ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-4wch-fwmx-cf47
Directory Traversal in augustine
Affected versions of `augustine` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. ## Proof of Concept ``` GET //etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No direct patch is available at this time. Currently, the best mitigation for this flaw is to use a different, functionally equivalent static file server package.
{'CVE-2017-0930'}
2020-08-31T18:27:45Z
2018-09-18T13:50:25Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0930', 'https://www.npmjs.com/advisories/559', 'https://github.com/advisories/GHSA-4wch-fwmx-cf47', 'https://hackerone.com/reports/296282'}
null
npm
GHSA-xpqw-fqpw-35fc
Directory Traversal in wangguojing123
Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16150'}
2020-08-31T18:20:50Z
2020-09-01T16:57:54Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/374', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123', 'https://www.npmjs.com/advisories/374'}
null
npm
GHSA-77q4-m83q-w76v
Missing Origin Validation in browserify-hmr
Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Upgrade to version 0.4.0 or later.
{'CVE-2018-14730'}
2021-09-24T20:59:15Z
2020-09-01T21:18:20Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14730', 'https://www.npmjs.com/advisories/726', 'https://github.com/AgentME/browserify-hmr', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://github.com/AgentME/browserify-hmr/issues/41'}
null
npm
GHSA-97x5-cc53-cv4v
Cross site scripting in froala-editor
A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML.
{'CVE-2020-22864'}
2021-10-28T17:21:21Z
2021-10-28T23:14:06Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-22864', 'https://github.com/froala/wysiwyg-editor/issues/3880', 'https://github.com/418sec/wysiwyg-editor/pull/1', 'https://github.com/froala/wysiwyg-editor/pull/3911', 'https://www.youtube.com/watch?v=WE3b1iSnWJY', 'https://github.com/froala/wysiwyg-editor'}
null
npm
GHSA-4859-gpc7-4j66
Command Injection in dot
All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.
null
2021-08-04T20:55:57Z
2019-06-05T21:24:29Z
MODERATE
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/798', 'https://hackerone.com/reports/390929'}
null
npm
GHSA-876r-hj45-fw7g
Sandbox Breakout / Arbitrary Code Execution in safer-eval
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system. ## Recommendation The package is not suited to receive arbitrary user input. Consider using an alternative package.
null
2020-08-31T18:51:25Z
2020-09-03T21:18:41Z
CRITICAL
null
null
{'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a', 'https://www.npmjs.com/advisories/1221'}
null
npm
GHSA-3gpc-w23c-w59w
Sandbox Breakout / Arbitrary Code Execution in pitboss-ng
All versions of `pitboss-ng` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-04-21T19:45:42Z
2020-09-04T15:02:06Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1319'}
null
npm
GHSA-94hh-pjjg-rwmr
Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. Users should upgrade to `^3.11.4`. ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29444'}
2021-04-16T23:00:49Z
2021-04-19T14:58:49Z
MODERATE
null
{'CWE-203'}
{'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444', 'https://www.npmjs.com/package/jose-browser-runtime'}
null
npm
GHSA-pp75-xfpw-37g9
Prototype pollution in grpc and @grpc/grpc-js
"The package grpc before 1.24.4 and the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition."
{'CVE-2020-7768'}
2021-04-19T22:57:05Z
2021-05-10T19:16:14Z
HIGH
null
{'CWE-915'}
{'https://github.com/grpc/grpc-node/releases/tag/grpc%401.24.4', 'https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818', 'https://snyk.io/vuln/SNYK-JS-GRPC-598671', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819', 'https://www.npmjs.com/package/grpc', 'https://www.npmjs.com/package/@grpc/grpc-js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7768', 'https://github.com/grpc/grpc-node/pull/1606', 'https://github.com/grpc/grpc-node/pull/1605'}
null
npm
GHSA-f7qw-5pvg-mmwp
Prototype Pollution in lutils-merge
All versions of `lutils-merge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. ## Recommendation The package is deprecated and no fixes are available. Consider using an alternative package.
null
2021-08-16T14:36:47Z
2019-06-13T18:58:44Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/893', 'https://hackerone.com/reports/439107', 'https://github.com/nfour/lutils-merge/issues/1', 'https://snyk.io/vuln/SNYK-JS-LUTILSMERGE-174783'}
null
npm
GHSA-362x-34h3-h6h6
Downloads Resources over HTTP in box2d-native
Affected versions of `box2d-native` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `box2d-native`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10617'}
2021-01-08T20:04:03Z
2019-02-18T23:56:48Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/219', 'https://www.npmjs.com/advisories/219', 'https://github.com/advisories/GHSA-362x-34h3-h6h6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10617'}
null
npm
GHSA-h6mq-3cj6-h738
Reverse Tabnabbing in showdown
Versions of `showdown` prior to 1.9.1 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks. ## Recommendation Upgrade to version 1.9.1 or later.
null
2021-10-01T16:12:36Z
2020-09-03T23:21:16Z
LOW
null
{'CWE-1022'}
{'https://www.npmjs.com/advisories/1302', 'https://github.com/showdownjs/showdown/pull/670/files', 'https://snyk.io/vuln/SNYK-JS-SHOWDOWN-469487', 'https://github.com/showdownjs/showdown'}
null
npm
GHSA-7qm6-9v49-38m9
Prototype Pollution in record-like-deep-assign
All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.
{'CVE-2021-23402'}
2021-07-06T14:32:33Z
2021-12-10T18:55:39Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024', 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23402'}
null
npm
GHSA-9j9m-8wjc-ff96
Insufficient Session Expiration in apostrophe
Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions.
{'CVE-2021-25979'}
2021-11-19T13:29:28Z
2021-11-10T17:02:44Z
CRITICAL
null
{'CWE-613'}
{'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c', 'https://github.com/apostrophecms/apostrophe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25979'}
null
npm
GHSA-rcv7-4w2m-gj9v
Malicious Package in sj-tw-test-security
All versions of `sj-tw-test-security` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:15:09Z
2020-09-03T23:24:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1308'}
null
npm
GHSA-97mg-3cr6-3x4c
Remote Code Execution in mongodb-query-parser
Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`: ```'(function () { return (clearImmediate.constructor("return process;")()).mainModule.require("child_process").execSync("touch test-file").toString()})()'``` ## Recommendation Upgrade to version 2.0.0 or later.
null
2020-08-31T18:59:39Z
2020-09-04T17:27:23Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1448'}
null
npm
GHSA-jf55-rgpx-p6rx
Malicious Package in iie-viz
Version 1.0.4 of `iie-viz` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:21Z
2020-09-03T19:12:22Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1103'}
null
npm
GHSA-hfmf-q43v-2ffj
Improper Key Verification in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version. ## Recommendation Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9154'}
2021-08-17T22:08:26Z
2019-08-23T21:42:18Z
HIGH
null
{'CWE-347'}
{'https://github.com/openpgpjs/openpgpjs/pull/797', 'https://www.npmjs.com/advisories/1161', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}
null
npm
GHSA-mc9x-v9xg-25pm
Exfiltrates data on installation in coffescript
The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffescript` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16205'}
2021-01-08T18:29:33Z
2018-08-06T20:12:54Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/542', 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm', 'https://nodesecurity.io/advisories/542', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}
null
npm
GHSA-3j7m-hmh3-9jmp
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript. ## Recommendation Update to version 1.4.3 or later.
{'CVE-2016-1000237'}
2021-08-23T15:18:04Z
2020-04-16T03:14:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf', 'https://github.com/punkave/sanitize-html/issues/29', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237', 'https://nodesecurity.io/advisories/135', 'https://github.com/apostrophecms/sanitize-html/issues/29', 'https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json', 'https://www.npmjs.com/advisories/135'}
null
npm
GHSA-3f5c-4qxj-vmpf
High severity vulnerability that affects next
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
{'CVE-2017-16877'}
2021-08-31T20:57:50Z
2017-12-05T02:04:14Z
HIGH
null
{'CWE-22'}
{'https://github.com/zeit/next.js', 'https://github.com/zeit/next.js/releases/tag/2.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877', 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}
null
npm
GHSA-29mw-wpgm-hmr9
Regular Expression Denial of Service (ReDoS) in lodash
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)
{'CVE-2020-28500'}
2022-02-08T21:35:28Z
2022-01-06T20:30:46Z
MODERATE
null
{'CWE-400'}
{'https://github.com/lodash/lodash', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/pull/5065', 'https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28500', 'https://snyk.io/vuln/SNYK-JS-LODASH-1018905', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894'}
null
npm
GHSA-25mp-g6fv-mqxx
Unexpected server crash in Next.js.
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
{'CVE-2021-43803'}
2022-04-07T16:06:54Z
2021-12-07T21:12:09Z
HIGH
null
{'CWE-20'}
{'https://github.com/vercel/next.js/releases/v12.0.5', 'https://github.com/vercel/next.js/releases/tag/v11.1.3', 'https://github.com/vercel/next.js/pull/32080', 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803', 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js'}
null
npm
GHSA-q3w9-g74q-vp5f
Denial of Service in express-fileupload
Versions of `express-fileupload` prior to 1.1.6-alpha.6 are vulnerable to Denial of Service. The package causes server responses to be delayed (up to 30s in internal testing) if the request contains a large `filename` of `.` characters. ## Recommendation Upgrade to version 1.1.6-alpha.6 or later.
null
2020-08-31T18:51:13Z
2020-09-03T21:14:12Z
LOW
null
null
{'https://www.npmjs.com/advisories/1216'}
null
npm
GHSA-cwcp-6c48-fm7m
Unsafe eval() in summit
Affected versions of `summit` allow attackers to execute arbitrary commands via collection names when using the `PouchDB` driver. ## Recommendation No direct patch is available at this time. Currently, the best option to mitigate the issue is to avoid using the `PouchDB` driver, as the package author has abandoned this feature entirely.
{'CVE-2017-16020'}
2020-08-31T18:18:59Z
2020-09-01T16:39:38Z
MODERATE
null
{'CWE-94'}
{'https://nodesecurity.io/advisories/315', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16020', 'https://www.npmjs.com/advisories/315', 'https://github.com/notduncansmith/summit/issues/23'}
null
npm
GHSA-3fr8-mwpp-8h9p
Cross-site scripting in TileServer GL
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
{'CVE-2020-15500'}
2021-05-11T19:36:26Z
2021-05-17T21:01:15Z
MODERATE
null
{'CWE-79'}
{'http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html', 'https://github.com/maptiler/tileserver-gl/issues/461', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15500'}
null
npm
GHSA-2mhh-w6q8-5hxw
Remote Memory Disclosure in ws
Versions of `ws` prior to 1.0.1 are affected by a remote memory disclosure vulnerability. In certain rare circumstances, applications which allow users to control the arguments of a `client.ping()` call will cause `ws` to send the contents of an allocated but non-zero-filled buffer to the server. This may disclose sensitive information that still exists in memory after previous use of the memory for other tasks. ## Proof of Concept ``` var ws = require('ws') var server = new ws.Server({ port: 9000 }) var client = new ws('ws://localhost:9000') client.on('open', function () { console.log('open') client.ping(50) // this sends a non-zeroed buffer of 50 bytes client.on('pong', function (data) { console.log('got pong') console.log(data) // Data from the client. }) }) ``` ## Recommendation Update to version 1.0.1 or greater.
{'CVE-2016-10518'}
2020-08-31T18:09:55Z
2019-02-18T23:56:42Z
LOW
null
{'CWE-201'}
{'https://nodesecurity.io/advisories/67', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10518', 'https://www.npmjs.com/advisories/67', 'https://github.com/advisories/GHSA-2mhh-w6q8-5hxw', 'https://gist.github.com/c0nrad/e92005446c480707a74a', 'https://github.com/websockets/ws/releases/tag/1.0.1'}
null
npm
GHSA-xmc8-cjfr-phx3
Regular Expression Denial of Service in highcharts
Versions of `highcharts` prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 6.1.0 or higher.
{'CVE-2018-20801'}
2021-09-21T22:36:57Z
2019-03-18T15:59:32Z
HIGH
null
{'CWE-185'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20801', 'https://github.com/advisories/GHSA-xmc8-cjfr-phx3', 'https://www.npmjs.com/advisories/793', 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa', 'https://github.com/highcharts/highcharts', 'https://security.netapp.com/advisory/ntap-20190715-0001/', 'https://snyk.io/vuln/npm:highcharts:20180225'}
null
npm
GHSA-q8j6-pwqx-pm96
Insecure template handling in Squirrelly
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
{'CVE-2021-32819'}
2021-05-17T18:46:59Z
2021-05-17T20:58:02Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32819', 'https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/', 'https://www.npmjs.com/package/squirrelly'}
null
npm
GHSA-6q8q-rvf4-m4pg
Downloads Resources over HTTP in dalek-browser-chrome
Affected versions of `dalek-browser-chrome` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available - the author of `dalek` recommends [`TestCafé`](http://devexpress.github.io/testcafe/). Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10604'}
2021-06-11T14:21:03Z
2019-02-18T23:50:14Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/199', 'https://github.com/advisories/GHSA-6q8q-rvf4-m4pg', 'https://nodesecurity.io/advisories/199', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10604'}
null
npm
GHSA-3w76-x94r-pw44
Downloads Resources over HTTP in rs-brightcove
Affected versions of `rs-brightcove` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `rs-brightcove`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10676'}
2021-01-08T20:11:24Z
2019-02-18T23:42:16Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/273', 'https://github.com/advisories/GHSA-3w76-x94r-pw44', 'https://nodesecurity.io/advisories/273', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10676'}
null
npm
GHSA-68gr-cmcp-g3mj
Directory Traversal in lactate
A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read. Mitigating factors: Only files that the user running `lactate` has permission to read will be accessible via this vulnerability. [Proof of concept](https://hackerone.com/reports/296645): Please globally install the `lactate` package and `cd` to a directory you wish to serve assets from. Next, run `lactate -p 8081` to start serving files from this location. The following cURL request can be used to demonstrate this vulnerability by requesting the target `/etc/passwd` file: ``` curl "http://127.0.0.1:8081/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" ``` ``` root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin [...] ``` ## Recommendation As there is currently no fix for this issue selecting an alternative static web server would be the best choice.
null
2021-08-16T23:34:10Z
2019-06-14T16:39:31Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/npm:lactate:20180123', 'https://www.npmjs.com/advisories/560', 'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5', 'https://hackerone.com/reports/296645'}
null
npm
GHSA-w4pv-w56c-mg4v
Path Traversal in stattic
Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`. ## Recommendation Update to version 0.3.0 or later.
{'CVE-2018-3734'}
2020-08-31T18:29:03Z
2018-07-18T21:20:15Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/319003', 'https://github.com/advisories/GHSA-w4pv-w56c-mg4v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734', 'https://www.npmjs.com/advisories/591'}
null
npm
GHSA-jc84-3g44-wf2q
Denial of Service in ecstatic
ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application.
{'CVE-2019-10775'}
2020-12-15T16:52:06Z
2020-12-15T16:52:17Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10775', 'https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354'}
null
npm
GHSA-2cf2-2383-h4jv
Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.
{'CVE-2020-7600'}
2021-07-28T18:46:07Z
2021-05-07T16:16:43Z
MODERATE
null
{'CWE-915'}
{'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef', 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7600'}
null
npm
GHSA-xfhp-gmh8-r8v2
Regular Expression Denial of Service (ReDoS)
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.
{'CVE-2021-23354'}
2021-03-25T00:17:59Z
2021-03-19T21:22:10Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096', 'https://github.com/adaltas/node-printf/pull/32', 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354', 'https://github.com/adaltas/node-printf/issues/31'}
null
npm
GHSA-7vrq-vg6p-32fw
Downloads Resources over HTTP in libxl
Affected versions of `libxl` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libxl`. ## Recommendation The module author recommends installing the bindings using a pinned and verified version of SDK instead of the automated download. More information is available in the modules [README](https://www.npmjs.com/package/libxl).
{'CVE-2016-10585'}
2021-09-16T20:44:26Z
2019-02-18T23:34:48Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nodesecurity.io/advisories/178', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10585', 'https://github.com/advisories/GHSA-7vrq-vg6p-32fw', 'https://github.com/DirtyHairy/node-libxl', 'https://www.npmjs.com/advisories/178'}
null
npm
GHSA-x9r5-jxvq-4387
Self XSS on user input in jquery.terminal
### Impact This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees. Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because the javascript code inside html attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. ### Patches Fixed version 2.31.1 ### Workarounds The user can use formatting that wrap whole user input and it's no op. ```javascript $.terminal.new_formatter([/([\s\S]+)/g, '[[;;]$1]']); ``` The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way). ### References The issue was reported here [jcubic/jquery.terminal#727](https://github.com/jcubic/jquery.terminal/issues/727) ### For more information If you have any questions or comments about this advisory: * Open an issue in [jcubic/jquery.terminal](https://github.com/jcubic/jquery.terminal) * Email us at [jcubic@onet.pl](mailto:jcubic@onet.pl)
{'CVE-2021-43862'}
2022-01-06T19:18:42Z
2022-01-06T22:48:56Z
LOW
null
{'CWE-80'}
{'https://github.com/jcubic/jquery.terminal/issues/727', 'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862', 'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5', 'https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1', 'https://github.com/jcubic/jquery.terminal/'}
null
npm
GHSA-v2jq-9475-r5g8
Cross-Site Scripting in bootstrap-tagsinput
All versions of `bootstrap-tagsinput` are vulnerable to cross-site scripting when user input is passed into the `itemTitle` parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter. ## Recommendation This package is not actively maintained, and has not seen an update since 2015. Because of this, the simplest mitigation is to avoid using the `itemTitle` parameter. With over 200 open issues and over 100 open pull requests as of 2/2018, it seems unlikely that the author has any intention of maintaining the module. If avoiding the use of `itemTitle` indefinitely is acceptable, this is a workable solution. If not, the best available mitigation is to use a fork of the module that is actively maintained and provides similar functionality. There are [many such forks to choose from available on github.](https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/network/members).
{'CVE-2016-1000227'}
2021-09-23T21:31:28Z
2020-09-01T15:29:51Z
HIGH
null
{'CWE-79'}
{'https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/issues/501', 'https://www.npmjs.com/advisories/124', 'https://github.com/bootstrap-tagsinput', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000227'}
null
npm
GHSA-rv49-54qp-fw42
Path Traversal in servey
Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to the latest version
null
2020-08-31T18:36:18Z
2019-06-06T15:30:20Z
MODERATE
null
{'CWE-22'}
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/802', 'https://hackerone.com/reports/355501'}
null
npm
GHSA-4627-w373-375v
Malicious Package in grunt-radical
Version 0.0.14 of `grunt-radical` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:06Z
2020-09-11T21:22:24Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/935'}
null
npm
GHSA-r2gr-fhmr-66c5
"Arbitrary code execution in socket.io-file"
"The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
{'CVE-2020-24807'}
2021-04-21T21:00:03Z
2021-05-10T18:38:11Z
HIGH
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/1564', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://github.com/advisories/GHSA-6495-8jvh-f28x', 'https://www.npmjs.com/package/socket.io-file', 'https://github.com/rico345100/socket.io-file'}
null
npm
GHSA-m874-69ww-w7jq
Directory Traversal in whispercast
Affected versions of `whispercast` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16174'}
2020-08-31T18:24:12Z
2018-07-23T20:45:01Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16174', 'https://www.npmjs.com/advisories/466', 'https://nodesecurity.io/advisories/466', 'https://github.com/advisories/GHSA-m874-69ww-w7jq'}
null
npm
GHSA-qw93-45r3-p66p
Prototype Pollution in merge-options
All versions of `merge-options` are vulnerable to Prototype Pollution ## Recommendation Update to version 1.0.1 or greater.
{'CVE-2018-3752'}
2021-09-16T21:10:31Z
2018-10-09T00:19:57Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-qw93-45r3-p66p', 'https://www.npmjs.com/advisories/717', 'https://hackerone.com/reports/311336', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3752', 'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4', 'https://github.com/schnittstabil/merge-options'}
null
npm
GHSA-gxpj-cx7g-858c
Regular Expression Denial of Service in debug
Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter. As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue. ## Recommendation Version 2.x.x: Update to version 2.6.9 or later. Version 3.x.x: Update to version 3.1.0 or later.
{'CVE-2017-16137'}
2021-01-08T18:45:03Z
2018-08-09T20:18:07Z
LOW
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/534', 'https://github.com/advisories/GHSA-gxpj-cx7g-858c', 'https://nodesecurity.io/advisories/534', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137', 'https://github.com/visionmedia/debug/pull/504', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://github.com/visionmedia/debug/issues/501'}
null
npm
GHSA-vrxj-4qhw-5vwq
Malicious Package in scryptys
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T14:29:03Z
2020-09-03T17:03:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1407'}
null
npm
GHSA-84cm-x2q5-8225
Critical severity vulnerability that affects dojox
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
{'CVE-2018-15494'}
2021-09-03T22:57:53Z
2018-10-15T22:03:48Z
CRITICAL
null
{'CWE-116'}
{'https://dojotoolkit.org/blog/dojo-1-14-released', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15494', 'https://github.com/advisories/GHSA-84cm-x2q5-8225', 'https://github.com/dojo/dojox/pull/283', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html', 'https://github.com/dojo/dojox'}
null
npm
GHSA-2r9c-46v3-43fc
Downloads Resources over HTTP in haxe3
Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`. ## Recommendation No patch is currently available for this vulnerability. This vulnerability has been left unpatched for several years, despite active maintenance on the package. Because of this, it appears that the package author has accepted the risk, and is unlikely to patch this package in the future. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10688'}
2021-01-08T20:59:00Z
2018-08-17T20:28:13Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/294', 'https://github.com/advisories/GHSA-2r9c-46v3-43fc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688', 'https://nodesecurity.io/advisories/294'}
null
npm
GHSA-vf26-7gjf-f92r
OS Command Injection in rpi
rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization.
{'CVE-2019-10796'}
2021-04-08T20:03:52Z
2021-04-13T15:23:29Z
MODERATE
null
{'CWE-78'}
{'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796', 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}
null
npm
GHSA-9q5w-79cv-947m
Unsafe defaults in `remark-html`
### Impact The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks. ### Patches The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation. ### Workarounds On older affected versions, pass `sanitize: true`, like so: ```diff - .use(remarkHtml) + .use(remarkHtml, {sanitize: true}) ``` ### References n/a ### For more information If you have any questions or comments about this advisory: * Open an issue in [`remark-html`](https://github.com/remarkjs/remark-html) * Email us at [security@unifiedjs.com](mailto:security@unifiedjs.com)
{'CVE-2021-39199'}
2021-09-07T19:05:40Z
2021-09-07T23:10:56Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/remarkjs/remark-html/releases/tag/14.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199', 'https://www.npmjs.com/package/remark-html', 'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1', 'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m', 'https://github.com/remarkjs/remark-html'}
null
npm
GHSA-8p5p-ff7x-hw7q
Cross-Site Scripting in public
Versions of `public` prior to 0.1.4 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation Upgrade to version 0.1.4 or later.
{'CVE-2018-3747'}
2021-09-07T20:23:14Z
2018-10-10T17:27:58Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1000', 'https://hackerone.com/reports/329950', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3747', 'https://github.com/advisories/GHSA-8p5p-ff7x-hw7q', 'https://hackerone.com/reports/316346'}
null
npm
GHSA-vhxc-fhm5-qcp9
Prototype Pollution in bodymen
The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)
{'CVE-2022-25296'}
2022-03-18T22:56:29Z
2022-03-18T00:01:11Z
MODERATE
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623', 'https://github.com/diegohaz/bodymen', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296'}
null
npm
GHSA-mvch-rh6h-2m47
Malicious Package in equest
All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:09:54Z
2020-09-11T21:10:29Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/867'}
null
npm
GHSA-wjr4-2jgw-hmv8
Command Injection in whereis
Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`. ## Recommendation Update to version 0.4.1 or later.
{'CVE-2018-3772'}
2020-08-31T18:29:33Z
2018-07-31T18:28:53Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3772', 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b', 'https://www.npmjs.com/advisories/604', 'https://hackerone.com/reports/319476', 'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8'}
null
npm
GHSA-x5m8-2r8v-8f97
Prototype Pollution in libnested
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
{'CVE-2022-25352'}
2022-03-29T22:05:38Z
2022-03-18T00:01:11Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/dominictarr/libnested/blob/master/index.js%23L22', 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1', 'https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25352', 'https://github.com/dominictarr/libnested'}
null
npm
GHSA-9272-59x2-gwf2
Malicious Package in ripedm160
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:04:39Z
2020-09-03T17:04:13Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1404'}
null
npm
GHSA-886v-mm6p-4m66
High severity vulnerability that affects gun
## Urgent Upgrade The static file server module included with GUN had a **serious vulnerability**: - Using `curl --path-as-is` allowed reads on any parent directory or files. This did not work via the browser or via curl without as-is option. ### Fixed This has been fixed since version `0.2019.416` and higher. ### Who Was Effected? Most NodeJS users who use the default setup, such as: - `npm start` - `node examples/http.js` - `Heroku` 1-click-deploy - `Docker` - `Now` If you have a custom NodeJS code then you are probably safe *unless* you have something like `require('http').createServer(Gun.serve(__dirname))` in it. If you have not upgraded, it is **mandatory** or else it is highly likely your environment variables and AWS (or other) keys could be leaked. ### Credit It was reported and fixed by [JK0N](https://github.com/amark/gun/pull/527), but I did not understand the `--path-as-is` condition. Joonas Loppi from [function61](http://function61.com) rediscovered it and explained the urgency to me to fix it.
null
2021-09-07T15:24:35Z
2019-06-05T09:48:02Z
HIGH
null
{'CWE-22'}
{'https://github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66', 'https://github.com/amark/gun', 'https://github.com/advisories/GHSA-886v-mm6p-4m66'}
null
npm
GHSA-33f9-j839-rf8h
Prototype Pollution in immer
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
{'CVE-2021-23436'}
2021-09-13T20:27:52Z
2021-09-02T17:17:37Z
CRITICAL
null
{'CWE-843', 'CWE-1321'}
{'https://github.com/immerjs/immer', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237', 'https://snyk.io/vuln/SNYK-JS-IMMER-1540542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266'}
null
npm
GHSA-pgh6-m65r-2rhq
DOS and Open Redirect with user input
### Impact A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`. A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."` The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. ### Patches The issue has been patched in `fastify-static@4.4.1` ### Workarounds If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. ### References + Bug founder: drstrnegth + [hackerone Report](https://hackerone.com/reports/1361804) ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-static](https://github.com/fastify/fastify-static) * Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
{'CVE-2021-22964'}
2021-10-21T14:57:14Z
2021-10-12T16:04:17Z
HIGH
null
{'CWE-248', 'CWE-601'}
{'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964', 'https://hackerone.com/reports/1361804', 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4', 'https://github.com/fastify/fastify-static'}
null
npm
GHSA-qh7x-j4v8-qw5w
Clipboard-based XSS
### Impact XSS against the user. ### Details jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS. ### References The Curious Case of Copy & Paste – on risks of pasting arbitrary content in browsers: https://research.securitum.com/the-curious-case-of-copy-paste/
{'CVE-2021-41086'}
2021-10-21T14:19:54Z
2021-09-22T20:39:26Z
HIGH
null
{'CWE-79'}
{'https://github.com/jsuites/jsuites/', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2', 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086', 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://www.npmjs.com/package/jsuites'}
null
npm
GHSA-v9w2-v7j9-rjpr
Remote code execution in Eclipse Theia
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.
{'CVE-2021-34435'}
2021-09-13T20:27:30Z
2021-09-02T22:02:36Z
HIGH
null
{'CWE-942', 'CWE-668'}
{'https://github.com/eclipse-theia/theia/pull/8759', 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34435', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018', 'https://github.com/eclipse-theia/theia'}
null
npm
GHSA-333w-rxj3-f55r
Regular Expression Denial Of Service in uri-js
Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method. ## Recommendation Update to v3.0.0 or later.
{'CVE-2017-16021'}
2020-08-31T18:10:51Z
2018-07-24T20:00:30Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16021', 'https://nodesecurity.io/advisories/100', 'https://github.com/advisories/GHSA-333w-rxj3-f55r', 'https://github.com/garycourt/uri-js/issues/12', 'https://www.npmjs.com/advisories/100'}
null
npm
GHSA-cfxm-4p54-5w7h
Directory traversal in pooledwebsocket
Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to version 0.0.19 or later.
{'CVE-2017-16107'}
2020-08-31T18:19:56Z
2018-07-24T00:20:57Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-cfxm-4p54-5w7h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107', 'https://www.npmjs.com/advisories/341', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket', 'https://nodesecurity.io/advisories/341'}
null
npm
GHSA-7543-mr7h-6v86
Improper Authorization in googleapis
Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials. ## Recommendation Upgrade to version 39.1.0.
null
2021-09-27T16:15:52Z
2020-09-02T16:00:26Z
HIGH
null
{'CWE-285'}
{'https://github.com/googleapis/google-api-nodejs-client/issues/1594', 'https://github.com/googleapis/google-api-nodejs-client', 'https://www.npmjs.com/advisories/791'}
null
npm
GHSA-9xr8-8hmc-389f
Cross-Site Scripting in vant
Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.1.8 or later.
null
2021-08-18T22:47:15Z
2019-11-22T13:45:33Z
HIGH
null
{'CWE-79'}
{'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a', 'https://snyk.io/vuln/SNYK-JS-VANT-460461', 'https://github.com/youzan/vant/issues/4270', 'https://www.npmjs.com/advisories/1157'}
null
npm
GHSA-r2vw-jgq9-jqx2
Improper Authorization in @sap-cloud-sdk/core
Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT. ## Recommendation Upgrade to version 1.21.2 or later.
null
2020-08-31T19:02:48Z
2020-09-03T15:54:11Z
HIGH
null
{'CWE-285'}
{'https://www.npmjs.com/advisories/1540'}
null
npm
GHSA-5rqg-jm4f-cqx7
Infinite loop causing Denial of Service in colors
colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomized characters to console and an infinite loop resulting in unbound system resource consumption. Users of colors relying on these specific versions should downgrade to version 1.4.0.
null
2022-01-10T19:56:36Z
2022-01-10T17:29:53Z
HIGH
null
{'CWE-835'}
{'https://github.com/Marak/colors.js', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26', 'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'}
null
npm
GHSA-frpw-jrwx-hcfv
Path Traversal in node-red-contrib-huemagic
node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file.
{'CVE-2021-25864'}
2021-04-05T23:24:50Z
2021-04-13T15:30:00Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25864', 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}
null
npm
GHSA-jwjq-vp53-ph6m
Directory Traversal in pytservce
Affected versions of `pytservce` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16195'}
2020-08-31T18:23:02Z
2020-09-01T18:21:44Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce', 'https://nodesecurity.io/advisories/435', 'https://www.npmjs.com/advisories/435', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16195'}
null
npm
GHSA-mmqv-m45h-q2hp
Sandbox Breakout / Arbitrary Code Execution in localeval
All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload ``` constructor.constructor("return process.env")() ``` returns the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2022-03-14T23:59:01Z
2020-09-04T15:22:40Z
CRITICAL
null
null
{'https://github.com/espadrine/localeval', 'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/issues/9', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335'}
null
npm
GHSA-37q6-576q-vgr7
Missing Origin Validation in parcel-bundler
Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Update to version 1.10.0 or later.
{'CVE-2018-14731'}
2021-08-31T20:51:48Z
2018-10-30T20:36:53Z
HIGH
null
{'CWE-200'}
{'https://github.com/parcel-bundler/parcel/issues/1783', 'https://github.com/parcel-bundler/parcel/pull/1794', 'https://github.com/advisories/GHSA-37q6-576q-vgr7', 'https://www.npmjs.com/advisories/721', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://github.com/parcel-bundler/parcel', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14731'}
null
npm
GHSA-9gxr-rhx6-4jgv
Sandbox Breakout / Prototype Pollution in notevil
Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype. Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function. ## Recommendation Upgrade to version 1.3.3 or later.
null
2020-08-31T18:55:36Z
2020-09-04T15:18:57Z
MODERATE
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1338'}
null
npm
GHSA-gg96-f8wr-p89f
Script injection
### Impact A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. ### Patches The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
{'CVE-2021-32661'}
2021-06-04T19:22:48Z
2021-06-04T19:09:26Z
MODERATE
null
{'CWE-77', 'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32661', 'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
null
npm
GHSA-r742-7j4h-hjr8
Malicious Package in arsenic-tabasco-cyborg-peanut-butter
All versions of `arsenic-tabasco-cyborg-peanut-butter` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T17:07:41Z
2020-09-03T23:27:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1313'}
null
npm
GHSA-f8h3-rqrm-47v9
Prototype Pollution in smart-extend
All versions of `smart-extend` are vulnerable to Prototype Pollution. The `deep()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:36:15Z
2020-09-02T16:02:40Z
MODERATE
null
{'CWE-1321'}
{'https://hackerone.com/reports/438274', 'https://www.npmjs.com/advisories/801'}
null
npm
GHSA-2m39-62fm-q8r3
Regular Expression Denial of Service in sshpk
Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys. ## Recommendation Update to version 1.13.2, 1.14.1 or later.
{'CVE-2018-3737'}
2020-08-31T18:29:38Z
2018-08-15T13:22:23Z
HIGH
null
{'CWE-770'}
{'https://hackerone.com/reports/319593', 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17', 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737', 'https://www.npmjs.com/advisories/606', 'https://github.com/advisories/GHSA-2m39-62fm-q8r3'}
null
npm
GHSA-cgpp-wm2h-6hqx
SQL Injection in waterline-sequel
Affected versions of `waterline-sequel` are vulnerable to SQL injection in cases where user input is passed into the `like`, `contains`, `startsWith`, or `endsWith` methods. ## Recommendation Upgrade to at least version 0.5.1
{'CVE-2016-10551'}
2020-08-31T18:11:18Z
2019-02-18T23:54:28Z
HIGH
null
{'CWE-89'}
{'https://github.com/balderdashy/waterline-sequel/pull/66', 'https://www.npmjs.com/advisories/115', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10551', 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530', 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx', 'https://nodesecurity.io/advisories/115'}
null
npm
GHSA-pgr8-jg6h-8gw6
Cross-Site Scripting in webpack-bundle-analyzer
Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting. ## Recommendation Upgrade to version 3.3.2 or later.
null
2021-08-04T15:26:36Z
2019-05-23T09:26:20Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/826', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264', 'https://snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190'}
null
npm
GHSA-3wqh-h42r-x8fq
Denial of Service in @hapi/subtext
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 6.1.3 or 7.0.3
null
2020-08-31T19:00:42Z
2020-09-03T15:46:22Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1476'}
null
npm
GHSA-x52f-h74p-9jh8
Hijacked Environment Variables in node-sqlite
The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16048'}
2021-06-10T19:38:19Z
2018-07-23T21:00:07Z
HIGH
null
{'CWE-506', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16048', 'https://github.com/advisories/GHSA-x52f-h74p-9jh8', 'https://nodesecurity.io/advisories/493', 'https://www.npmjs.com/advisories/493'}
null
npm
GHSA-j866-8vxx-27hx
Hijacked Environment Variables in nodemailer.js
The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16072'}
2020-08-31T18:25:54Z
2018-08-29T23:43:53Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-j866-8vxx-27hx', 'https://www.npmjs.com/advisories/511', 'https://nodesecurity.io/advisories/511', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16072'}
null
npm
GHSA-7cvf-p83w-48q6
Malicious Package in beffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:22:59Z
2020-09-03T21:37:29Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1229'}
null
npm
GHSA-r96c-57pf-9jjm
Prototype Pollution in node.extend
Versions of `node.extend` before 1.1.7 or 2.0.1 are vulnerable to prototype pollution. ## Recommendation Update to version 1.1.7, 2.0.1 or later.
{'CVE-2018-16491'}
2020-08-31T18:35:31Z
2019-02-07T18:17:34Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16491', 'https://github.com/advisories/GHSA-r96c-57pf-9jjm', 'https://www.npmjs.com/advisories/781', 'https://hackerone.com/reports/430831'}
null
npm
GHSA-2g8g-63j4-9w3r
RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend
The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution. ### Impact A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data. ### Patches This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Backstage repository](https://github.com/backstage/backstage) * Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
null
2021-11-29T19:39:57Z
2021-12-01T18:29:12Z
HIGH
null
null
{'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r'}
null
npm
GHSA-p5p2-rhc3-wmf3
Malicious Package in siganle
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:40:00Z
2020-09-03T17:03:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1409'}
null
npm
GHSA-fg6m-q92x-vv38
Directory Traversal in dcserver
Affected versions of `dcserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16158'}
2020-08-31T18:21:36Z
2020-09-01T17:26:00Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/393', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://nodesecurity.io/advisories/393', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16158'}
null
npm
GHSA-8p2p-p8mg-x3cw
Insight API transaction broadcast endpoint can result in Full Path Disclosure
Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request.
{'CVE-2018-1000023'}
2022-04-25T22:32:08Z
2018-03-05T19:33:54Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000023', 'https://github.com/bitpay/insight-api/issues/542', 'https://github.com/advisories/GHSA-8p2p-p8mg-x3cw', 'https://github.com/bitpay/insight-api'}
null
npm
GHSA-wrw9-m778-g6mc
Memory Exposure in bl
Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure. `bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory ## Recommendation Update to version 0.9.5, 1.0.1 or later.
null
2020-08-31T18:29:15Z
2019-06-03T17:27:57Z
MODERATE
null
{'CWE-200'}
{'https://github.com/rvagg/bl/pull/22', 'https://www.npmjs.com/advisories/596'}
null
npm
GHSA-894f-rw44-qrw5
Hijacked Environment Variables in mongose
The `mongose` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16077'}
2020-08-31T18:26:06Z
2018-10-10T17:28:21Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-894f-rw44-qrw5', 'https://nodesecurity.io/advisories/516', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16077', 'https://www.npmjs.com/advisories/516'}
null
npm
GHSA-4v2c-g2xc-47fv
Downloads Resources over HTTP in massif
Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10682'}
2021-01-08T19:53:43Z
2019-02-18T23:54:38Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/290', 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv', 'https://www.npmjs.com/advisories/290', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}
null
npm
GHSA-cr6m-62pq-hmqh
OS Command injection in npm-lockfile
npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5.
{'CVE-2022-0841'}
2022-04-04T21:37:38Z
2022-03-04T00:00:18Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0841', 'https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1', 'https://github.com/ljharb/npm-lockfile'}
null
npm
GHSA-mvmf-cvfx-qg55
Regular Expression Denial of Service in bleach
All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function. ## Recommendation The `bleach` package is not currently maintained, and has not seen an update since 2014. To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal).
{'CVE-2014-8881'}
2021-09-23T21:06:09Z
2020-09-01T15:16:43Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/npm:bleach:20151024', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8881', 'https://www.npmjs.com/advisories/47'}
null
npm
GHSA-3cjv-4phw-gvvv
Malicious Package in getcookies
The `getcookies` module contained a backdoor that would allow for a remote attacker to execute arbitrary commands on the system running the malicious module. ## Recommendation This module should be uninstalled if found used within an application. In addition to removing the installed module, you will also want to evaluate your application to determine whether or not user data or systems were compromised.
null
2021-10-01T13:25:15Z
2020-09-01T20:39:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/649'}
null
npm
GHSA-8f64-q7jc-ccgp
Cross-Site Scripting in metascraper
Versions of `metascraper` prior to 5.3.0 are vulnerable to stored cross-site scripting (XSS). ## Recommendation Upgrade to version 5.3.0 or later.
{'CVE-2018-3773'}
2020-08-31T18:29:31Z
2018-08-08T22:25:57Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3773', 'https://hackerone.com/reports/309367', 'https://github.com/advisories/GHSA-8f64-q7jc-ccgp', 'https://www.npmjs.com/advisories/603'}
null
npm
GHSA-c6rq-rjc2-86v2
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
{'CVE-2017-18869'}
2021-05-12T20:23:29Z
2022-02-10T23:33:39Z
LOW
null
{'CWE-367'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1611614', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18869', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985', 'https://snyk.io/vuln/npm:chownr:20180731', 'https://github.com/isaacs/chownr/issues/14'}
null
npm
GHSA-2777-2vq8-c4v4
SQL Injection in sequelize
Versions of `sequelize` prior to 5.3.0 (excluding v3 and v4) are vulnerable to SQL Injection. PostgreSQL option`standard_conforming_strings` is not set to `on` by default, which may allow attackers to inject SQL statements due to poor handling of backslashes in string literals. ## Recommendation Upgrade to version 5.3.0 or later.
{'CVE-2019-11069'}
2021-08-30T16:08:57Z
2019-04-11T16:33:17Z
HIGH
null
{'CWE-20'}
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174167', 'https://www.npmjs.com/advisories/821', 'https://github.com/sequelize/sequelize/pull/10746/files', 'https://github.com/advisories/GHSA-2777-2vq8-c4v4', 'https://github.com/sequelize/sequelize', 'https://github.com/sequelize/sequelize/releases/tag/v5.3.0', 'https://github.com/sequelize/sequelize/pull/10746', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11069', 'https://github.com/sequelize/sequelize/blob/98cb17c17f73e2aa1792aa5a1d31216ba984b456/lib/dialects/postgres/connection-manager.js#L158-L160'}
null
npm
GHSA-7xcx-6wjh-7xp2
Command Injection in standard-version
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111` The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version). ## Summary The `standardVersion` function has a command injection vulnerability. Clients of the `standard-version` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. ## Product Standard Version ## Tested Version Commit [2f04ac8](https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9/) ## Details ### Issue 1: Command injection in `standardVersion` The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in: ``` npm install standard-version git init echo "foo" > foo.txt # the git repo has to be non-empty git add foo.txt git commit -am "initial commit" ``` Now create a file with the following contents: ``` var fs = require("fs"); // setting up a bit of environment fs.writeFileSync("package.json", '{"name": "foo", "version": "1.0.0"}'); const standardVersion = require('standard-version') standardVersion({ noVerify: true, infile: 'foo.txt', releaseCommitMessageFormat: "bla `touch exploit`" }) ``` and run it: ``` node test.js ``` Notice that a file named `exploit` has been created. This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples: [CVE-2020-7646](https://github.com/advisories/GHSA-m8xj-5v73-3hh8), [CVE-2020-7614](https://github.com/advisories/GHSA-426h-24vj-qwxf), [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), [CVE-2019-10778](https://github.com/advisories/GHSA-4gp3-p7ph-x2jr), [CVE-2019-10776](https://github.com/advisories/GHSA-84cm-v6jp-gjmr), [CVE-2018-16462](https://github.com/advisories/GHSA-9jm3-5835-537m), [CVE-2018-16461](https://github.com/advisories/GHSA-7g2w-6r25-2j7p), [CVE-2018-16460](https://github.com/advisories/GHSA-cfhg-9x44-78h2), [CVE-2018-13797](https://github.com/advisories/GHSA-pp57-mqmh-44h7), [CVE-2018-3786](https://github.com/advisories/GHSA-c9j3-wqph-5xx9), [CVE-2018-3772](https://github.com/advisories/GHSA-wjr4-2jgw-hmv8), [CVE-2018-3746](https://github.com/advisories/GHSA-3pxp-6963-46r9), [CVE-2017-16100](https://github.com/advisories/GHSA-jcw8-r9xm-32c6), [CVE-2017-16042](https://github.com/advisories/GHSA-qh2h-chj9-jffq). We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `standard-version` project [here](https://lgtm.com/query/237522640229151035/). #### Impact This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. #### Remediation We recommend not using an API that can interpret a string as a shell command. For example, use [`child_process.execFile`](https://nodejs.org/api/child_process.html#child_process_child_process_execfile_file_args_options_callback) instead of [`child_process.exec`](https://nodejs.org/api/child_process.html#child_process_child_process_exec_command_options_callback). ## Credit This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh). ## Contact You can contact the GHSL team at `securitylab@github.com`, please include `GHSL-2020-111` in any communication regarding this issue. ## Disclosure Policy This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/disclosures#policy).
null
2021-09-22T21:03:04Z
2020-07-13T21:34:59Z
MODERATE
null
{'CWE-77'}
{'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9', 'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2', 'https://github.com/conventional-changelog/standard-version'}
null
npm
GHSA-5f38-9jw2-6r6h
Cross-site Scripting in teddy
Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).
{'CVE-2021-23447'}
2022-05-04T03:42:48Z
2021-10-12T16:22:04Z
MODERATE
null
{'CWE-79', 'CWE-843'}
{'https://github.com/rooseveltframework/teddy', 'https://github.com/rooseveltframework/teddy/pull/518', 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557', 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0', 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447'}
null
npm
GHSA-xh56-3f5w-9h25
Hijacked Environment Variables in nodemailer-js
The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16071'}
2020-08-31T18:25:52Z
2018-08-29T23:40:01Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-xh56-3f5w-9h25', 'https://nodesecurity.io/advisories/510', 'https://www.npmjs.com/advisories/510', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071'}
null
npm
GHSA-cjj8-wfrx-jqcf
Cross-Site Scripting (XSS) in pivottable
Affected versions of `pivottable` are vulnerable to cross-site scripting, due to a new mechanism used to render JSON elements. ## Recommendation Update to version 2.0.0 or later.
{'CVE-2016-1000241'}
2021-09-23T21:36:34Z
2020-09-01T16:00:18Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000241', 'https://www.npmjs.com/advisories/139', 'https://github.com/nicolaskruchten/pivottable/pull/401', 'https://github.com/nicolaskruchten/pivottable'}
null