ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-r773-pmw3-f4mr
Open Redirect in koa-remove-trailing-slashes
The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::removeTrailingSlashes(), as the web server uses relative URLs instead of absolute URLs.
{'CVE-2021-23384'}
2021-05-19T17:57:27Z
2022-02-10T23:47:27Z
MODERATE
null
{'CWE-601'}
{'https://github.com/vgno/koa-remove-trailing-slashes/blame/6a01ba8fd019bd3ece44879c553037ad96ba7d47/index.js%23L31', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23384', 'https://snyk.io/vuln/SNYK-JS-KOAREMOVETRAILINGSLASHES-1085708'}
null
npm
GHSA-fm7r-2pr7-rw2p
Malicious Package in yeoman-genrator
Version 3.1.1 of `yeoman-genrator` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:57:05Z
2020-09-02T21:45:02Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/912'}
null
npm
GHSA-p6h4-93qp-jhcm
Command injection in Parse Server through prototype pollution
### Impact This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. ### Patches Upgrade to Parse Server >=4.10.7. If you are using a prerelease version of Parse Server 5.0 (alpha, beta) we will publish a timely fix for these. However, as a general reminder we do not consider prerelease versions to be suitable for production deployment. Note that as part of the fix a new security feature scans for sensitive keywords in request data to prevent JavaScript prototype pollution. If such a keyword is found, the request is rejected with HTTP response code `400` and Parse Error `105` (`INVALID_KEY_NAME`). By default these keywords are: `{_bsontype: "Code"}`, `constructor`, `__proto__`. If you are using any of these keywords in your request data, you can override the default keywords by setting the new Parse Server option `requestKeywordDenylist` to `[]` and specify your own keywords as needed. ### Workarounds Although the fix is more broad and includes several aspects of the vulnerability, a quick and targeted fix can be achieved by patching the MongoDB Node.js driver and disable BSON code execution. To apply the patch, add the following code to be executed before starting Parse Server, for example in `index.js`. ``` const BSON = require('bson'); const internalDeserialize = BSON.prototype.deserialize; BSON.prototype.deserialize = (buffer, options = Object.create(null), ...others) => { if (options.constructor) { options = Object.assign(Object.create(null), options); } return internalDeserialize(buffer, options, ...others); }; const internalDeserializeStream = BSON.prototype.deserializeStream; BSON.prototype.deserializeStream = ( data, startIndex, numberOfDocuments, documents, docStartIndex, options = Object.create(null), ...others ) => { if (options.constructor) { options = Object.assign(Object.create(null), options); } return internalDeserializeStream( data, startIndex, numberOfDocuments, documents, docStartIndex, options, ...others ); }; ``` ### References - Original report on [huntr.dev](https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/)
{'CVE-2022-24760'}
2022-04-19T18:24:25Z
2022-03-11T23:53:23Z
CRITICAL
null
{'CWE-74', 'CWE-1321'}
{'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d', 'https://github.com/parse-community/parse-server', 'https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24760', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm'}
null
npm
GHSA-hpfq-8wx8-cgqw
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2020-08-31T18:41:56Z
2019-06-13T18:59:18Z
HIGH
null
{'CWE-79'}
{'https://github.com/infor-design/enterprise-ng/issues/511', 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4', 'https://www.npmjs.com/advisories/957'}
null
npm
GHSA-fw2f-7f87-5r6c
Improper Input Validation in access-policy
access-policy through 3.1.0 is vulnerable to Arbitrary Code Execution. User input provided to the `template` function is executed by the `eval` function resulting in code execution.
{'CVE-2020-7674'}
2021-07-29T18:14:19Z
2021-05-17T21:00:29Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7674', 'https://snyk.io/vuln/SNYK-JS-ACCESSPOLICY-571490'}
null
npm
GHSA-vfrc-7r7c-w9mx
Prototype Pollution in highlight.js
### Impact Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable. The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector. _If your website or application does not render user provided data it should be unaffected._ ### Patches Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release. ### Workarounds #### Patch your library Manually patch your library to create null objects for both `languages` and `aliases`: ```js const HLJS = function(hljs) { // ... var languages = Object.create(null); var aliases = Object.create(null); ``` #### Filter out bad data from end users Filter the language names that users are allowed to inject into your HTML to guarantee they are valid. ### References * [What is Prototype Pollution?](https://codeburst.io/what-is-prototype-pollution-49482fc4b638) * https://github.com/highlightjs/highlight.js/pull/2636 ### For more information If you have any questions or comments about this advisory: * Please file an issue against [highlight.js](https://github.com/highlightjs/highlight.js/issues/)
{'CVE-2020-26237'}
2021-01-08T21:00:09Z
2020-11-24T22:58:41Z
LOW
null
{'CWE-471'}
{'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26237', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html', 'https://github.com/highlightjs/highlight.js/pull/2636', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx', 'https://www.npmjs.com/package/highlight.js'}
null
npm
GHSA-rh46-3fgc-mvrf
Validation bypass is possible in Json Pattern Validator
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
{'CVE-2019-19507'}
2021-08-19T16:05:30Z
2019-12-04T21:25:28Z
MODERATE
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19507', 'https://www.npmjs.com/package/jpv', 'https://github.com/manvel-khnkoyan/jpv/issues/6'}
null
npm
GHSA-hfwx-c7q6-g54c
Vulnerability allowing for reading internal HTTP resources
### Impact The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources. The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses. The previous versions have been marked as deprecated on NPM. ### Patches Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.** Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later. ### Workarounds There are no known workarounds to the issue - an upgrade to version 2.1.0 is required. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues) * Email us at [security@highsoft.com](mailto:security@highsoft.com)
null
2021-03-12T22:32:16Z
2021-03-12T23:04:46Z
HIGH
null
{'CWE-552'}
{'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6', 'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210', 'https://www.npmjs.com/package/highcharts-export-server'}
null
npm
GHSA-w992-2gmj-9xxj
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 2.2.1 are vulnerable to Cross-Site Scripting (XSS). The package allows HTML code in the `swagger.apiInfo.description` value without proper sanitization, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.2.1 or later.
null
2021-09-28T17:02:50Z
2020-09-11T21:23:29Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/988', 'https://github.com/swagger-api/swagger-ui/issues/830', 'https://github.com/swagger-api/swagger-ui'}
null
npm
GHSA-c82c-8pjw-6829
Malicious Package in @impala/bmap
Version 1.0.3 of `@impala/bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:41:28Z
2020-09-01T19:41:45Z
CRITICAL
null
{'CWE-506'}
{'https://snyk.io/vuln/SNYK-JS-IMPALABMAP-451019', 'https://github.com/advisories/GHSA-c82c-8pjw-6829', 'https://www.npmjs.com/advisories/613'}
null
npm
GHSA-896r-f27r-55mw
json-schema is vulnerable to Prototype Pollution
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3918'}
2021-11-19T20:15:58Z
2021-11-19T20:16:17Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3918', 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9', 'https://github.com/kriszyp/json-schema', 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}
null
npm
GHSA-w8f3-pvx4-4c3h
Prototype Pollution in arr-flatten-unflatten
All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor.
{'CVE-2020-7713'}
2021-05-05T19:00:34Z
2021-05-06T18:11:39Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7713', 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372', 'https://github.com/Quernest/arr-flatten-unflatten/pull/8', 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396'}
null
npm
GHSA-j383-35pm-c5h4
Path Traversal in Grunt
Grunt prior to version 1.5.2 is vulnerable to path traversal.
{'CVE-2022-0436'}
2022-04-26T21:51:41Z
2022-04-13T00:00:16Z
MODERATE
null
{'CWE-22'}
{'https://github.com/gruntjs/grunt/pull/1743', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/gruntjs/grunt', 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436'}
null
npm
GHSA-5ff8-jcf9-fw62
Cross-Site Scripting in markdown-it-katex
All versions of `markdown-it-katex` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser by triggering an error. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:53:26Z
2020-09-04T17:55:35Z
HIGH
null
{'CWE-79'}
{'https://github.com/waylonflinn/markdown-it-katex/issues/26', 'https://github.com/waylonflinn/markdown-it-katex', 'https://www.npmjs.com/advisories/1466'}
null
npm
GHSA-gjc9-932x-c59p
Malicious Package in leaflet-gpx
Version 1.0.1 of `leaflet-gpx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:10Z
2020-09-03T00:34:33Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/937'}
null
npm
GHSA-743r-5g92-5vgf
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.
{'CVE-2021-40829'}
2022-03-03T05:13:12.773300Z
2021-11-24T21:11:16Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
null
npm
GHSA-cmh5-qc8w-xvcq
Cross-Site Scripting in i18next
Affected versions of `i18next` may fail to sanitize user input when certain configuration options are used. When using the `.init` method, passing interpolation options without passing an `escapeValue` will default to `undefined` rather than the assumed `true`. ## Proof of Concept ``` var init = i18n.init({ interpolation: { prefix: "__", suffix: "__", escapeValue: true } }, function(){ var test = i18n.t('__firstName__ __lastName__', { firstName: 'Bob', lastName: '["foo","bar"]', }); console.log(test); }); ``` When `escapeValue` is explicitly passed, the result of `test` is: ``` &lt;script&gt;alert(1)&lt;&#x2F;script&gt; Johnson ``` This is supposed to be the default. However, if `escapeValue` is not included, the result is the unescaped string: ``` <script>alert(1)</script> Johnson ``` ## Recommendation Update to version 3.4.4 or later.
{'CVE-2017-16010'}
2020-08-31T18:19:23Z
2018-07-24T19:58:33Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16010', 'https://github.com/i18next/i18next/pull/826', 'https://nodesecurity.io/advisories/326', 'https://github.com/advisories/GHSA-cmh5-qc8w-xvcq', 'https://www.npmjs.com/advisories/326'}
null
npm
GHSA-pc58-wgmc-hfjr
Prototype Pollution in mout
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
{'CVE-2020-7792'}
2022-02-09T22:49:10Z
2022-02-09T22:49:10Z
HIGH
null
{'CWE-1321'}
{'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792', 'https://snyk.io/vuln/SNYK-JS-MOUT-1014544'}
null
npm
GHSA-gp2f-254m-rh32
Unauthorized access to data in @sap-cloud-sdk/core
### Impact This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations. In some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions. By default, destination caching is disabled. If it is enabled the maximum lifetime is 5 minutes which limits the attack vector. ### Patches The problem was fixed by #1769 and #1770. The security for caching has been increased. The changes are released in version 1.52.0. ### Workarounds Disable destination caching (it is disabled by default). ### References [destination cache API docs](https://sap.github.io/cloud-sdk/api/1.51.0/modules/sap_cloud_sdk_core#destinationCache) ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/SAP/cloud-sdk-js
{'CVE-2021-41251'}
2021-11-08T21:31:39Z
2021-11-10T16:51:41Z
MODERATE
null
{'CWE-200'}
{'https://github.com/SAP/cloud-sdk-js/pull/1770', 'https://github.com/SAP/cloud-sdk-js/pull/1769', 'https://github.com/SAP/cloud-sdk-js/security/advisories/GHSA-gp2f-254m-rh32', 'https://github.com/SAP/cloud-sdk-js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41251'}
null
npm
GHSA-rqff-837h-mm52
Authorization bypass in url-parse
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
{'CVE-2022-0512'}
2022-02-24T14:00:06Z
2022-02-15T00:02:46Z
MODERATE
null
{'CWE-639'}
{'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40', 'https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512', 'https://github.com/unshiftio/url-parse'}
null
npm
GHSA-h6pr-c536-6rjg
Prototype Pollution in object-path-set
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
{'CVE-2021-23507'}
2022-02-11T16:16:47Z
2022-02-05T00:00:31Z
HIGH
null
{'CWE-1321'}
{'https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8', 'https://github.com/skratchdot/object-path-set/', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576', 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'}
null
npm
GHSA-7p6h-3fmw-539q
Downloads Resources over HTTP in selenium-chromedriver
Affected versions of `selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-chromedriver`. ## Recommendation No patch is currently available for this vulnerability, and the author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
{'CVE-2016-10624'}
2021-01-08T21:16:45Z
2019-02-18T23:47:27Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-7p6h-3fmw-539q', 'https://nodesecurity.io/advisories/222', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10624', 'https://www.npmjs.com/advisories/222'}
null
npm
GHSA-8q2c-2396-hf7j
Malicious Package in appx-compiler
All versions of `appx-compiler` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:31:14Z
2020-09-03T17:34:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1050'}
null
npm
GHSA-f294-27fc-wgj7
Malicious Package in buffer-zor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:25:27Z
2020-09-03T22:16:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1255'}
null
npm
GHSA-vcph-57hv-89c4
Downloads Resources over HTTP in serc.js
Affected versions of `serc.js` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `serc.js`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10678'}
2021-01-08T01:57:33Z
2019-02-18T23:42:11Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10678', 'https://www.npmjs.com/advisories/277', 'https://github.com/advisories/GHSA-vcph-57hv-89c4', 'https://github.com/nowk/serc.js/blob/master/scripts/install.js#L5', 'https://nodesecurity.io/advisories/277'}
null
npm
GHSA-rhwp-9vm9-547q
Command Injection in onion-oled-js
This affects all versions up to and including version 0.0.2 of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23377'}
2021-05-06T22:33:55Z
2021-05-07T16:06:16Z
CRITICAL
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23377', 'https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91'}
null
npm
GHSA-vpq5-4rc8-c222
Denial of Service in canvas
Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process. ## Recommendation Upgrade to version 1.6.10
null
2020-08-31T18:36:22Z
2019-06-05T14:10:45Z
MODERATE
null
null
{'https://hackerone.com/reports/315037', 'https://www.npmjs.com/advisories/804', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
null
npm
GHSA-4q97-fh3f-j294
Prototype Pollution in tiny-conf
All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7724'}
2021-05-07T21:50:46Z
2021-05-10T15:59:24Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7724', 'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792'}
null
npm
GHSA-84qj-9qf2-q92r
Malicious Package in pm-controls
Version 1.1.8 of `pm-controls` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:38Z
2020-09-03T00:32:30Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/949'}
null
npm
GHSA-g785-775g-f2g8
Downloads Resources over HTTP in haxe
Affected versions of `haxe` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe`. ## Recommendation Update to version 5.0.10 or later.
{'CVE-2016-10602'}
2021-09-16T20:44:52Z
2019-02-18T23:50:21Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://github.com/HaxeFoundation/npm-haxe', 'https://nodesecurity.io/advisories/177', 'https://www.npmjs.com/advisories/177', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10602'}
null
npm
GHSA-8vj3-jgcf-77jv
Malicious Package in requeest
All versions of `requeest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:04:42Z
2020-09-02T20:26:49Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/858'}
null
npm
GHSA-3c6g-pvg8-gqw2
Command injection in json
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
{'CVE-2020-7712'}
2022-02-08T22:04:50Z
2021-05-06T18:11:21Z
HIGH
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/pull/145', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/issues/144', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7712', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-JSON-597481', 'https://github.com/trentm/json', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E'}
null
npm
GHSA-533p-g2hq-qr26
Command Injection in treekill
All versions of `treekill` are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:59:07Z
2020-09-04T17:16:35Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1433', 'https://hackerone.com/reports/703415'}
null
npm
GHSA-45hw-29x7-9x95
Arbitrary File Read in Snyk Broker
All versions of snyk-broker before 4.79.0 are vulnerable to Arbitrary File Read. It allows partial file reads for users who have access to Snyk's internal network via patch history from GitHub Commits API.
{'CVE-2020-7651'}
2021-07-29T17:23:08Z
2020-06-03T22:02:11Z
MODERATE
null
{'CWE-22'}
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570610', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7651'}
null
npm
GHSA-p33m-7w7f-gmj8
Uncontrolled Resource Consumption in fun-map
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7644'}
2021-07-29T16:41:29Z
2021-12-10T20:05:07Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-FUNMAP-564436', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7644', 'https://github.com/nathan7/fun-map/blob/master/index.js#L137,'}
null
npm
GHSA-6fw4-hr69-g3rv
Prototype Pollution in property-expr
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
{'CVE-2020-7707'}
2021-07-29T22:00:50Z
2021-05-06T17:29:47Z
CRITICAL
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'}
null
npm
GHSA-xgf5-5gjr-4hjq
Directory Traversal in zjjserver
Affected versions of `zjjserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16201'}
2020-08-31T18:22:43Z
2020-09-01T18:15:20Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/zjjserver', 'https://www.npmjs.com/advisories/427', 'https://nodesecurity.io/advisories/427', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16201'}
null
npm
GHSA-xrmp-99wj-p6jc
Prototype Pollution in deap
Versions of `deap` before 1.0.1 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.1 or later.
null
2021-08-04T21:21:43Z
2019-05-31T23:43:09Z
HIGH
null
{'CWE-400'}
{'https://hackerone.com/reports/310446', 'https://snyk.io/vuln/npm:deap:20180415', 'https://nodesecurity.io/advisories/611', 'https://www.npmjs.com/advisories/611'}
null
npm
GHSA-97mp-9g5c-6c93
Malicious Package in bs58chcek
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:49:31Z
2020-09-04T16:50:48Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1375'}
null
npm
GHSA-48ww-j4fc-435p
Command injection in nodemailer
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.
{'CVE-2020-7769'}
2021-04-19T22:42:19Z
2021-05-10T19:16:52Z
CRITICAL
null
{'CWE-88'}
{'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75', 'https://www.npmjs.com/package/nodemailer', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769'}
null
npm
GHSA-g36h-6r4f-3mqp
Regular Expression Denial of Service in string
Affected versions of `string` are vulnerable to regular expression denial of service when specifically crafted untrusted user input is passed into the `underscore` or `unescapeHTML` methods. ## Recommendation There is currently no direct patch for this vulnerability. Currently, the best solution is to avoid passing user input to the `underscore` and `unescapeHTML` methods. Alternatively, a user provided patch is available in [Pull Request #217]( https://github.com/jprichardson/string.js/pull/217/commits/eab9511e4efbc8c521e18b6cf2e8565ae50c5a16), however this patch has not been tested, nor has it been merged by the package author.
{'CVE-2017-16116'}
2020-08-31T18:26:52Z
2018-07-24T20:16:11Z
HIGH
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-g36h-6r4f-3mqp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16116', 'https://nodesecurity.io/advisories/536', 'https://www.npmjs.com/advisories/536', 'https://github.com/jprichardson/string.js/issues/212'}
null
npm
GHSA-44vf-8ffm-v2qh
Sensitive Data Exposure in rails-session-decoder
All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:34:35Z
2020-09-02T15:42:47Z
HIGH
null
null
{'https://www.npmjs.com/advisories/753'}
null
npm
GHSA-jr3j-whm4-9wwm
Reflected XSS when using flashMessages or languageDictionary
### Overview Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's - `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`. - `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. ### Am I affected? You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply: - You are utilizing `flashMessage` feature. - User input or data from URL parameters is incorporated into the `flashMessage`. An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`. ```js var params = new URLSearchParams(location.search); var errorMessage = params.get('error__message'); var showParams = {}; if (!!errorMessage === true) { showParams.flashMessage = { type: 'error', text: 'We were unable to log you in. ' + errorMessage, }; } lock.show(showParams); ``` OR - You are utilizing `languageDictionary` feature. - User input or data from URL parameters is used in `languageDictionary` properties. An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`. ```js var params = new URLSearchParams(location.search); var instruction = params.get('instruction'); var options = { languageDictionary: { emailInputPlaceholder: "something@youremail.com", title: "title", socialLoginInstructions: instruction }, }; var lock = new Auth0LockPasswordless( CLIENT_ID, DOMAIN, options ); lock.show() ``` ### How to fix that? Upgrade to version `11.30.1`. ### Will this update impact my users? The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.
{'CVE-2021-32641'}
2021-06-07T18:54:43Z
2021-06-04T19:10:34Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://github.com/auth0/lock/releases/tag/v11.30.1'}
null
npm
GHSA-g8vp-6hv4-m67c
Command Injection in entitlements
Versions of `entitlements` prior to 1.3.0 are vulnerable to Command Injection. The package does not validate input on the `entitlements` function and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 1.3.0 or later.
null
2020-08-31T18:43:32Z
2020-09-11T21:23:29Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/998', 'https://hackerone.com/reports/341869'}
null
npm
GHSA-vrw4-w73r-6mm8
TimelockController vulnerability in OpenZeppelin Contracts
### Impact A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker. ### Patches A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`: - 4.3.1 - 3.4.2 - 3.4.2-solc-0.7 Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles. ### Workarounds Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. ### References [Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958). ### Credits The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
{'CVE-2021-39168'}
2021-09-13T20:30:25Z
2021-08-30T16:12:49Z
CRITICAL
null
{'CWE-269'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeabl'}
null
npm
GHSA-hpr5-wp7c-hh5q
Cross-Site Scripting in mrk.js
Versions of `mrk.js` before 2.0.1 are vulnerable to cross-site scripting (XSS) when markdown is converted to HTML. ## Recommendation Update to version 2.0.1 or later and use `mark.sanitizeURL()` for any `src` and `href` attributes when extending the markdown.
null
2021-09-23T21:50:21Z
2020-09-01T19:37:29Z
HIGH
null
{'CWE-79'}
{'https://github.com/heyitsmeuralex/mrk', 'https://github.com/heyitsmeuralex/mrk/pull/3', 'https://www.npmjs.com/advisories/587'}
null
npm
GHSA-f39r-cpmj-whcg
Command Injection in ffmpegdotjs
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23376'}
2021-04-19T20:46:54Z
2021-05-06T15:55:21Z
CRITICAL
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-FFMPEGDOTJS-1078542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23376', 'https://github.com/TRomesh/ffmpegdotjs/blob/b7395daf0bdcb81218340427eb7073cdd28462af/index.js%23L219'}
null
npm
GHSA-3w5v-p54c-f74x
ejs is ivulnerable to remote code execution due to weak input validation
nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in ejs.renderFile() function
{'CVE-2017-1000228'}
2022-04-25T22:06:43Z
2017-11-30T23:15:19Z
CRITICAL
null
{'CWE-20'}
{'http://www.securityfocus.com/bid/101897', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228', 'https://github.com/advisories/GHSA-3w5v-p54c-f74x', 'https://snyk.io/vuln/npm:ejs:20161128'}
null
npm
GHSA-28xr-mwxg-3qc8
Command injection in simple-git
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.6.0.
{'CVE-2022-24066'}
2022-05-03T22:29:53Z
2022-04-02T00:00:13Z
HIGH
null
{'CWE-74', 'CWE-77'}
{'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://github.com/steveukx/git-js', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24066', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820'}
null
npm
GHSA-63m4-fhf2-cmf7
Command Execution in windows-cpu
Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution. ## Proof of Concept ``` var win = require('windows-cpu'); wind.findLoad('foo & calc.exe'); ``` ## Recommendation Update to version 0.1.5 or later.
{'CVE-2017-1000219'}
2021-09-23T21:42:01Z
2020-09-01T16:43:55Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/KyleRoss/windows-cpu', 'https://nodesecurity.io/advisories/336', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219', 'https://www.npmjs.com/advisories/336', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}
null
npm
GHSA-xxxq-chmp-67g4
RSA PKCS#1 decryption vulnerability with prepending zeros in jsrsasign
### Impact Jsrsasign supports RSA PKCS#1 v1.5 (i.e. RSAES-PKCS1-v1_5) and RSA-OAEP encryption and decryption. Its encrypted message is represented as BigInteger. When there is a valid encrypted message, a crafted message with prepending zeros can be decrypted by this vulnerability. - If you don't use RSA PKCS1-v1_5 or RSA-OAEP decryption, this vulnerability is not affected. - Risk to forge contents of encrypted message is very low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. ### Patches Users using RSA PKCS1-v1_5 or RSA-OAEP decryption should upgrade to 8.0.18. ### Workarounds Reject RSA PKCS1-v1_5 or RSA-OAEP encrypted message with unnecessary prepending zeros. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-14967 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967 https://vuldb.com/?id.157124 https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt https://github.com/kjur/jsrsasign/issues/439
{'CVE-2020-14967'}
2021-10-06T22:02:31Z
2020-06-26T16:27:08Z
CRITICAL
null
{'CWE-119'}
{'https://github.com/kjur/jsrsasign/issues/439', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-xxxq-chmp-67g4', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.Cipher.html#.decrypt', 'https://www.npmjs.com/package/jsrsasign', 'https://kjur.github.io/jsrsasign/', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://vuldb.com/?id.157124', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14967', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14967', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}
null
npm
GHSA-w9mf-24h3-9wxf
Downloads Resources over HTTP in windows-iedriver
Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10689'}
2021-01-08T01:56:52Z
2019-02-18T23:41:58Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/293', 'https://nodesecurity.io/advisories/293', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689', 'https://github.com/advisories/GHSA-w9mf-24h3-9wxf'}
null
npm
GHSA-mv26-cx23-vrfg
Server-Side Request Forgery in @peertube/embed-api
@peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery.
{'CVE-2022-0508'}
2022-02-09T22:27:07Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-918'}
{'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832', 'https://github.com/chocobozzz/peertube', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508', 'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c'}
null
npm
GHSA-66mv-xh68-h6v2
Denial of Service in @commercial/hapi
Affected versions of `@commercial/hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to versions 16.8.2, 17.9.2, 18.4.1, 19.1.1 or later.
null
2020-08-31T19:00:58Z
2020-09-03T15:48:53Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1483'}
null
npm
GHSA-8f89-2fwj-5v5r
Improper Input Validation in klona
Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.
{'CVE-2020-8125'}
2021-03-30T16:22:33Z
2021-04-13T15:41:24Z
HIGH
null
{'CWE-20'}
{'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://hackerone.com/reports/778414'}
null
npm
GHSA-54cr-gv8w-8324
Malicious Package in xoc
Version 1.0.7 of `xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.7 of this module is found installed you will want to replace it with a version before or after 1.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:51Z
2020-09-01T20:36:22Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/638'}
null
npm
GHSA-9wcg-jrwf-8gg7
Prototype Pollution in express-fileupload
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
{'CVE-2020-7699'}
2022-05-04T02:19:36Z
2020-08-05T14:53:16Z
CRITICAL
null
{'CWE-915'}
{'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969', 'https://github.com/richardgirges/express-fileupload/pull/237', 'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://github.com/richardgirges/express-fileupload', 'https://github.com/richardgirges/express-fileupload/issues/236', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699'}
null
npm
GHSA-g3qw-9pgp-xpj4
Out-of-bounds Read in njwt
Versions of `njwt` prior to 1.0.0 are vulnerable to out-of-bounds reads when a number is passed into the `base64urlEncode` function. On Node.js 6.x or lower this can expose sensitive information and on any other version of Node.js this creates a Denial of Service vulnerability. ## Recommendation Upgrade to version 1.0.0.
null
2020-08-31T18:32:28Z
2020-09-01T21:08:44Z
LOW
null
{'CWE-125'}
{'https://hackerone.com/reports/321704', 'https://www.npmjs.com/advisories/679'}
null
npm
GHSA-2h3h-vw8r-82rp
Weak JSON Web Token in yapi-vendor
Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.
{'CVE-2021-27884'}
2021-07-22T15:58:18Z
2021-03-26T16:49:26Z
MODERATE
null
{'CWE-330'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27884', 'https://github.com/YMFE/yapi/issues/2117', 'https://github.com/YMFE/yapi/issues/2263', 'https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi'}
null
npm
GHSA-95cg-3r4g-7w6j
Malicious Package in js-rha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:10:32Z
2020-09-03T23:01:29Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1283'}
null
npm
GHSA-cwfw-4gq5-mrqx
Regular Expression Denial of Service (ReDoS) in braces
A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
{'CVE-2018-1109'}
2021-03-31T21:35:00Z
2022-01-06T20:42:03Z
LOW
null
{'CWE-400'}
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://snyk.io/vuln/npm:braces:20180219', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109', 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272'}
null
npm
GHSA-w7q7-vjp8-7jv4
SQL Injection in typeorm
Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 0.1.15
null
2020-08-31T18:36:13Z
2019-06-06T15:30:16Z
HIGH
null
{'CWE-89'}
{'https://hackerone.com/reports/319458', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/800'}
null
npm
GHSA-8v67-x8q5-3x3g
Cross-Site Scripting in simditor
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.3.22 or later.
{'CVE-2018-19048'}
2021-08-04T14:53:05Z
2019-05-14T04:01:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md', 'https://github.com/hkglue/simditor_demo.git', 'https://www.npmjs.com/advisories/884', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22', 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}
null
npm
GHSA-c4hh-fg8x-6h9p
Malicious Package in buffer-xnr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:32Z
2020-09-03T21:57:29Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1247'}
null
npm
GHSA-3x83-p476-vv95
Downloads Resources over HTTP in selenium-standalone-painful
Affected versions of `selenium-standalone-painful` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-standalone-painful`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10679'}
2021-01-08T19:58:06Z
2019-02-18T23:54:40Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/284', 'https://github.com/advisories/GHSA-3x83-p476-vv95', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10679', 'https://www.npmjs.com/advisories/284'}
null
npm
GHSA-wwwg-6r7f-9c9h
Malicious Package in file-logging
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:15:33Z
2020-09-03T19:43:28Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1126'}
null
npm
GHSA-69r6-7h4f-9p7q
Malicious Package in discord.js-user
All versions of `discord.js-user` contain malicious code. The package uploads the user's Discord token to a remote server. ## Recommendation Remove the package from your environment. Ensure any compromised tokens are invalidated.
null
2021-09-29T20:32:46Z
2020-09-03T20:41:01Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1177'}
null
npm
GHSA-m2h2-264f-f486
angular vulnerable to regular expression denial of service (ReDoS)
AngularJS lets users write client-side web applications. The package angular after 1.7.0 is vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1. This package has been deprecated and is no longer maintained. 2. The vulnerable versions are 1.7.0 and higher.
{'CVE-2022-25844'}
2022-05-04T20:12:02Z
2022-05-03T00:00:44Z
MODERATE
null
{'CWE-1333'}
{'https://github.com/angular/angular.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25844', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737', 'https://stackblitz.com/edit/angularjs-material-blank-zvtdvb', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736'}
null
npm
GHSA-hqhp-5p83-hx96
Regular Expression Denial of Service in prismjs
Prism is a lightweight, robust, and elegant syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU.
{'CVE-2021-3801'}
2022-05-04T03:23:16Z
2021-09-20T20:44:48Z
MODERATE
null
{'CWE-400'}
{'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801', 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9', 'https://github.com/prismjs/prism'}
null
npm
GHSA-9xw9-pvgv-6p76
Insufficient Error Handling in http-proxy
Affected versions of `http-proxy` are vulnerable to a denial of service attack, wherein an attacker can force an error which will cause the server to crash. ## Recommendation Update to version 0.7.0 or later.
{'CVE-2017-16014'}
2020-08-31T18:19:16Z
2018-11-09T17:47:52Z
MODERATE
null
{'CWE-703'}
{'https://github.com/nodejitsu/node-http-proxy/pull/101', 'https://github.com/advisories/GHSA-9xw9-pvgv-6p76', 'https://nodesecurity.io/advisories/323', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16014', 'https://www.npmjs.com/advisories/323'}
null
npm
GHSA-cr79-9pwf-r6f5
Downloads Resources over HTTP in prince
Affected versions of `prince` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `prince`. ## Recommendation Update to version 1.4.6 or later.
{'CVE-2016-10591'}
2021-09-16T20:42:47Z
2019-02-18T23:34:24Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10591', 'https://www.npmjs.com/advisories/185', 'https://github.com/rse/node-prince', 'https://nodesecurity.io/advisories/185', 'https://github.com/advisories/GHSA-cr79-9pwf-r6f5'}
null
npm
GHSA-692h-g37c-qv44
Malicious Package in sj-tw-sec
All versions of `sj-tw-sec` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:15:23Z
2020-09-03T23:25:30Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1309'}
null
npm
GHSA-67mm-m3wx-j7fr
Command injection in gitlog
The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.
{'CVE-2021-26541'}
2022-04-27T19:13:33Z
2021-04-13T15:15:29Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26541', 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4', 'https://github.com/domharrington/node-gitlog/pull/65', 'https://advisory.checkmarx.net/advisory/CX-2020-4301', 'https://github.com/domharrington/node-gitlog', 'https://www.npmjs.com/package/gitlog'}
null
npm
GHSA-38f5-ghc2-fcmv
Code Injection in cryo
All versions of `cryo` are vulnerable to code injection due to an Insecure implementation of deserialization. ## Proof of concept ``` var Cryo = require('cryo'); var frozen = '{"root":"_CRYO_REF_3","references":[{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\"); return 1111;}"},{"contents":{},"value":"_CRYO_FUNCTION_function () {console.log(\\"defconrussia\\");return 2222;}"},{"contents":{"toString":"_CRYO_REF_0","valueOf":"_CRYO_REF_1"},"value":"_CRYO_OBJECT_"},{"contents":{"__proto__":"_CRYO_REF_2"},"value":"_CRYO_OBJECT_"}]}' var hydrated = Cryo.parse(frozen); console.log(hydrated); ``` ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2018-3784'}
2020-08-31T18:32:54Z
2018-08-21T17:02:43Z
HIGH
null
{'CWE-94'}
{'https://github.com/advisories/GHSA-38f5-ghc2-fcmv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3784', 'https://hackerone.com/reports/350418', 'https://www.npmjs.com/advisories/690'}
null
npm
GHSA-69mf-2cw2-38m8
Malicious Package in js-shc3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:13:22Z
2020-09-03T23:04:40Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1286'}
null
npm
GHSA-xg75-3277-gvvj
Directory Traversal in serve
Versions of `serve` before 7.1.3 are vulnerable to Directory Traversal. File paths are not sanitized leading to unauthorized access of system files. ## Recommendation Upgrade to version 7.1.3 or later
{'CVE-2019-5417'}
2021-09-21T22:30:46Z
2019-03-25T18:04:01Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-xg75-3277-gvvj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5417', 'https://hackerone.com/reports/358645', 'https://www.npmjs.com/advisories/795'}
null
npm
GHSA-65p7-pjj8-ggmr
Member account takeover
### Impact An error in the implementation of the member email change functionality allows unauthenticated users to change the email address of arbitrary member accounts to one they control by crafting a request to the relevant API endpoint, and validating the new address via magic link sent to the new email address. Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 3.18.0 and 4.15.0 with members functionality enabled. ### Patches Fixed in 4.15.1, all 4.x sites should upgrade as soon as possible. Fixed in 3.42.6, all 3.x sites should upgrade as soon as possible. ### Workarounds The patch in 4.15.1 and 3.42.6 adds a new authenticated endpoint for updating member email addresses. Updating Ghost is the quickest complete solution. As a workaround, if for any reason you cannot update your Ghost instance, you can block the `POST /members/api/send-magic-link/` endpoint, which will also disable member login and signup for your site. ### For more information If you have any questions or comments about this advisory: * Email us at [security@ghost.org](mailto:security@ghost.org)
null
2021-09-23T21:14:22Z
2021-09-23T23:18:42Z
MODERATE
null
null
{'https://github.com/TryGhost/Ghost', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-65p7-pjj8-ggmr'}
null
npm
GHSA-cgjv-rghq-qhgp
Path Traversal in algo-httpserv
Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to version 1.1.2 or later.
null
2021-08-17T22:22:48Z
2019-09-11T23:00:57Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741', 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735', 'https://www.npmjs.com/advisories/889'}
null
npm
GHSA-vfvf-mqq8-rwqc
Sanitization bypass using HTML Entities in marked
Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured. ## Proof of Concept This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted. For example: A link URI such as ``` javascript&#x58document;alert&#40;1&#41; ``` Renders a valid link that when clicked will execute `alert(1)`. ## Recommendation Update to version 0.3.6 or later.
{'CVE-2016-10531'}
2020-08-31T18:10:54Z
2019-02-18T23:58:20Z
HIGH
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-vfvf-mqq8-rwqc', 'https://github.com/chjj/marked/pull/592', 'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10531', 'https://nodesecurity.io/advisories/101', 'https://www.npmjs.com/advisories/101'}
null
npm
GHSA-j3cr-j9jx-mf4p
Downloads Resources over HTTP in redis-srvr
Affected versions of `redis-srvr` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `redis-srvr`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10639'}
2021-01-08T18:37:50Z
2019-02-18T23:47:07Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10639', 'https://www.npmjs.com/advisories/238', 'https://nodesecurity.io/advisories/238', 'https://github.com/advisories/GHSA-j3cr-j9jx-mf4p'}
null
npm
GHSA-jjgw-jf33-7fg9
Directory Traversal in mfrs
Affected versions of `mfrs` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16193'}
2020-08-31T18:23:06Z
2020-09-01T18:22:48Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrs', 'https://nodesecurity.io/advisories/437', 'https://www.npmjs.com/advisories/437', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16193'}
null
npm
GHSA-jcjx-c3j3-44pr
Insufficient Session Expiration in @cyyynthia/tokenize
### Impact A bug introduced in version 1.1.0 made Tokenize generate faulty tokens with NaN as a generation date. As a result, tokens would not properly expire and remain valid regardless of the `lastTokenReset` field. ### Patches Version 1.1.3 contains a patch that'll invalidate these faulty tokens and make new ones behave as expected. ### Workarounds None. Tokens do not hold the necessary information to perform invalidation anymore. ### References PR #1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/cyyynthia/tokenize](https://github.com/cyyynthia/tokenize) * Email us at [cynthia@cynthia.dev](mailto:cynthia@cynthia.dev)
null
2021-11-08T21:09:02Z
2021-11-10T16:44:12Z
HIGH
null
{'CWE-613'}
{'https://github.com/cyyynthia/tokenize/security/advisories/GHSA-jcjx-c3j3-44pr', 'https://github.com/cyyynthia/tokenize'}
null
npm
GHSA-rv6q-p3x7-43fx
Malicious Package in bitcoimjs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:42:01Z
2020-09-04T16:37:50Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1364'}
null
npm
GHSA-xr8h-53xr-jhcm
Path Traversal in marked-tree
This affects all versions up to and including version 0.8.1 of package marked-tree. There is no path sanitization in the path provided at fs.readFile in index.js.
{'CVE-2020-7682'}
2021-05-06T18:59:36Z
2021-05-07T16:06:43Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7682', 'https://snyk.io/vuln/SNYK-JS-MARKEDTREE-590121'}
null
npm
GHSA-7889-rm5j-hpgg
Clipboard feature vulnerability allowing to inject arbitrary HTML into the editor using paste functionality
### Affected packages The vulnerability has been discovered in [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin. All plugins with [clipboard](https://ckeditor.com/cke4/addon/clipboard) plugin dependency are affected: * [clipboard](https://ckeditor.com/cke4/addon/clipboard) * [pastetext](https://ckeditor.com/cke4/addon/pastetext) * [pastetools](https://ckeditor.com/cke4/addon/pastetools) * [widget](https://ckeditor.com/cke4/addon/widget) * [uploadwidget](https://ckeditor.com/cke4/addon/uploadwidget) * [autolink](https://ckeditor.com/cke4/addon/autolink) * [tableselection](https://ckeditor.com/cke4/addon/tableselection) ### Impact A potential vulnerability has been discovered in CKEditor 4 [Clipboard](https://ckeditor.com/cke4/addon/clipboard) package. The vulnerability allowed to abuse paste functionality using malformed HTML, which could result in injecting arbitrary HTML into the editor. It affects all users using the CKEditor 4 plugins listed above at version >= 4.5.2. ### Patches The problem has been recognized and patched. The fix will be available in version 4.16.2. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
{'CVE-2021-32809'}
2022-02-08T21:01:48Z
2021-08-23T19:40:57Z
MODERATE
null
{'CWE-79', 'CWE-94'}
{'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32809', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-8g3r-968r-c644
Malicious Package in jw-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:37:54Z
2020-09-03T23:15:58Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1296'}
null
npm
GHSA-363h-vj6q-3cmj
Rosetta-Flash JSONP Vulnerability in hapi
This description taken from the pull request provided by Patrick Kettner. Versions 6.1.0 and earlier of hapi are vulnerable to a rosetta-flash attack, which can be used by attackers to send data across domains and break the browser same-origin-policy. ## Recommendation - Update hapi to version 6.1.1 or later. Alternatively, a solution previously implemented by Google, Facebook, and Github is to prepend callbacks with an empty inline comment. This will cause the flash parser to break on invalid inputs and prevent the issue, and how the issue has been resolved internally in hapi.
{'CVE-2014-4671'}
2021-09-23T19:28:27Z
2020-08-31T22:45:35Z
MODERATE
null
{'CWE-352'}
{'http://helpx.adobe.com/security/products/flash-player/apsb14-17.html', 'https://www.npmjs.com/advisories/12', 'http://www.securityfocus.com/bid/68457', 'https://github.com/patrickkettner', 'http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/', 'http://rhn.redhat.com/errata/RHSA-2014-0860.html', 'http://secunia.com/advisories/59774', 'http://secunia.com/advisories/59837', 'https://github.com/spumko/hapi', 'http://security.gentoo.org/glsa/glsa-201407-02.xml', 'http://www.securitytracker.com/id/1030533', 'https://nvd.nist.gov/vuln/detail/CVE-2014-4671', 'https://github.com/spumko/hapi/pull/1766'}
null
npm
GHSA-9mx2-prfp-8hqp
Prototype Pollution in simpl-schema
This affects the package simpl-schema before 1.10.2. Attacker controlled input into a schema could result in remote code execution within the scope of the surrounding application.
{'CVE-2020-7742'}
2021-04-21T20:37:29Z
2021-05-10T18:38:47Z
HIGH
null
{'CWE-1321'}
{'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d', 'https://github.com/longshotlabs/simpl-schema/releases/tag/1.10.2', 'https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7742'}
null
npm
GHSA-hrpq-r399-whgw
Sandbox Breakout / Arbitrary Code Execution in safe-eval
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through Error objects. This may allow attackers to execute arbitrary code in the system. Evaluating the payload ``` (function (){ var ex = new Error ex.__proto__ = null ex.stack = { match: x => { return x.constructor.constructor("throw process.env")() } } return ex })() ``` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-7710'}
2021-07-29T22:01:24Z
2020-08-25T23:40:53Z
CRITICAL
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-SAFEEVAL-608076', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7710', 'https://github.com/hacksparrow/safe-eval/issues/19', 'https://www.npmjs.com/advisories/1322'}
null
npm
GHSA-xwg3-gjxh-c8pm
Malicious Package in ngx-context-menu
Version 0.0.26 of `ngx-context-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:26Z
2020-09-03T19:14:32Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1105'}
null
npm
GHSA-97pv-4338-r5vp
Cross-site Scripting in file-upload-with-preview
This affects the package file-upload-with-preview before 4.2.0. A file containing malicious JavaScript code in the name can be uploaded (a user needs to be tricked into uploading such a file).
{'CVE-2021-23439'}
2021-09-07T18:05:06Z
2021-09-07T23:08:54Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23439', 'https://github.com/johndatserakis/file-upload-with-preview', 'https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492', 'https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true%23diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174', 'https://github.com/johndatserakis/file-upload-with-preview/blob/develop/src/file-upload-with-preview.js%23L168'}
null
npm
GHSA-qpwf-4fx5-crqq
Directory Traversal in earlybird
Affected versions of `earlybird` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16154'}
2020-08-31T18:21:05Z
2020-09-01T17:19:36Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird', 'https://www.npmjs.com/advisories/380', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16154', 'https://nodesecurity.io/advisories/380'}
null
npm
GHSA-w3f3-4j22-2v3p
Malicious Package in destroyer-of-worlds
The package `destroyer-of-worlds` contained malicious code. The package contained a bash script that was run as a postinstall script. The script deleted system files and attempted to exhaust resources by creating a large file, a fork bomb and an endless loop. The script targeted UNIX systems. ## Recommendation Remove the package from your environment and perform additional incident response on your system's files and processes.
null
2021-09-30T21:25:19Z
2020-09-02T21:27:02Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/890'}
null
npm
GHSA-2h3x-95c6-885r
Malicious Package in river-mock
All versions of `river-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:01:18Z
2020-09-03T17:46:46Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1062'}
null
npm
GHSA-3269-x4pw-vffg
OS Command Injection in diskusage-ng
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
{'CVE-2020-7631'}
2021-07-28T22:42:20Z
2022-01-07T00:21:08Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/iximiuz/node-diskusage-ng/blob/master/lib/posix.js#L11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7631', 'https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425'}
null
npm
GHSA-2ggq-vfcp-gwhj
Cross-Site Scripting in @hapi/boom
Versions of `@hapi/boom` prior t 0.3.8 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 0.3.8 or later.
null
2021-10-04T20:48:50Z
2020-09-04T17:33:53Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hapijs/boom', 'https://snyk.io/vuln/SNYK-JS-HAPIBOOM-541183', 'https://www.npmjs.com/advisories/1459'}
null
npm
GHSA-5q88-cjfq-g2mh
codecov NPM module allows remote attackers to execute arbitrary commands
codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.
{'CVE-2020-7597'}
2021-08-19T17:22:07Z
2020-02-19T17:29:39Z
HIGH
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-CODECOV-548879', 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597'}
null
npm
GHSA-g753-jx37-7xwh
ECDSA signature vulnerability of Minerva timing attack in jsrsasign
### Impact ECDSA side-channel attack named [Minerava](https://minerva.crocs.fi.muni.cz/) have been found and it was found that it affects to jsrsasign. Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication time depends on bits of scalar. In jsrsasign 8.0.13 or later, execution time of EC point and scalar multiplication is almost constant and fixed for the issue. - Minerva is one of timing attack or side channel attack for EC. - If you don't use ECDSA class, you are not affected the vulnerability. - The vulnerability is that attacker may guess private key by checking processing time of EC key generation or ECDSA signing. - The cause issue is that point multiplication processing time in ECDSA signing is depends on private key value. - After 8.0.13, processing time of point multiplication in ECDSA signing have become constant for key value in theory. ### Patches Users using ECDSA signature generation should upgrade to 8.0.13 or later. ### Workarounds There is no workarounds in jsrsasign. Update jsrsasign or use other ECDSA library. ### ACKNOWLEDGEMENT Thanks to Jan Jancar @J08nY, Petr Svenda and Vladimir Sedlacek of Masaryk University in Czech Republic to find and report this vulnerability. ### References https://minerva.crocs.fi.muni.cz/ https://www.npmjs.com/advisories/1505 https://github.com/kjur/jsrsasign/issues/411
null
2021-09-22T18:43:42Z
2020-06-30T16:05:08Z
MODERATE
null
{'CWE-362'}
{'https://www.npmjs.com/advisories/1505', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh', 'https://minerva.crocs.fi.muni.cz/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.13', 'https://github.com/kjur/jsrsasign/issues/411', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73', 'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-561755'}
null
npm
GHSA-7cv6-gvx3-m54m
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account. ## Recommendation Update to version 4.0.0 or later.
{'CVE-2017-15881'}
2021-06-11T13:54:39Z
2017-11-16T01:47:02Z
MODERATE
null
{'CWE-79'}
{'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'http://www.securityfocus.com/bid/101541', 'https://www.npmjs.com/advisories/981', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m', 'https://github.com/keystonejs/keystone/issues/4437', 'https://github.com/keystonejs/keystone/pull/4478', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}
null
npm
GHSA-2m8v-572m-ff2v
Command Injection Vulnerability
### Impact command injection vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
{'CVE-2021-21315'}
2021-02-16T16:50:49Z
2021-02-16T16:51:04Z
MODERATE
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E', 'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525', 'https://security.netapp.com/advisory/ntap-20210312-0007/', 'https://www.npmjs.com/package/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21315', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v'}
null