnerability, a quick and targeted fix can be achieved by patching the MongoDB Node.js driver and disable BSON code execution. To apply the patch, add the following code to be executed before starting Parse Server, for example in `index.js`.
```
const BSON = require('bson');
const internalDeserialize = BSON.prototype.deserialize;
BSON.prototype.deserialize = (buffer, options = Object.create(null), ...others) => {
if (options.constructor) {
options = Object.assign(Object.create(null), options);
}
return internalDeserialize(buffer, options, ...others);
};
const internalDeserializeStream = BSON.prototype.deserializeStream;
BSON.prototype.deserializeStream = (
data,
startIndex,
numberOfDocuments,
documents,
docStartIndex,
options = Object.create(null),
...others
) => {
if (options.constructor) {
options = Object.assign(Object.create(null), options);
}
return internalDeserializeStream(
data,
startIndex,
numberOfDocuments,
documents,
docStartIndex,
options,
...others
);
};
```
### References
- Original report on [huntr.dev](https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/)
|
{'CVE-2022-24760'}
|
2022-04-19T18:24:25Z
|
2022-03-11T23:53:23Z
|
CRITICAL
| null |
{'CWE-74', 'CWE-1321'}
|
{'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d', 'https://github.com/parse-community/parse-server', 'https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24760', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm'}
| null |
npm
|
GHSA-hpfq-8wx8-cgqw
|
Cross-Site Scripting in ids-enterprise
|
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later
| null |
2020-08-31T18:41:56Z
|
2019-06-13T18:59:18Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/infor-design/enterprise-ng/issues/511', 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4', 'https://www.npmjs.com/advisories/957'}
| null |
npm
|
GHSA-fw2f-7f87-5r6c
|
Improper Input Validation in access-policy
|
access-policy through 3.1.0 is vulnerable to Arbitrary Code Execution. User input provided to the `template` function is executed by the `eval` function resulting in code execution.
|
{'CVE-2020-7674'}
|
2021-07-29T18:14:19Z
|
2021-05-17T21:00:29Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7674', 'https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490'}
| null |
npm
|
GHSA-vfrc-7r7c-w9mx
|
Prototype Pollution in highlight.js
|
### Impact
Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable.
The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector.
_If your website or application does not render user provided data it should be unaffected._
### Patches
Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release.
### Workarounds
#### Patch your library
Manually patch your library to create null objects for both `languages` and `aliases`:
```js
const HLJS = function(hljs) {
// ...
var languages = Object.create(null);
var aliases = Object.create(null);
```
#### Filter out bad data from end users
Filter the language names that users are allowed to inject into your HTML to guarantee they are valid.
### References
* [What is Prototype Pollution?](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
* https://github.com/highlightjs/highlight.js/pull/2636
### For more information
If you have any questions or comments about this advisory:
* Please file an issue against [highlight.js](https://github.com/highlightjs/highlight.js/issues/)
|
{'CVE-2020-26237'}
|
2021-01-08T21:00:09Z
|
2020-11-24T22:58:41Z
|
LOW
| null |
{'CWE-471'}
|
{'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26237', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html', 'https://github.com/highlightjs/highlight.js/pull/2636', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx', 'https://www.npmjs.com/package/highlight.js'}
| null |
npm
|
GHSA-rh46-3fgc-mvrf
|
Validation bypass is possible in Json Pattern Validator
|
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
|
{'CVE-2019-19507'}
|
2021-08-19T16:05:30Z
|
2019-12-04T21:25:28Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19507', 'https://www.npmjs.com/package/jpv', 'https://github.com/manvel-khnkoyan/jpv/issues/6'}
| null |
npm
|
GHSA-hfwx-c7q6-g54c
|
Vulnerability allowing for reading internal HTTP resources
|
### Impact
The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.
The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.
The previous versions have been marked as deprecated on NPM.
### Patches
Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.**
Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later.
### Workarounds
There are no known workarounds to the issue - an upgrade to version 2.1.0 is required.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues)
* Email us at [security@highsoft.com](mailto:security@highsoft.com)
| null |
2021-03-12T22:32:16Z
|
2021-03-12T23:04:46Z
|
HIGH
| null |
{'CWE-552'}
|
{'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6', 'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210', 'https://www.npmjs.com/package/highcharts-export-server'}
| null |
npm
|
GHSA-w992-2gmj-9xxj
|
Cross-Site Scripting in swagger-ui
|
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package allows HTML code in the `swagger.apiInfo.description` value without proper sanitization, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.2.1 or later.
| null |
2021-09-28T17:02:50Z
|
2020-09-11T21:23:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/988', 'https://github.com/swagger-api/swagger-ui/issues/830', 'https://github.com/swagger-api/swagger-ui'}
| null |
npm
|
GHSA-c82c-8pjw-6829
|
Malicious Package in @impala/bmap
|
Version 1.0.3 of `@impala/bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:41:28Z
|
2020-09-01T19:41:45Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://snyk.io/vuln/SNYK-JS-IMPALABMAP-451019', 'https://github.com/advisories/GHSA-c82c-8pjw-6829', 'https://www.npmjs.com/advisories/613'}
| null |
npm
|
GHSA-896r-f27r-55mw
|
json-schema is vulnerable to Prototype Pollution
|
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3918'}
|
2021-11-19T20:15:58Z
|
2021-11-19T20:16:17Z
|
MODERATE
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3918', 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9', 'https://github.com/kriszyp/json-schema', 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}
| null |
npm
|
GHSA-w8f3-pvx4-4c3h
|
Prototype Pollution in arr-flatten-unflatten
|
All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor.
|
{'CVE-2020-7713'}
|
2021-05-05T19:00:34Z
|
2021-05-06T18:11:39Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7713', 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372', 'https://github.com/Quernest/arr-flatten-unflatten/pull/8', 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396'}
| null |
npm
|
GHSA-j383-35pm-c5h4
|
Path Traversal in Grunt
|
Grunt prior to version 1.5.2 is vulnerable to path traversal.
|
{'CVE-2022-0436'}
|
2022-04-26T21:51:41Z
|
2022-04-13T00:00:16Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/gruntjs/grunt/pull/1743', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/gruntjs/grunt', 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436'}
| null |
npm
|
GHSA-5ff8-jcf9-fw62
|
Cross-Site Scripting in markdown-it-katex
|
All versions of `markdown-it-katex` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser by triggering an error.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T20:53:26Z
|
2020-09-04T17:55:35Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/waylonflinn/markdown-it-katex/issues/26', 'https://github.com/waylonflinn/markdown-it-katex', 'https://www.npmjs.com/advisories/1466'}
| null |
npm
|
GHSA-gjc9-932x-c59p
|
Malicious Package in leaflet-gpx
|
Version 1.0.1 of `leaflet-gpx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:10Z
|
2020-09-03T00:34:33Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/937'}
| null |
npm
|
GHSA-743r-5g92-5vgf
|
Improper certificate management in AWS IoT Device SDK v2
|
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.
|
{'CVE-2021-40829'}
|
2022-03-03T05:13:12.773300Z
|
2021-11-24T21:11:16Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
| null |
npm
|
GHSA-cmh5-qc8w-xvcq
|
Cross-Site Scripting in i18next
|
Affected versions of `i18next` may fail to sanitize user input when certain configuration options are used. When using the `.init` method, passing interpolation options without passing an `escapeValue` will default to `undefined` rather than the assumed `true`.
## Proof of Concept
```
var init = i18n.init({
interpolation: {
prefix: "__",
suffix: "__",
escapeValue: true
}
}, function(){
var test = i18n.t('__firstName__ __lastName__', {
firstName: 'Bob',
lastName: '["foo","bar"]',
});
console.log(test);
});
```
When `escapeValue` is explicitly passed, the result of `test` is:
```
<script>alert(1)</script> Johnson
```
This is supposed to be the default. However, if `escapeValue` is not included, the result is the unescaped string:
```
<script>alert(1)</script> Johnson
```
## Recommendation
Update to version 3.4.4 or later.
|
{'CVE-2017-16010'}
|
2020-08-31T18:19:23Z
|
2018-07-24T19:58:33Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16010', 'https://github.com/i18next/i18next/pull/826', 'https://nodesecurity.io/advisories/326', 'https://github.com/advisories/GHSA-cmh5-qc8w-xvcq', 'https://www.npmjs.com/advisories/326'}
| null |
npm
|
GHSA-pc58-wgmc-hfjr
|
Prototype Pollution in mout
|
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
|
{'CVE-2020-7792'}
|
2022-02-09T22:49:10Z
|
2022-02-09T22:49:10Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792', 'https://snyk.io/vuln/SNYK-JS-MOUT-1014544'}
| null |
npm
|
GHSA-gp2f-254m-rh32
|
Unauthorized access to data in @sap-cloud-sdk/core
|
### Impact
This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations.
In some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions.
By default, destination caching is disabled. If it is enabled the maximum lifetime is 5 minutes which limits the attack vector.
### Patches
The problem was fixed by #1769 and #1770. The security for caching has been increased. The changes are released in version 1.52.0.
### Workarounds
Disable destination caching (it is disabled by default).
### References
[destination cache API docs](https://sap.github.io/cloud-sdk/api/1.51.0/modules/sap_cloud_sdk_core#destinationCache)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/SAP/cloud-sdk-js
|
{'CVE-2021-41251'}
|
2021-11-08T21:31:39Z
|
2021-11-10T16:51:41Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/SAP/cloud-sdk-js/pull/1770', 'https://github.com/SAP/cloud-sdk-js/pull/1769', 'https://github.com/SAP/cloud-sdk-js/security/advisories/GHSA-gp2f-254m-rh32', 'https://github.com/SAP/cloud-sdk-js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41251'}
| null |
npm
|
GHSA-rqff-837h-mm52
|
Authorization bypass in url-parse
|
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
|
{'CVE-2022-0512'}
|
2022-02-24T14:00:06Z
|
2022-02-15T00:02:46Z
|
MODERATE
| null |
{'CWE-639'}
|
{'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40', 'https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512', 'https://github.com/unshiftio/url-parse'}
| null |
npm
|
GHSA-h6pr-c536-6rjg
|
Prototype Pollution in object-path-set
|
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
|
{'CVE-2021-23507'}
|
2022-02-11T16:16:47Z
|
2022-02-05T00:00:31Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8', 'https://github.com/skratchdot/object-path-set/', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576', 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'}
| null |
npm
|
GHSA-7p6h-3fmw-539q
|
Downloads Resources over HTTP in selenium-chromedriver
|
Affected versions of `selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-chromedriver`.
## Recommendation
No patch is currently available for this vulnerability, and the author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
|
{'CVE-2016-10624'}
|
2021-01-08T21:16:45Z
|
2019-02-18T23:47:27Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-7p6h-3fmw-539q', 'https://nodesecurity.io/advisories/222', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10624', 'https://www.npmjs.com/advisories/222'}
| null |
npm
|
GHSA-8q2c-2396-hf7j
|
Malicious Package in appx-compiler
|
All versions of `appx-compiler` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:31:14Z
|
2020-09-03T17:34:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1050'}
| null |
npm
|
GHSA-f294-27fc-wgj7
|
Malicious Package in buffer-zor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:25:27Z
|
2020-09-03T22:16:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1255'}
| null |
npm
|
GHSA-vcph-57hv-89c4
|
Downloads Resources over HTTP in serc.js
|
Affected versions of `serc.js` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `serc.js`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10678'}
|
2021-01-08T01:57:33Z
|
2019-02-18T23:42:11Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10678', 'https://www.npmjs.com/advisories/277', 'https://github.com/advisories/GHSA-vcph-57hv-89c4', 'https://github.com/nowk/serc.js/blob/master/scripts/install.js#L5', 'https://nodesecurity.io/advisories/277'}
| null |
npm
|
GHSA-rhwp-9vm9-547q
|
Command Injection in onion-oled-js
|
This affects all versions up to and including version 0.0.2 of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23377'}
|
2021-05-06T22:33:55Z
|
2021-05-07T16:06:16Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23377', 'https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91'}
| null |
npm
|
GHSA-vpq5-4rc8-c222
|
Denial of Service in canvas
|
Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process.
## Recommendation
Upgrade to version 1.6.10
| null |
2020-08-31T18:36:22Z
|
2019-06-05T14:10:45Z
|
MODERATE
| null | null |
{'https://hackerone.com/reports/315037', 'https://www.npmjs.com/advisories/804', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
| null |
npm
|
GHSA-4q97-fh3f-j294
|
Prototype Pollution in tiny-conf
|
All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7724'}
|
2021-05-07T21:50:46Z
|
2021-05-10T15:59:24Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7724', 'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792'}
| null |
npm
|
GHSA-84qj-9qf2-q92r
|
Malicious Package in pm-controls
|
Version 1.1.8 of `pm-controls` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:38Z
|
2020-09-03T00:32:30Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/949'}
| null |
npm
|
GHSA-g785-775g-f2g8
|
Downloads Resources over HTTP in haxe
|
Affected versions of `haxe` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe`.
## Recommendation
Update to version 5.0.10 or later.
|
{'CVE-2016-10602'}
|
2021-09-16T20:44:52Z
|
2019-02-18T23:50:21Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://github.com/HaxeFoundation/npm-haxe', 'https://nodesecurity.io/advisories/177', 'https://www.npmjs.com/advisories/177', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10602'}
| null |
npm
|
GHSA-8vj3-jgcf-77jv
|
Malicious Package in requeest
|
All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:04:42Z
|
2020-09-02T20:26:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/858'}
| null |
npm
|
GHSA-3c6g-pvg8-gqw2
|
Command injection in json
|
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
|
{'CVE-2020-7712'}
|
2022-02-08T22:04:50Z
|
2021-05-06T18:11:21Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/pull/145', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/issues/144', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7712', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-JSON-597481', 'https://github.com/trentm/json', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E'}
| null |
npm
|
GHSA-533p-g2hq-qr26
|
Command Injection in treekill
|
All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:59:07Z
|
2020-09-04T17:16:35Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1433', 'https://hackerone.com/reports/703415'}
| null |
npm
|
GHSA-45hw-29x7-9x95
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker before 4.79.0 are vulnerable to Arbitrary File Read. It allows partial file reads for users who have access to Snyk's internal network via patch history from GitHub Commits API.
|
{'CVE-2020-7651'}
|
2021-07-29T17:23:08Z
|
2020-06-03T22:02:11Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7651'}
| null |
npm
|
GHSA-p33m-7w7f-gmj8
|
Uncontrolled Resource Consumption in fun-map
|
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
|
{'CVE-2020-7644'}
|
2021-07-29T16:41:29Z
|
2021-12-10T20:05:07Z
|
HIGH
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7644', 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,'}
| null |
npm
|
GHSA-6fw4-hr69-g3rv
|
Prototype Pollution in property-expr
|
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
|
{'CVE-2020-7707'}
|
2021-07-29T22:00:50Z
|
2021-05-06T17:29:47Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'}
| null |
npm
|
GHSA-xgf5-5gjr-4hjq
|
Directory Traversal in zjjserver
|
Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16201'}
|
2020-08-31T18:22:43Z
|
2020-09-01T18:15:20Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver', 'https://www.npmjs.com/advisories/427', 'https://nodesecurity.io/advisories/427', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201'}
| null |
npm
|
GHSA-xrmp-99wj-p6jc
|
Prototype Pollution in deap
|
Versions of `deap` before 1.0.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.0.1 or later.
| null |
2021-08-04T21:21:43Z
|
2019-05-31T23:43:09Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://hackerone.com/reports/310446', 'https://snyk.io/vuln/npm:deap:20180415', 'https://nodesecurity.io/advisories/611', 'https://www.npmjs.com/advisories/611'}
| null |
npm
|
GHSA-97mp-9g5c-6c93
|
Malicious Package in bs58chcek
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:49:31Z
|
2020-09-04T16:50:48Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1375'}
| null |
npm
|
GHSA-48ww-j4fc-435p
|
Command injection in nodemailer
|
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.
|
{'CVE-2020-7769'}
|
2021-04-19T22:42:19Z
|
2021-05-10T19:16:52Z
|
CRITICAL
| null |
{'CWE-88'}
|
{'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75', 'https://www.npmjs.com/package/nodemailer', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769'}
| null |
npm
|
GHSA-g36h-6r4f-3mqp
|
Regular Expression Denial of Service in string
|
Affected versions of `string` are vulnerable to regular expression denial of service when specifically crafted untrusted user input is passed into the `underscore` or `unescapeHTML` methods.
## Recommendation
There is currently no direct patch for this vulnerability.
Currently, the best solution is to avoid passing user input to the `underscore` and `unescapeHTML` methods.
Alternatively, a user provided patch is available in [Pull Request #217]( https://github.com/jprichardson/string.js/pull/217/commits/eab9511e4efbc8c521e18b6cf2e8565ae50c5a16), however this patch has not been tested, nor has it been merged by the package author.
|
{'CVE-2017-16116'}
|
2020-08-31T18:26:52Z
|
2018-07-24T20:16:11Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-g36h-6r4f-3mqp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16116', 'https://nodesecurity.io/advisories/536', 'https://www.npmjs.com/advisories/536', 'https://github.com/jprichardson/string.js/issues/212'}
| null |
npm
|
GHSA-44vf-8ffm-v2qh
|
Sensitive Data Exposure in rails-session-decoder
|
All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:34:35Z
|
2020-09-02T15:42:47Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/753'}
| null |
npm
|
GHSA-jr3j-whm4-9wwm
|
Reflected XSS when using flashMessages or languageDictionary
|
### Overview
Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's
- `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`.
- `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`.
### Am I affected?
You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply:
- You are utilizing `flashMessage` feature.
- User input or data from URL parameters is incorporated into the `flashMessage`.
An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`.
```js
var params = new URLSearchParams(location.search);
var errorMessage = params.get('error__message');
var showParams = {};
if (!!errorMessage === true) {
showParams.flashMessage = {
type: 'error',
text: 'We were unable to log you in. ' + errorMessage,
};
}
lock.show(showParams);
```
OR
- You are utilizing `languageDictionary` feature.
- User input or data from URL parameters is used in `languageDictionary` properties.
An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`.
```js
var params = new URLSearchParams(location.search);
var instruction = params.get('instruction');
var options = {
languageDictionary: {
emailInputPlaceholder: "something@youremail.com",
title: "title",
socialLoginInstructions: instruction
},
};
var lock = new Auth0LockPasswordless(
CLIENT_ID,
DOMAIN,
options
);
lock.show()
```
### How to fix that?
Upgrade to version `11.30.1`.
### Will this update impact my users?
The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.
|
{'CVE-2021-32641'}
|
2021-06-07T18:54:43Z
|
2021-06-04T19:10:34Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://github.com/auth0/lock/releases/tag/v11.30.1'}
| null |
npm
|
GHSA-g8vp-6hv4-m67c
|
Command Injection in entitlements
|
Versions of `entitlements` prior to 1.3.0 are vulnerable to Command Injection. The package does not validate input on the `entitlements` function and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.3.0 or later.
| null |
2020-08-31T18:43:32Z
|
2020-09-11T21:23:29Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/998', 'https://hackerone.com/reports/341869'}
| null |
npm
|
GHSA-vrw4-w73r-6mm8
|
TimelockController vulnerability in OpenZeppelin Contracts
|
### Impact
A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker.
### Patches
A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`:
- 4.3.1
- 3.4.2
- 3.4.2-solc-0.7
Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles.
### Workarounds
Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.
### References
[Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958).
### Credits
The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
|
{'CVE-2021-39168'}
|
2021-09-13T20:30:25Z
|
2021-08-30T16:12:49Z
|
CRITICAL
| null |
{'CWE-269'}
|
{'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeabl'}
| null |
npm
|
GHSA-hpr5-wp7c-hh5q
|
Cross-Site Scripting in mrk.js
|
Versions of `mrk.js` before 2.0.1 are vulnerable to cross-site scripting (XSS) when markdown is converted to HTML.
## Recommendation
Update to version 2.0.1 or later and use `mark.sanitizeURL()` for any `src` and `href` attributes when extending the markdown.
| null |
2021-09-23T21:50:21Z
|
2020-09-01T19:37:29Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/heyitsmeuralex/mrk', 'https://github.com/heyitsmeuralex/mrk/pull/3', 'https://www.npmjs.com/advisories/587'}
| null |
npm
|
GHSA-f39r-cpmj-whcg
|
Command Injection in ffmpegdotjs
|
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23376'}
|
2021-04-19T20:46:54Z
|
2021-05-06T15:55:21Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23376', 'https://github.com/TRomesh/ffmpegdotjs/blob/b7395daf0bdcb81218340427eb7073cdd28462af/index.js%23L219'}
| null |
npm
|
GHSA-3w5v-p54c-f74x
|
ejs is ivulnerable to remote code execution due to weak input validation
|
nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in ejs.renderFile() function
|
{'CVE-2017-1000228'}
|
2022-04-25T22:06:43Z
|
2017-11-30T23:15:19Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'http://www.securityfocus.com/bid/101897', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228', 'https://github.com/advisories/GHSA-3w5v-p54c-f74x', 'https://snyk.io/vuln/npm:ejs:20161128'}
| null |
npm
|
GHSA-28xr-mwxg-3qc8
|
Command injection in simple-git
|
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.6.0.
|
{'CVE-2022-24066'}
|
2022-05-03T22:29:53Z
|
2022-04-02T00:00:13Z
|
HIGH
| null |
{'CWE-74', 'CWE-77'}
|
{'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://github.com/steveukx/git-js', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24066', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820'}
| null |
npm
|
GHSA-63m4-fhf2-cmf7
|
Command Execution in windows-cpu
|
Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution.
## Proof of Concept
```
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');
```
## Recommendation
Update to version 0.1.5 or later.
|
{'CVE-2017-1000219'}
|
2021-09-23T21:42:01Z
|
2020-09-01T16:43:55Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/KyleRoss/windows-cpu', 'https://nodesecurity.io/advisories/336', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219', 'https://www.npmjs.com/advisories/336', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}
| null |
npm
|
GHSA-xxxq-chmp-67g4
|
RSA PKCS#1 decryption vulnerability with prepending zeros in jsrsasign
|
### Impact
Jsrsasign supports RSA PKCS#1 v1.5 (i.e. RSAES-PKCS1-v1_5) and RSA-OAEP encryption and decryption. Its encrypted message is represented as BigInteger. When there is a valid encrypted message, a crafted message with prepending zeros can be decrypted by this vulnerability.
- If you don't use RSA PKCS1-v1_5 or RSA-OAEP decryption, this vulnerability is not affected.
- Risk to forge contents of encrypted message is very low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
### Patches
Users using RSA PKCS1-v1_5 or RSA-OAEP decryption should upgrade to 8.0.18.
### Workarounds
Reject RSA PKCS1-v1_5 or RSA-OAEP encrypted message with unnecessary prepending zeros.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967
https://vuldb.com/?id.157124
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt
https://github.com/kjur/jsrsasign/issues/439
|
{'CVE-2020-14967'}
|
2021-10-06T22:02:31Z
|
2020-06-26T16:27:08Z
|
CRITICAL
| null |
{'CWE-119'}
|
{'https://github.com/kjur/jsrsasign/issues/439', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-xxxq-chmp-67g4', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt', 'https://www.npmjs.com/package/jsrsasign', 'https://kjur.github.io/jsrsasign/', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://vuldb.com/?id.157124', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14967', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}
| null |
npm
|
GHSA-w9mf-24h3-9wxf
|
Downloads Resources over HTTP in windows-iedriver
|
Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10689'}
|
2021-01-08T01:56:52Z
|
2019-02-18T23:41:58Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/293', 'https://nodesecurity.io/advisories/293', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689', 'https://github.com/advisories/GHSA-w9mf-24h3-9wxf'}
| null |
npm
|
GHSA-mv26-cx23-vrfg
|
Server-Side Request Forgery in @peertube/embed-api
|
@peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery.
|
{'CVE-2022-0508'}
|
2022-02-09T22:27:07Z
|
2022-02-09T00:00:31Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832', 'https://github.com/chocobozzz/peertube', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508', 'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c'}
| null |
npm
|
GHSA-66mv-xh68-h6v2
|
Denial of Service in @commercial/hapi
|
Affected versions of `@commercial/hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to versions 16.8.2, 17.9.2, 18.4.1, 19.1.1 or later.
| null |
2020-08-31T19:00:58Z
|
2020-09-03T15:48:53Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1483'}
| null |
npm
|
GHSA-8f89-2fwj-5v5r
|
Improper Input Validation in klona
|
Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.
|
{'CVE-2020-8125'}
|
2021-03-30T16:22:33Z
|
2021-04-13T15:41:24Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://hackerone.com/reports/778414'}
| null |
npm
|
GHSA-54cr-gv8w-8324
|
Malicious Package in xoc
|
Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:51Z
|
2020-09-01T20:36:22Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/638'}
| null |
npm
|
GHSA-9wcg-jrwf-8gg7
|
Prototype Pollution in express-fileupload
|
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
|
{'CVE-2020-7699'}
|
2022-05-04T02:19:36Z
|
2020-08-05T14:53:16Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969', 'https://github.com/richardgirges/express-fileupload/pull/237', 'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://github.com/richardgirges/express-fileupload', 'https://github.com/richardgirges/express-fileupload/issues/236', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699'}
| null |
npm
|
GHSA-g3qw-9pgp-xpj4
|
Out-of-bounds Read in njwt
|
Versions of `njwt` prior to 1.0.0 are vulnerable to out-of-bounds reads when a number is passed into the `base64urlEncode` function.
On Node.js 6.x or lower this can expose sensitive information and on any other version of Node.js this creates a Denial of Service vulnerability.
## Recommendation
Upgrade to version 1.0.0.
| null |
2020-08-31T18:32:28Z
|
2020-09-01T21:08:44Z
|
LOW
| null |
{'CWE-125'}
|
{'https://hackerone.com/reports/321704', 'https://www.npmjs.com/advisories/679'}
| null |
npm
|
GHSA-2h3h-vw8r-82rp
|
Weak JSON Web Token in yapi-vendor
|
Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.
|
{'CVE-2021-27884'}
|
2021-07-22T15:58:18Z
|
2021-03-26T16:49:26Z
|
MODERATE
| null |
{'CWE-330'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27884', 'https://github.com/YMFE/yapi/issues/2117', 'https://github.com/YMFE/yapi/issues/2263', 'https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi'}
| null |
npm
|
GHSA-95cg-3r4g-7w6j
|
Malicious Package in js-rha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:10:32Z
|
2020-09-03T23:01:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1283'}
| null |
npm
|
GHSA-cwfw-4gq5-mrqx
|
Regular Expression Denial of Service (ReDoS) in braces
|
A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
|
{'CVE-2018-1109'}
|
2021-03-31T21:35:00Z
|
2022-01-06T20:42:03Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://snyk.io/vuln/npm:braces:20180219', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109', 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272'}
| null |
npm
|
GHSA-w7q7-vjp8-7jv4
|
SQL Injection in typeorm
|
Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 0.1.15
| null |
2020-08-31T18:36:13Z
|
2019-06-06T15:30:16Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://hackerone.com/reports/319458', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/800'}
| null |
npm
|
GHSA-8v67-x8q5-3x3g
|
Cross-Site Scripting in simditor
|
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.3.22 or later.
|
{'CVE-2018-19048'}
|
2021-08-04T14:53:05Z
|
2019-05-14T04:01:27Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md', 'https://github.com/hkglue/simditor_demo.git', 'https://www.npmjs.com/advisories/884', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22', 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}
| null |
npm
|
GHSA-c4hh-fg8x-6h9p
|
Malicious Package in buffer-xnr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:04:32Z
|
2020-09-03T21:57:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1247'}
| null |
npm
|
GHSA-3x83-p476-vv95
|
Downloads Resources over HTTP in selenium-standalone-painful
|
Affected versions of `selenium-standalone-painful` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-standalone-painful`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10679'}
|
2021-01-08T19:58:06Z
|
2019-02-18T23:54:40Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/284', 'https://github.com/advisories/GHSA-3x83-p476-vv95', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10679', 'https://www.npmjs.com/advisories/284'}
| null |
npm
|
GHSA-wwwg-6r7f-9c9h
|
Malicious Package in file-logging
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:15:33Z
|
2020-09-03T19:43:28Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1126'}
| null |
npm
|
GHSA-69r6-7h4f-9p7q
|
Malicious Package in discord.js-user
|
All versions of `discord.js-user` contain malicious code. The package uploads the user's Discord token to a remote server.
## Recommendation
Remove the package from your environment. Ensure any compromised tokens are invalidated.
| null |
2021-09-29T20:32:46Z
|
2020-09-03T20:41:01Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1177'}
| null |
npm
|
GHSA-m2h2-264f-f486
|
angular vulnerable to regular expression denial of service (ReDoS)
|
AngularJS lets users write client-side web applications. The package angular after 1.7.0 is vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value.
**Note:**
1. This package has been deprecated and is no longer maintained.
2. The vulnerable versions are 1.7.0 and higher.
|
{'CVE-2022-25844'}
|
2022-05-04T20:12:02Z
|
2022-05-03T00:00:44Z
|
MODERATE
| null |
{'CWE-1333'}
|
{'https://github.com/angular/angular.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25844', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737', 'https://stackblitz.com/edit/angularjs-material-blank-zvtdvb', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736'}
| null |
npm
|
GHSA-hqhp-5p83-hx96
|
Regular Expression Denial of Service in prismjs
|
Prism is a lightweight, robust, and elegant syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.
|
{'CVE-2021-3801'}
|
2022-05-04T03:23:16Z
|
2021-09-20T20:44:48Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801', 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9', 'https://github.com/prismjs/prism'}
| null |
npm
|
GHSA-9xw9-pvgv-6p76
|
Insufficient Error Handling in http-proxy
|
Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash.
## Recommendation
Update to version 0.7.0 or later.
|
{'CVE-2017-16014'}
|
2020-08-31T18:19:16Z
|
2018-11-09T17:47:52Z
|
MODERATE
| null |
{'CWE-703'}
|
{'https://github.com/nodejitsu/node-http-proxy/pull/101', 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76', 'https://nodesecurity.io/advisories/323', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014', 'https://www.npmjs.com/advisories/323'}
| null |
npm
|
GHSA-cr79-9pwf-r6f5
|
Downloads Resources over HTTP in prince
|
Affected versions of `prince` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `prince`.
## Recommendation
Update to version 1.4.6 or later.
|
{'CVE-2016-10591'}
|
2021-09-16T20:42:47Z
|
2019-02-18T23:34:24Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10591', 'https://www.npmjs.com/advisories/185', 'https://github.com/rse/node-prince', 'https://nodesecurity.io/advisories/185', 'https://github.com/advisories/GHSA-cr79-9pwf-r6f5'}
| null |
npm
|
GHSA-692h-g37c-qv44
|
Malicious Package in sj-tw-sec
|
All versions of `sj-tw-sec` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:15:23Z
|
2020-09-03T23:25:30Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1309'}
| null |
npm
|
GHSA-67mm-m3wx-j7fr
|
Command injection in gitlog
|
The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.
|
{'CVE-2021-26541'}
|
2022-04-27T19:13:33Z
|
2021-04-13T15:15:29Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26541', 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4', 'https://github.com/domharrington/node-gitlog/pull/65', 'https://advisory.checkmarx.net/advisory/CX-2020-4301', 'https://github.com/domharrington/node-gitlog', 'https://www.npmjs.com/package/gitlog'}
| null |
npm
|
GHSA-38f5-ghc2-fcmv
|
Code Injection in cryo
|
All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization.
## Proof of concept
```
var Cryo = require('cryo');
var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\");return 2222;}"},{"contents":{"toString":"_CRYO_REF_0","valueOf":"_CRYO_REF_1"},"value":"_CRYO_OBJECT_"},{"contents":{"__proto__":"_CRYO_REF_2"},"value":"_CRYO_OBJECT_"}]}'
var hydrated = Cryo.parse(frozen);
console.log(hydrated);
```
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2018-3784'}
|
2020-08-31T18:32:54Z
|
2018-08-21T17:02:43Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-38f5-ghc2-fcmv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784', 'https://hackerone.com/reports/350418', 'https://www.npmjs.com/advisories/690'}
| null |
npm
|
GHSA-69mf-2cw2-38m8
|
Malicious Package in js-shc3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:13:22Z
|
2020-09-03T23:04:40Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1286'}
| null |
npm
|
GHSA-xg75-3277-gvvj
|
Directory Traversal in serve
|
Versions of `serve` before 7.1.3 are vulnerable to Directory Traversal. File paths are not sanitized leading to unauthorized access of system files.
## Recommendation
Upgrade to version 7.1.3 or later
|
{'CVE-2019-5417'}
|
2021-09-21T22:30:46Z
|
2019-03-25T18:04:01Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xg75-3277-gvvj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5417', 'https://hackerone.com/reports/358645', 'https://www.npmjs.com/advisories/795'}
| null |
npm
|
GHSA-65p7-pjj8-ggmr
|
Member account takeover
|
### Impact
An error in the implementation of the member email change functionality allows unauthenticated users to change the email address of arbitrary member accounts to one they control by crafting a request to the relevant API endpoint, and validating the new address via magic link sent to the new email address.
Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 3.18.0 and 4.15.0 with members functionality enabled.
### Patches
Fixed in 4.15.1, all 4.x sites should upgrade as soon as possible.
Fixed in 3.42.6, all 3.x sites should upgrade as soon as possible.
### Workarounds
The patch in 4.15.1 and 3.42.6 adds a new authenticated endpoint for updating member email addresses. Updating Ghost is the quickest complete solution.
As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /members/api/send-magic-link/` endpoint, which will also disable member login and signup for your site.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@ghost.org](mailto:security@ghost.org)
| null |
2021-09-23T21:14:22Z
|
2021-09-23T23:18:42Z
|
MODERATE
| null | null |
{'https://github.com/TryGhost/Ghost', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-65p7-pjj8-ggmr'}
| null |
npm
|
GHSA-cgjv-rghq-qhgp
|
Path Traversal in algo-httpserv
|
Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 1.1.2 or later.
| null |
2021-08-17T22:22:48Z
|
2019-09-11T23:00:57Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741', 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735', 'https://www.npmjs.com/advisories/889'}
| null |
npm
|
GHSA-vfvf-mqq8-rwqc
|
Sanitization bypass using HTML Entities in marked
|
Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured.
## Proof of Concept
This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted.
For example:
A link URI such as
```
javascript֍ocument;alert(1)
```
Renders a valid link that when clicked will execute `alert(1)`.
## Recommendation
Update to version 0.3.6 or later.
|
{'CVE-2016-10531'}
|
2020-08-31T18:10:54Z
|
2019-02-18T23:58:20Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-vfvf-mqq8-rwqc', 'https://github.com/chjj/marked/pull/592', 'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10531', 'https://nodesecurity.io/advisories/101', 'https://www.npmjs.com/advisories/101'}
| null |
npm
|
GHSA-j3cr-j9jx-mf4p
|
Downloads Resources over HTTP in redis-srvr
|
Affected versions of `redis-srvr` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `redis-srvr`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10639'}
|
2021-01-08T18:37:50Z
|
2019-02-18T23:47:07Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10639', 'https://www.npmjs.com/advisories/238', 'https://nodesecurity.io/advisories/238', 'https://github.com/advisories/GHSA-j3cr-j9jx-mf4p'}
| null |
npm
|
GHSA-jjgw-jf33-7fg9
|
Directory Traversal in mfrs
|
Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16193'}
|
2020-08-31T18:23:06Z
|
2020-09-01T18:22:48Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs', 'https://nodesecurity.io/advisories/437', 'https://www.npmjs.com/advisories/437', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193'}
| null |
npm
|
GHSA-jcjx-c3j3-44pr
|
Insufficient Session Expiration in @cyyynthia/tokenize
|
### Impact
A bug introduced in version 1.1.0 made Tokenize generate faulty tokens with NaN as a generation date. As a result, tokens would not properly expire and remain valid regardless of the `lastTokenReset` field.
### Patches
Version 1.1.3 contains a patch that'll invalidate these faulty tokens and make new ones behave as expected.
### Workarounds
None. Tokens do not hold the necessary information to perform invalidation anymore.
### References
PR #1
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/cyyynthia/tokenize](https://github.com/cyyynthia/tokenize)
* Email us at [cynthia@cynthia.dev](mailto:cynthia@cynthia.dev)
| null |
2021-11-08T21:09:02Z
|
2021-11-10T16:44:12Z
|
HIGH
| null |
{'CWE-613'}
|
{'https://github.com/cyyynthia/tokenize/security/advisories/GHSA-jcjx-c3j3-44pr', 'https://github.com/cyyynthia/tokenize'}
| null |
npm
|
GHSA-rv6q-p3x7-43fx
|
Malicious Package in bitcoimjs-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:42:01Z
|
2020-09-04T16:37:50Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1364'}
| null |
npm
|
GHSA-xr8h-53xr-jhcm
|
Path Traversal in marked-tree
|
This affects all versions up to and including version 0.8.1 of package marked-tree. There is no path sanitization in the path provided at fs.readFile in index.js.
|
{'CVE-2020-7682'}
|
2021-05-06T18:59:36Z
|
2021-05-07T16:06:43Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7682', 'https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121'}
| null |
npm
|
GHSA-7889-rm5j-hpgg
|
Clipboard feature vulnerability allowing to inject arbitrary HTML into the editor using paste functionality
|
### Affected packages
The vulnerability has been discovered in [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin. All plugins with [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin dependency are affected:
* [clipboard](https://ckeditor.com/cke4/addon/clipboard)
* [pastetext](https://ckeditor.com/cke4/addon/pastetext)
* [pastetools](https://ckeditor.com/cke4/addon/pastetools)
* [widget](https://ckeditor.com/cke4/addon/widget)
* [uploadwidget](https://ckeditor.com/cke4/addon/uploadwidget)
* [autolink](https://ckeditor.com/cke4/addon/autolink)
* [tableselection](https://ckeditor.com/cke4/addon/tableselection)
### Impact
A potential vulnerability has been discovered in CKEditor 4 [Clipboard](https://ckeditor.com/cke4/addon/clipboard) package. The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor. It affects all users using the CKEditor 4 plugins listed above at version >= 4.5.2.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.16.2.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-32809'}
|
2022-02-08T21:01:48Z
|
2021-08-23T19:40:57Z
|
MODERATE
| null |
{'CWE-79', 'CWE-94'}
|
{'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32809', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-8g3r-968r-c644
|
Malicious Package in jw-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:37:54Z
|
2020-09-03T23:15:58Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1296'}
| null |
npm
|
GHSA-363h-vj6q-3cmj
|
Rosetta-Flash JSONP Vulnerability in hapi
|
This description taken from the pull request provided by Patrick Kettner.
Versions 6.1.0 and earlier of hapi are vulnerable to a rosetta-flash attack, which can be used by attackers to send data across domains and break the browser same-origin-policy.
## Recommendation
- Update hapi to version 6.1.1 or later.
Alternatively, a solution previously implemented by Google, Facebook, and Github is to prepend callbacks with an empty inline comment. This will cause the flash parser to break on invalid inputs and prevent the issue, and how the issue has been resolved internally in hapi.
|
{'CVE-2014-4671'}
|
2021-09-23T19:28:27Z
|
2020-08-31T22:45:35Z
|
MODERATE
| null |
{'CWE-352'}
|
{'http://helpx.adobe.com/security/products/flash-player/apsb14-17.html', 'https://www.npmjs.com/advisories/12', 'http://www.securityfocus.com/bid/68457', 'https://github.com/patrickkettner', 'http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/', 'http://rhn.redhat.com/errata/RHSA-2014-0860.html', 'http://secunia.com/advisories/59774', 'http://secunia.com/advisories/59837', 'https://github.com/spumko/hapi', 'http://security.gentoo.org/glsa/glsa-201407-02.xml', 'http://www.securitytracker.com/id/1030533', 'https://nvd.nist.gov/vuln/detail/CVE-2014-4671', 'https://github.com/spumko/hapi/pull/1766'}
| null |
npm
|
GHSA-9mx2-prfp-8hqp
|
Prototype Pollution in simpl-schema
|
This affects the package simpl-schema before 1.10.2. Attacker controlled input into a schema could result in remote code execution within the scope of the surrounding application.
|
{'CVE-2020-7742'}
|
2021-04-21T20:37:29Z
|
2021-05-10T18:38:47Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d', 'https://github.com/longshotlabs/simpl-schema/releases/tag/1.10.2', 'https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7742'}
| null |
npm
|
GHSA-hrpq-r399-whgw
|
Sandbox Breakout / Arbitrary Code Execution in safe-eval
|
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through Error objects. This may allow attackers to execute arbitrary code in the system.
Evaluating the payload
```
(function (){
var ex = new Error
ex.__proto__ = null
ex.stack = {
match: x => {
return x.constructor.constructor("throw process.env")()
}
}
return ex
})()
```
prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-7710'}
|
2021-07-29T22:01:24Z
|
2020-08-25T23:40:53Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7710', 'https://github.com/hacksparrow/safe-eval/issues/19', 'https://www.npmjs.com/advisories/1322'}
| null |
npm
|
GHSA-xwg3-gjxh-c8pm
|
Malicious Package in ngx-context-menu
|
Version 0.0.26 of `ngx-context-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:26Z
|
2020-09-03T19:14:32Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1105'}
| null |
npm
|
GHSA-97pv-4338-r5vp
|
Cross-site Scripting in file-upload-with-preview
|
This affects the package file-upload-with-preview before 4.2.0. A file containing malicious JavaScript code in the name can be uploaded (a user needs to be tricked into uploading such a file).
|
{'CVE-2021-23439'}
|
2021-09-07T18:05:06Z
|
2021-09-07T23:08:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23439', 'https://github.com/johndatserakis/file-upload-with-preview', 'https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492', 'https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true%23diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174', 'https://github.com/johndatserakis/file-upload-with-preview/blob/develop/src/file-upload-with-preview.js%23L168'}
| null |
npm
|
GHSA-qpwf-4fx5-crqq
|
Directory Traversal in earlybird
|
Affected versions of `earlybird` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16154'}
|
2020-08-31T18:21:05Z
|
2020-09-01T17:19:36Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird', 'https://www.npmjs.com/advisories/380', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16154', 'https://nodesecurity.io/advisories/380'}
| null |
npm
|
GHSA-w3f3-4j22-2v3p
|
Malicious Package in destroyer-of-worlds
|
The package `destroyer-of-worlds` contained malicious code. The package contained a bash script that was run as a postinstall script. The script deleted system files and attempted to exhaust resources by creating a large file, a fork bomb and an endless loop. The script targeted UNIX systems.
## Recommendation
Remove the package from your environment and perform additional incident response on your system's files and processes.
| null |
2021-09-30T21:25:19Z
|
2020-09-02T21:27:02Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/890'}
| null |
npm
|
GHSA-2h3x-95c6-885r
|
Malicious Package in river-mock
|
All versions of `river-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:01:18Z
|
2020-09-03T17:46:46Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1062'}
| null |
npm
|
GHSA-3269-x4pw-vffg
|
OS Command Injection in diskusage-ng
|
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
|
{'CVE-2020-7631'}
|
2021-07-28T22:42:20Z
|
2022-01-07T00:21:08Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/iximiuz/node-diskusage-ng/blob/master/lib/posix.js#L11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7631', 'https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425'}
| null |
npm
|
GHSA-2ggq-vfcp-gwhj
|
Cross-Site Scripting in @hapi/boom
|
Versions of `@hapi/boom` prior t 0.3.8 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.3.8 or later.
| null |
2021-10-04T20:48:50Z
|
2020-09-04T17:33:53Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/hapijs/boom', 'https://snyk.io/vuln/SNYK-JS-HAPIBOOM-541183', 'https://www.npmjs.com/advisories/1459'}
| null |
npm
|
GHSA-5q88-cjfq-g2mh
|
codecov NPM module allows remote attackers to execute arbitrary commands
|
codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.
|
{'CVE-2020-7597'}
|
2021-08-19T17:22:07Z
|
2020-02-19T17:29:39Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-CODECOV-548879', 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597'}
| null |
npm
|
GHSA-g753-jx37-7xwh
|
ECDSA signature vulnerability of Minerva timing attack in jsrsasign
|
### Impact
ECDSA side-channel attack named [Minerava](https://minerva.crocs.fi.muni.cz/) have been found and it was found that it affects to jsrsasign.
Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication time depends on bits of scalar. In jsrsasign 8.0.13 or later, execution time of EC point and scalar multiplication is almost constant and fixed for the issue.
- Minerva is one of timing attack or side channel attack for EC.
- If you don't use ECDSA class, you are not affected the vulnerability.
- The vulnerability is that attacker may guess private key by checking processing time of EC key generation or ECDSA signing.
- The cause issue is that point multiplication processing time in ECDSA signing is depends on private key value.
- After 8.0.13, processing time of point multiplication in ECDSA signing have become constant for key value in theory.
### Patches
Users using ECDSA signature generation should upgrade to 8.0.13 or later.
### Workarounds
There is no workarounds in jsrsasign. Update jsrsasign or use other ECDSA library.
### ACKNOWLEDGEMENT
Thanks to Jan Jancar @J08nY, Petr Svenda and Vladimir Sedlacek of Masaryk University in Czech Republic to find and report this vulnerability.
### References
https://minerva.crocs.fi.muni.cz/
https://www.npmjs.com/advisories/1505
https://github.com/kjur/jsrsasign/issues/411
| null |
2021-09-22T18:43:42Z
|
2020-06-30T16:05:08Z
|
MODERATE
| null |
{'CWE-362'}
|
{'https://www.npmjs.com/advisories/1505', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh', 'https://minerva.crocs.fi.muni.cz/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.13', 'https://github.com/kjur/jsrsasign/issues/411', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73', 'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-561755'}
| null |
npm
|
GHSA-7cv6-gvx3-m54m
|
Cross-Site Scripting in keystone
|
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account.
## Recommendation
Update to version 4.0.0 or later.
|
{'CVE-2017-15881'}
|
2021-06-11T13:54:39Z
|
2017-11-16T01:47:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'http://www.securityfocus.com/bid/101541', 'https://www.npmjs.com/advisories/981', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m', 'https://github.com/keystonejs/keystone/issues/4437', 'https://github.com/keystonejs/keystone/pull/4478', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}
| null |
npm
|
GHSA-2m8v-572m-ff2v
|
Command Injection Vulnerability
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
|
{'CVE-2021-21315'}
|
2021-02-16T16:50:49Z
|
2021-02-16T16:51:04Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E', 'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525', 'https://security.netapp.com/advisory/ntap-20210312-0007/', 'https://www.npmjs.com/package/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21315', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.