ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-4wch-fwmx-cf47
|
Directory Traversal in augustine
|
Affected versions of `augustine` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
## Proof of Concept
```
GET //etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No direct patch is available at this time.
Currently, the best mitigation for this flaw is to use a different, functionally equivalent static file server package.
|
{'CVE-2017-0930'}
|
2020-08-31T18:27:45Z
|
2018-09-18T13:50:25Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0930', 'https://www.npmjs.com/advisories/559', 'https://github.com/advisories/GHSA-4wch-fwmx-cf47', 'https://hackerone.com/reports/296282'}
| null |
npm
|
GHSA-xpqw-fqpw-35fc
|
Directory Traversal in wangguojing123
|
Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16150'}
|
2020-08-31T18:20:50Z
|
2020-09-01T16:57:54Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/374', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123', 'https://www.npmjs.com/advisories/374'}
| null |
npm
|
GHSA-77q4-m83q-w76v
|
Missing Origin Validation in browserify-hmr
|
Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server.
This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Upgrade to version 0.4.0 or later.
|
{'CVE-2018-14730'}
|
2021-09-24T20:59:15Z
|
2020-09-01T21:18:20Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14730', 'https://www.npmjs.com/advisories/726', 'https://github.com/AgentME/browserify-hmr', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://github.com/AgentME/browserify-hmr/issues/41'}
| null |
npm
|
GHSA-97x5-cc53-cv4v
|
Cross site scripting in froala-editor
|
A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML.
|
{'CVE-2020-22864'}
|
2021-10-28T17:21:21Z
|
2021-10-28T23:14:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-22864', 'https://github.com/froala/wysiwyg-editor/issues/3880', 'https://github.com/418sec/wysiwyg-editor/pull/1', 'https://github.com/froala/wysiwyg-editor/pull/3911', 'https://www.youtube.com/watch?v=WE3b1iSnWJY', 'https://github.com/froala/wysiwyg-editor'}
| null |
npm
|
GHSA-4859-gpc7-4j66
|
Command Injection in dot
|
All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.
| null |
2021-08-04T20:55:57Z
|
2019-06-05T21:24:29Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/798', 'https://hackerone.com/reports/390929'}
| null |
npm
|
GHSA-876r-hj45-fw7g
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval
|
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system.
## Recommendation
The package is not suited to receive arbitrary user input. Consider using an alternative package.
| null |
2020-08-31T18:51:25Z
|
2020-09-03T21:18:41Z
|
CRITICAL
| null | null |
{'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a', 'https://www.npmjs.com/advisories/1221'}
| null |
npm
|
GHSA-3gpc-w23c-w59w
|
Sandbox Breakout / Arbitrary Code Execution in pitboss-ng
|
All versions of `pitboss-ng` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-04-21T19:45:42Z
|
2020-09-04T15:02:06Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1319'}
| null |
npm
|
GHSA-94hh-pjjg-rwmr
|
Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime
|
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
|
{'CVE-2021-29444'}
|
2021-04-16T23:00:49Z
|
2021-04-19T14:58:49Z
|
MODERATE
| null |
{'CWE-203'}
|
{'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444', 'https://www.npmjs.com/package/jose-browser-runtime'}
| null |
npm
|
GHSA-pp75-xfpw-37g9
|
Prototype pollution in grpc and @grpc/grpc-js
|
"The package grpc before 1.24.4 and the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition."
|
{'CVE-2020-7768'}
|
2021-04-19T22:57:05Z
|
2021-05-10T19:16:14Z
|
HIGH
| null |
{'CWE-915'}
|
{'https://github.com/grpc/grpc-node/releases/tag/grpc%401.24.4', 'https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818', 'https://snyk.io/vuln/SNYK-JS-GRPC-598671', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819', 'https://www.npmjs.com/package/grpc', 'https://www.npmjs.com/package/@grpc/grpc-js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7768', 'https://github.com/grpc/grpc-node/pull/1606', 'https://github.com/grpc/grpc-node/pull/1605'}
| null |
npm
|
GHSA-f7qw-5pvg-mmwp
|
Prototype Pollution in lutils-merge
|
All versions of `lutils-merge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
The package is deprecated and no fixes are available. Consider using an alternative package.
| null |
2021-08-16T14:36:47Z
|
2019-06-13T18:58:44Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/893', 'https://hackerone.com/reports/439107', 'https://github.com/nfour/lutils-merge/issues/1', 'https://snyk.io/vuln/SNYK-JS-LUTILSMERGE-174783'}
| null |
npm
|
GHSA-362x-34h3-h6h6
|
Downloads Resources over HTTP in box2d-native
|
Affected versions of `box2d-native` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `box2d-native`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10617'}
|
2021-01-08T20:04:03Z
|
2019-02-18T23:56:48Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/219', 'https://www.npmjs.com/advisories/219', 'https://github.com/advisories/GHSA-362x-34h3-h6h6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10617'}
| null |
npm
|
GHSA-h6mq-3cj6-h738
|
Reverse Tabnabbing in showdown
|
Versions of `showdown` prior to 1.9.1 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
## Recommendation
Upgrade to version 1.9.1 or later.
| null |
2021-10-01T16:12:36Z
|
2020-09-03T23:21:16Z
|
LOW
| null |
{'CWE-1022'}
|
{'https://www.npmjs.com/advisories/1302', 'https://github.com/showdownjs/showdown/pull/670/files', 'https://snyk.io/vuln/SNYK-JS-SHOWDOWN-469487', 'https://github.com/showdownjs/showdown'}
| null |
npm
|
GHSA-7qm6-9v49-38m9
|
Prototype Pollution in record-like-deep-assign
|
All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.
|
{'CVE-2021-23402'}
|
2021-07-06T14:32:33Z
|
2021-12-10T18:55:39Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024', 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23402'}
| null |
npm
|
GHSA-9j9m-8wjc-ff96
|
Insufficient Session Expiration in apostrophe
|
Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions.
|
{'CVE-2021-25979'}
|
2021-11-19T13:29:28Z
|
2021-11-10T17:02:44Z
|
CRITICAL
| null |
{'CWE-613'}
|
{'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c', 'https://github.com/apostrophecms/apostrophe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25979'}
| null |
npm
|
GHSA-rcv7-4w2m-gj9v
|
Malicious Package in sj-tw-test-security
|
All versions of `sj-tw-test-security` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:15:09Z
|
2020-09-03T23:24:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1308'}
| null |
npm
|
GHSA-97mg-3cr6-3x4c
|
Remote Code Execution in mongodb-query-parser
|
Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`:
```'(function () { return (clearImmediate.constructor("return process;")()).mainModule.require("child_process").execSync("touch test-file").toString()})()'```
## Recommendation
Upgrade to version 2.0.0 or later.
| null |
2020-08-31T18:59:39Z
|
2020-09-04T17:27:23Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1448'}
| null |
npm
|
GHSA-jf55-rgpx-p6rx
|
Malicious Package in iie-viz
|
Version 1.0.4 of `iie-viz` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:21Z
|
2020-09-03T19:12:22Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1103'}
| null |
npm
|
GHSA-hfmf-q43v-2ffj
|
Improper Key Verification in openpgp
|
Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version.
## Recommendation
Upgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
|
{'CVE-2019-9154'}
|
2021-08-17T22:08:26Z
|
2019-08-23T21:42:18Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://github.com/openpgpjs/openpgpjs/pull/797', 'https://www.npmjs.com/advisories/1161', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}
| null |
npm
|
GHSA-mc9x-v9xg-25pm
|
Exfiltrates data on installation in coffescript
|
The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffescript` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16205'}
|
2021-01-08T18:29:33Z
|
2018-08-06T20:12:54Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/542', 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm', 'https://nodesecurity.io/advisories/542', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}
| null |
npm
|
GHSA-3j7m-hmh3-9jmp
|
Cross-Site Scripting in sanitize-html
|
Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript.
## Recommendation
Update to version 1.4.3 or later.
|
{'CVE-2016-1000237'}
|
2021-08-23T15:18:04Z
|
2020-04-16T03:14:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf', 'https://github.com/punkave/sanitize-html/issues/29', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237', 'https://nodesecurity.io/advisories/135', 'https://github.com/apostrophecms/sanitize-html/issues/29', 'https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json', 'https://www.npmjs.com/advisories/135'}
| null |
npm
|
GHSA-3f5c-4qxj-vmpf
|
High severity vulnerability that affects next
|
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
|
{'CVE-2017-16877'}
|
2021-08-31T20:57:50Z
|
2017-12-05T02:04:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/zeit/next.js', 'https://github.com/zeit/next.js/releases/tag/2.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877', 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}
| null |
npm
|
GHSA-29mw-wpgm-hmr9
|
Regular Expression Denial of Service (ReDoS) in lodash
|
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " " } return ret + "1"; } var s = build_blank(50000) var time0 = Date.now(); lo.trim(s) var time_cost0 = Date.now() - time0; console.log("time_cost0: " + time_cost0) var time1 = Date.now(); lo.toNumber(s) var time_cost1 = Date.now() - time1; console.log("time_cost1: " + time_cost1) var time2 = Date.now(); lo.trimEnd(s) var time_cost2 = Date.now() - time2; console.log("time_cost2: " + time_cost2)
|
{'CVE-2020-28500'}
|
2022-02-08T21:35:28Z
|
2022-01-06T20:30:46Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/lodash/lodash', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074896', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074895', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/pull/5065', 'https://github.com/lodash/lodash/blob/npm/trimEnd.js%23L8', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28500', 'https://snyk.io/vuln/SNYK-JS-LODASH-1018905', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074894'}
| null |
npm
|
GHSA-25mp-g6fv-mqxx
|
Unexpected server crash in Next.js.
|
Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on Vercel are not affected, along with similar environments where invalid requests are filtered before reaching Next.js. Versions 12.0.5 and 11.1.3 contain patches for this issue. Note that prior version 0.9.9 package `next` hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
|
{'CVE-2021-43803'}
|
2022-04-07T16:06:54Z
|
2021-12-07T21:12:09Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/vercel/next.js/releases/v12.0.5', 'https://github.com/vercel/next.js/releases/tag/v11.1.3', 'https://github.com/vercel/next.js/pull/32080', 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43803', 'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js'}
| null |
npm
|
GHSA-q3w9-g74q-vp5f
|
Denial of Service in express-fileupload
|
Versions of `express-fileupload` prior to 1.1.6-alpha.6 are vulnerable to Denial of Service. The package causes server responses to be delayed (up to 30s in internal testing) if the request contains a large `filename` of `.` characters.
## Recommendation
Upgrade to version 1.1.6-alpha.6 or later.
| null |
2020-08-31T18:51:13Z
|
2020-09-03T21:14:12Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/1216'}
| null |
npm
|
GHSA-cwcp-6c48-fm7m
|
Unsafe eval() in summit
|
Affected versions of `summit` allow attackers to execute arbitrary commands via collection names when using the `PouchDB` driver.
## Recommendation
No direct patch is available at this time.
Currently, the best option to mitigate the issue is to avoid using the `PouchDB` driver, as the package author has abandoned this feature entirely.
|
{'CVE-2017-16020'}
|
2020-08-31T18:18:59Z
|
2020-09-01T16:39:38Z
|
MODERATE
| null |
{'CWE-94'}
|
{'https://nodesecurity.io/advisories/315', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16020', 'https://www.npmjs.com/advisories/315', 'https://github.com/notduncansmith/summit/issues/23'}
| null |
npm
|
GHSA-3fr8-mwpp-8h9p
|
Cross-site scripting in TileServer GL
|
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
|
{'CVE-2020-15500'}
|
2021-05-11T19:36:26Z
|
2021-05-17T21:01:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html', 'https://github.com/maptiler/tileserver-gl/issues/461', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15500'}
| null |
npm
|
GHSA-2mhh-w6q8-5hxw
|
Remote Memory Disclosure in ws
|
Versions of `ws` prior to 1.0.1 are affected by a remote memory disclosure vulnerability.
In certain rare circumstances, applications which allow users to control the arguments of a `client.ping()` call will cause `ws` to send the contents of an allocated but non-zero-filled buffer to the server. This may disclose sensitive information that still exists in memory after previous use of the memory for other tasks.
## Proof of Concept
```
var ws = require('ws')
var server = new ws.Server({ port: 9000 })
var client = new ws('ws://localhost:9000')
client.on('open', function () {
console.log('open')
client.ping(50) // this sends a non-zeroed buffer of 50 bytes
client.on('pong', function (data) {
console.log('got pong')
console.log(data) // Data from the client.
})
})
```
## Recommendation
Update to version 1.0.1 or greater.
|
{'CVE-2016-10518'}
|
2020-08-31T18:09:55Z
|
2019-02-18T23:56:42Z
|
LOW
| null |
{'CWE-201'}
|
{'https://nodesecurity.io/advisories/67', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10518', 'https://www.npmjs.com/advisories/67', 'https://github.com/advisories/GHSA-2mhh-w6q8-5hxw', 'https://gist.github.com/c0nrad/e92005446c480707a74a', 'https://github.com/websockets/ws/releases/tag/1.0.1'}
| null |
npm
|
GHSA-xmc8-cjfr-phx3
|
Regular Expression Denial of Service in highcharts
|
Versions of `highcharts` prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 6.1.0 or higher.
|
{'CVE-2018-20801'}
|
2021-09-21T22:36:57Z
|
2019-03-18T15:59:32Z
|
HIGH
| null |
{'CWE-185'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20801', 'https://github.com/advisories/GHSA-xmc8-cjfr-phx3', 'https://www.npmjs.com/advisories/793', 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa', 'https://github.com/highcharts/highcharts', 'https://security.netapp.com/advisory/ntap-20190715-0001/', 'https://snyk.io/vuln/npm:highcharts:20180225'}
| null |
npm
|
GHSA-q8j6-pwqx-pm96
|
Insecure template handling in Squirrelly
|
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
|
{'CVE-2021-32819'}
|
2021-05-17T18:46:59Z
|
2021-05-17T20:58:02Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32819', 'https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/', 'https://www.npmjs.com/package/squirrelly'}
| null |
npm
|
GHSA-6q8q-rvf4-m4pg
|
Downloads Resources over HTTP in dalek-browser-chrome
|
Affected versions of `dalek-browser-chrome` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available - the author of `dalek` recommends [`TestCafé`](http://devexpress.github.io/testcafe/).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10604'}
|
2021-06-11T14:21:03Z
|
2019-02-18T23:50:14Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/199', 'https://github.com/advisories/GHSA-6q8q-rvf4-m4pg', 'https://nodesecurity.io/advisories/199', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10604'}
| null |
npm
|
GHSA-3w76-x94r-pw44
|
Downloads Resources over HTTP in rs-brightcove
|
Affected versions of `rs-brightcove` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `rs-brightcove`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10676'}
|
2021-01-08T20:11:24Z
|
2019-02-18T23:42:16Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/273', 'https://github.com/advisories/GHSA-3w76-x94r-pw44', 'https://nodesecurity.io/advisories/273', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10676'}
| null |
npm
|
GHSA-68gr-cmcp-g3mj
|
Directory Traversal in lactate
|
A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read.
Mitigating factors:
Only files that the user running `lactate` has permission to read will be accessible via this vulnerability.
[Proof of concept](https://hackerone.com/reports/296645):
Please globally install the `lactate` package and `cd` to a directory you wish to serve assets from. Next, run `lactate -p 8081` to start serving files from this location.
The following cURL request can be used to demonstrate this vulnerability by requesting the target `/etc/passwd` file:
```
curl "http://127.0.0.1:8081/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
```
```
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
[...]
```
## Recommendation
As there is currently no fix for this issue selecting an alternative static web server would be the best choice.
| null |
2021-08-16T23:34:10Z
|
2019-06-14T16:39:31Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/npm:lactate:20180123', 'https://www.npmjs.com/advisories/560', 'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5', 'https://hackerone.com/reports/296645'}
| null |
npm
|
GHSA-w4pv-w56c-mg4v
|
Path Traversal in stattic
|
Versions of `stattic` before 0.3.0 are vulnerable to path traversal allowing a remote attacker to read arbitrary files with any extension from the server that users `stattic`.
## Recommendation
Update to version 0.3.0 or later.
|
{'CVE-2018-3734'}
|
2020-08-31T18:29:03Z
|
2018-07-18T21:20:15Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/319003', 'https://github.com/advisories/GHSA-w4pv-w56c-mg4v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3734', 'https://www.npmjs.com/advisories/591'}
| null |
npm
|
GHSA-jc84-3g44-wf2q
|
Denial of Service in ecstatic
|
ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application.
|
{'CVE-2019-10775'}
|
2020-12-15T16:52:06Z
|
2020-12-15T16:52:17Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10775', 'https://snyk.io/vuln/SNYK-JS-ECSTATIC-540354'}
| null |
npm
|
GHSA-2cf2-2383-h4jv
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen
|
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.
|
{'CVE-2020-7600'}
|
2021-07-28T18:46:07Z
|
2021-05-07T16:16:43Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef', 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7600'}
| null |
npm
|
GHSA-xfhp-gmh8-r8v2
|
Regular Expression Denial of Service (ReDoS)
|
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.
|
{'CVE-2021-23354'}
|
2021-03-25T00:17:59Z
|
2021-03-19T21:22:10Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096', 'https://github.com/adaltas/node-printf/pull/32', 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354', 'https://github.com/adaltas/node-printf/issues/31'}
| null |
npm
|
GHSA-7vrq-vg6p-32fw
|
Downloads Resources over HTTP in libxl
|
Affected versions of `libxl` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libxl`.
## Recommendation
The module author recommends installing the bindings using a pinned and verified version of SDK instead of the automated download. More information is available in the modules [README](https://www.npmjs.com/package/libxl).
|
{'CVE-2016-10585'}
|
2021-09-16T20:44:26Z
|
2019-02-18T23:34:48Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nodesecurity.io/advisories/178', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10585', 'https://github.com/advisories/GHSA-7vrq-vg6p-32fw', 'https://github.com/DirtyHairy/node-libxl', 'https://www.npmjs.com/advisories/178'}
| null |
npm
|
GHSA-x9r5-jxvq-4387
|
Self XSS on user input in jquery.terminal
|
### Impact
This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees.
Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because the javascript code inside html attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible.
### Patches
Fixed version 2.31.1
### Workarounds
The user can use formatting that wrap whole user input and it's no op.
```javascript
$.terminal.new_formatter([/([\s\S]+)/g, '[[;;]$1]']);
```
The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).
### References
The issue was reported here [jcubic/jquery.terminal#727](https://github.com/jcubic/jquery.terminal/issues/727)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jcubic/jquery.terminal](https://github.com/jcubic/jquery.terminal)
* Email us at [jcubic@onet.pl](mailto:jcubic@onet.pl)
|
{'CVE-2021-43862'}
|
2022-01-06T19:18:42Z
|
2022-01-06T22:48:56Z
|
LOW
| null |
{'CWE-80'}
|
{'https://github.com/jcubic/jquery.terminal/issues/727', 'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862', 'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5', 'https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1', 'https://github.com/jcubic/jquery.terminal/'}
| null |
npm
|
GHSA-v2jq-9475-r5g8
|
Cross-Site Scripting in bootstrap-tagsinput
|
All versions of `bootstrap-tagsinput` are vulnerable to cross-site scripting when user input is passed into the `itemTitle` parameter unmodified, as the package fails to properly sanitize or encode user input for that parameter.
## Recommendation
This package is not actively maintained, and has not seen an update since 2015.
Because of this, the simplest mitigation is to avoid using the `itemTitle` parameter. With over 200 open issues and over 100 open pull requests as of 2/2018, it seems unlikely that the author has any intention of maintaining the module. If avoiding the use of `itemTitle` indefinitely is acceptable, this is a workable solution. If not, the best available mitigation is to use a fork of the module that is actively maintained and provides similar functionality. There are [many such forks to choose from available on github.](https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/network/members).
|
{'CVE-2016-1000227'}
|
2021-09-23T21:31:28Z
|
2020-09-01T15:29:51Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/bootstrap-tagsinput/bootstrap-tagsinput/issues/501', 'https://www.npmjs.com/advisories/124', 'https://github.com/bootstrap-tagsinput', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000227'}
| null |
npm
|
GHSA-rv49-54qp-fw42
|
Path Traversal in servey
|
Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to the latest version
| null |
2020-08-31T18:36:18Z
|
2019-06-06T15:30:20Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/802', 'https://hackerone.com/reports/355501'}
| null |
npm
|
GHSA-4627-w373-375v
|
Malicious Package in grunt-radical
|
Version 0.0.14 of `grunt-radical` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:06Z
|
2020-09-11T21:22:24Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/935'}
| null |
npm
|
GHSA-r2gr-fhmr-66c5
|
"Arbitrary code execution in socket.io-file"
|
"The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
{'CVE-2020-24807'}
|
2021-04-21T21:00:03Z
|
2021-05-10T18:38:11Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/1564', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://github.com/advisories/GHSA-6495-8jvh-f28x', 'https://www.npmjs.com/package/socket.io-file', 'https://github.com/rico345100/socket.io-file'}
| null |
npm
|
GHSA-m874-69ww-w7jq
|
Directory Traversal in whispercast
|
Affected versions of `whispercast` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16174'}
|
2020-08-31T18:24:12Z
|
2018-07-23T20:45:01Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/whispercast', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16174', 'https://www.npmjs.com/advisories/466', 'https://nodesecurity.io/advisories/466', 'https://github.com/advisories/GHSA-m874-69ww-w7jq'}
| null |
npm
|
GHSA-qw93-45r3-p66p
|
Prototype Pollution in merge-options
|
All versions of `merge-options` are vulnerable to Prototype Pollution
## Recommendation
Update to version 1.0.1 or greater.
|
{'CVE-2018-3752'}
|
2021-09-16T21:10:31Z
|
2018-10-09T00:19:57Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-qw93-45r3-p66p', 'https://www.npmjs.com/advisories/717', 'https://hackerone.com/reports/311336', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3752', 'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4', 'https://github.com/schnittstabil/merge-options'}
| null |
npm
|
GHSA-gxpj-cx7g-858c
|
Regular Expression Denial of Service in debug
|
Affected versions of `debug` are vulnerable to regular expression denial of service when untrusted user input is passed into the `o` formatter.
As it takes 50,000 characters to block the event loop for 2 seconds, this issue is a low severity issue.
## Recommendation
Version 2.x.x: Update to version 2.6.9 or later.
Version 3.x.x: Update to version 3.1.0 or later.
|
{'CVE-2017-16137'}
|
2021-01-08T18:45:03Z
|
2018-08-09T20:18:07Z
|
LOW
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/534', 'https://github.com/advisories/GHSA-gxpj-cx7g-858c', 'https://nodesecurity.io/advisories/534', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16137', 'https://github.com/visionmedia/debug/pull/504', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://github.com/visionmedia/debug/issues/501'}
| null |
npm
|
GHSA-vrxj-4qhw-5vwq
|
Malicious Package in scryptys
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T14:29:03Z
|
2020-09-03T17:03:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1407'}
| null |
npm
|
GHSA-84cm-x2q5-8225
|
Critical severity vulnerability that affects dojox
|
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
|
{'CVE-2018-15494'}
|
2021-09-03T22:57:53Z
|
2018-10-15T22:03:48Z
|
CRITICAL
| null |
{'CWE-116'}
|
{'https://dojotoolkit.org/blog/dojo-1-14-released', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15494', 'https://github.com/advisories/GHSA-84cm-x2q5-8225', 'https://github.com/dojo/dojox/pull/283', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00002.html', 'https://github.com/dojo/dojox'}
| null |
npm
|
GHSA-2r9c-46v3-43fc
|
Downloads Resources over HTTP in haxe3
|
Affected versions of `haxe3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe3`.
## Recommendation
No patch is currently available for this vulnerability. This vulnerability has been left unpatched for several years, despite active maintenance on the package. Because of this, it appears that the package author has accepted the risk, and is unlikely to patch this package in the future.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10688'}
|
2021-01-08T20:59:00Z
|
2018-08-17T20:28:13Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/294', 'https://github.com/advisories/GHSA-2r9c-46v3-43fc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10688', 'https://nodesecurity.io/advisories/294'}
| null |
npm
|
GHSA-vf26-7gjf-f92r
|
OS Command Injection in rpi
|
rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization.
|
{'CVE-2019-10796'}
|
2021-04-08T20:03:52Z
|
2021-04-13T15:23:29Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796', 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}
| null |
npm
|
GHSA-9q5w-79cv-947m
|
Unsafe defaults in `remark-html`
|
### Impact
The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks.
### Patches
The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is now safe by default, and the implementation matches the documentation.
### Workarounds
On older affected versions, pass `sanitize: true`, like so:
```diff
- .use(remarkHtml)
+ .use(remarkHtml, {sanitize: true})
```
### References
n/a
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`remark-html`](https://github.com/remarkjs/remark-html)
* Email us at [security@unifiedjs.com](mailto:security@unifiedjs.com)
|
{'CVE-2021-39199'}
|
2021-09-07T19:05:40Z
|
2021-09-07T23:10:56Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://github.com/remarkjs/remark-html/releases/tag/14.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199', 'https://www.npmjs.com/package/remark-html', 'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1', 'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m', 'https://github.com/remarkjs/remark-html'}
| null |
npm
|
GHSA-8p5p-ff7x-hw7q
|
Cross-Site Scripting in public
|
Versions of `public` prior to 0.1.4 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
Upgrade to version 0.1.4 or later.
|
{'CVE-2018-3747'}
|
2021-09-07T20:23:14Z
|
2018-10-10T17:27:58Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1000', 'https://hackerone.com/reports/329950', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3747', 'https://github.com/advisories/GHSA-8p5p-ff7x-hw7q', 'https://hackerone.com/reports/316346'}
| null |
npm
|
GHSA-vhxc-fhm5-qcp9
|
Prototype Pollution in bodymen
|
The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BODYMEN-548897)
|
{'CVE-2022-25296'}
|
2022-03-18T22:56:29Z
|
2022-03-18T00:01:11Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623', 'https://github.com/diegohaz/bodymen', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296'}
| null |
npm
|
GHSA-mvch-rh6h-2m47
|
Malicious Package in equest
|
All versions of `equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:09:54Z
|
2020-09-11T21:10:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/867'}
| null |
npm
|
GHSA-wjr4-2jgw-hmv8
|
Command Injection in whereis
|
Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`.
## Recommendation
Update to version 0.4.1 or later.
|
{'CVE-2018-3772'}
|
2020-08-31T18:29:33Z
|
2018-07-31T18:28:53Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3772', 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b', 'https://www.npmjs.com/advisories/604', 'https://hackerone.com/reports/319476', 'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8'}
| null |
npm
|
GHSA-x5m8-2r8v-8f97
|
Prototype Pollution in libnested
|
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
|
{'CVE-2022-25352'}
|
2022-03-29T22:05:38Z
|
2022-03-18T00:01:11Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/dominictarr/libnested/blob/master/index.js%23L22', 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1', 'https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25352', 'https://github.com/dominictarr/libnested'}
| null |
npm
|
GHSA-9272-59x2-gwf2
|
Malicious Package in ripedm160
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:04:39Z
|
2020-09-03T17:04:13Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1404'}
| null |
npm
|
GHSA-886v-mm6p-4m66
|
High severity vulnerability that affects gun
|
## Urgent Upgrade
The static file server module included with GUN had a **serious vulnerability**:
- Using `curl --path-as-is` allowed reads on any parent directory or files.
This did not work via the browser or via curl without as-is option.
### Fixed
This has been fixed since version `0.2019.416` and higher.
### Who Was Effected?
Most NodeJS users who use the default setup, such as:
- `npm start`
- `node examples/http.js`
- `Heroku` 1-click-deploy
- `Docker`
- `Now`
If you have a custom NodeJS code then you are probably safe *unless* you have something like `require('http').createServer(Gun.serve(__dirname))` in it.
If you have not upgraded, it is **mandatory** or else it is highly likely your environment variables and AWS (or other) keys could be leaked.
### Credit
It was reported and fixed by [JK0N](https://github.com/amark/gun/pull/527), but I did not understand the `--path-as-is` condition.
Joonas Loppi from [function61](http://function61.com) rediscovered it and explained the urgency to me to fix it.
| null |
2021-09-07T15:24:35Z
|
2019-06-05T09:48:02Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66', 'https://github.com/amark/gun', 'https://github.com/advisories/GHSA-886v-mm6p-4m66'}
| null |
npm
|
GHSA-33f9-j839-rf8h
|
Prototype Pollution in immer
|
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
|
{'CVE-2021-23436'}
|
2021-09-13T20:27:52Z
|
2021-09-02T17:17:37Z
|
CRITICAL
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/immerjs/immer', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237', 'https://snyk.io/vuln/SNYK-JS-IMMER-1540542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266'}
| null |
npm
|
GHSA-pgh6-m65r-2rhq
|
DOS and Open Redirect with user input
|
### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.
A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is "http://localhost:3000//^/.."`
The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
### Patches
The issue has been patched in `fastify-static@4.4.1`
### Workarounds
If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
### References
+ Bug founder: drstrnegth
+ [hackerone Report](https://hackerone.com/reports/1361804)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
|
{'CVE-2021-22964'}
|
2021-10-21T14:57:14Z
|
2021-10-12T16:04:17Z
|
HIGH
| null |
{'CWE-248', 'CWE-601'}
|
{'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964', 'https://hackerone.com/reports/1361804', 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4', 'https://github.com/fastify/fastify-static'}
| null |
npm
|
GHSA-qh7x-j4v8-qw5w
|
Clipboard-based XSS
|
### Impact
XSS against the user.
### Details
jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS.
### References
The Curious Case of Copy & Paste – on risks of pasting arbitrary content in browsers: https://research.securitum.com/the-curious-case-of-copy-paste/
|
{'CVE-2021-41086'}
|
2021-10-21T14:19:54Z
|
2021-09-22T20:39:26Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/jsuites/jsuites/', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2', 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086', 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://www.npmjs.com/package/jsuites'}
| null |
npm
|
GHSA-v9w2-v7j9-rjpr
|
Remote code execution in Eclipse Theia
|
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.
|
{'CVE-2021-34435'}
|
2021-09-13T20:27:30Z
|
2021-09-02T22:02:36Z
|
HIGH
| null |
{'CWE-942', 'CWE-668'}
|
{'https://github.com/eclipse-theia/theia/pull/8759', 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34435', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018', 'https://github.com/eclipse-theia/theia'}
| null |
npm
|
GHSA-333w-rxj3-f55r
|
Regular Expression Denial Of Service in uri-js
|
Affected versions of `uri-js` is susceptible to a regular expression denial of service vulnerability when user input is sent to the `.parse()` method.
## Recommendation
Update to v3.0.0 or later.
|
{'CVE-2017-16021'}
|
2020-08-31T18:10:51Z
|
2018-07-24T20:00:30Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16021', 'https://nodesecurity.io/advisories/100', 'https://github.com/advisories/GHSA-333w-rxj3-f55r', 'https://github.com/garycourt/uri-js/issues/12', 'https://www.npmjs.com/advisories/100'}
| null |
npm
|
GHSA-cfxm-4p54-5w7h
|
Directory traversal in pooledwebsocket
|
Affected versions of `pooledwebsocket` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
Update to version 0.0.19 or later.
|
{'CVE-2017-16107'}
|
2020-08-31T18:19:56Z
|
2018-07-24T00:20:57Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-cfxm-4p54-5w7h', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16107', 'https://www.npmjs.com/advisories/341', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pooledwebsocket', 'https://nodesecurity.io/advisories/341'}
| null |
npm
|
GHSA-7543-mr7h-6v86
|
Improper Authorization in googleapis
|
Versions of `googleapis` prior to 39.1.0 are vulnerable to Improper Authorization. Setting credentials to one client may apply to all clients which may cause requests to be sent with the incorrect credentials.
## Recommendation
Upgrade to version 39.1.0.
| null |
2021-09-27T16:15:52Z
|
2020-09-02T16:00:26Z
|
HIGH
| null |
{'CWE-285'}
|
{'https://github.com/googleapis/google-api-nodejs-client/issues/1594', 'https://github.com/googleapis/google-api-nodejs-client', 'https://www.npmjs.com/advisories/791'}
| null |
npm
|
GHSA-9xr8-8hmc-389f
|
Cross-Site Scripting in vant
|
Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.1.8 or later.
| null |
2021-08-18T22:47:15Z
|
2019-11-22T13:45:33Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a', 'https://snyk.io/vuln/SNYK-JS-VANT-460461', 'https://github.com/youzan/vant/issues/4270', 'https://www.npmjs.com/advisories/1157'}
| null |
npm
|
GHSA-r2vw-jgq9-jqx2
|
Improper Authorization in @sap-cloud-sdk/core
|
Affected versions of `@sap-cloud-sdk/core` do not properly validate JWTs. The `verifyJwt()` function does not properly validate the URL from where the public verification key for the JWT can be downloaded. Any URL was trusted which makes it possible to provide a URL belonging to a manipulated JWT.
## Recommendation
Upgrade to version 1.21.2 or later.
| null |
2020-08-31T19:02:48Z
|
2020-09-03T15:54:11Z
|
HIGH
| null |
{'CWE-285'}
|
{'https://www.npmjs.com/advisories/1540'}
| null |
npm
|
GHSA-5rqg-jm4f-cqx7
|
Infinite loop causing Denial of Service in colors
|
colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomized characters to console and an infinite loop resulting in unbound system resource consumption.
Users of colors relying on these specific versions should downgrade to version 1.4.0.
| null |
2022-01-10T19:56:36Z
|
2022-01-10T17:29:53Z
|
HIGH
| null |
{'CWE-835'}
|
{'https://github.com/Marak/colors.js', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26', 'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'}
| null |
npm
|
GHSA-frpw-jrwx-hcfv
|
Path Traversal in node-red-contrib-huemagic
|
node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file.
|
{'CVE-2021-25864'}
|
2021-04-05T23:24:50Z
|
2021-04-13T15:30:00Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25864', 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}
| null |
npm
|
GHSA-jwjq-vp53-ph6m
|
Directory Traversal in pytservce
|
Affected versions of `pytservce` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16195'}
|
2020-08-31T18:23:02Z
|
2020-09-01T18:21:44Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/pytservce', 'https://nodesecurity.io/advisories/435', 'https://www.npmjs.com/advisories/435', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16195'}
| null |
npm
|
GHSA-mmqv-m45h-q2hp
|
Sandbox Breakout / Arbitrary Code Execution in localeval
|
All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload
```
constructor.constructor("return process.env")()
```
returns the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2022-03-14T23:59:01Z
|
2020-09-04T15:22:40Z
|
CRITICAL
| null | null |
{'https://github.com/espadrine/localeval', 'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/issues/9', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335'}
| null |
npm
|
GHSA-37q6-576q-vgr7
|
Missing Origin Validation in parcel-bundler
|
Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Update to version 1.10.0 or later.
|
{'CVE-2018-14731'}
|
2021-08-31T20:51:48Z
|
2018-10-30T20:36:53Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/parcel-bundler/parcel/issues/1783', 'https://github.com/parcel-bundler/parcel/pull/1794', 'https://github.com/advisories/GHSA-37q6-576q-vgr7', 'https://www.npmjs.com/advisories/721', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://github.com/parcel-bundler/parcel', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14731'}
| null |
npm
|
GHSA-9gxr-rhx6-4jgv
|
Sandbox Breakout / Prototype Pollution in notevil
|
Versions of `notevil` prior to 1.3.3 are vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing attacker to add or modify an object's prototype.
Evaluating the payload ```try{a[b];}catch(e){e.constructor.constructor('return __proto__.arguments.callee.__proto__.polluted=true')()}``` add the `polluted` property to Function.
## Recommendation
Upgrade to version 1.3.3 or later.
| null |
2020-08-31T18:55:36Z
|
2020-09-04T15:18:57Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1338'}
| null |
npm
|
GHSA-gg96-f8wr-p89f
|
Script injection
|
### Impact
A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page.
The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store.
### Patches
The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-32661'}
|
2021-06-04T19:22:48Z
|
2021-06-04T19:09:26Z
|
MODERATE
| null |
{'CWE-77', 'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32661', 'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
| null |
npm
|
GHSA-r742-7j4h-hjr8
|
Malicious Package in arsenic-tabasco-cyborg-peanut-butter
|
All versions of `arsenic-tabasco-cyborg-peanut-butter` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T17:07:41Z
|
2020-09-03T23:27:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1313'}
| null |
npm
|
GHSA-f8h3-rqrm-47v9
|
Prototype Pollution in smart-extend
|
All versions of `smart-extend` are vulnerable to Prototype Pollution. The `deep()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:36:15Z
|
2020-09-02T16:02:40Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://hackerone.com/reports/438274', 'https://www.npmjs.com/advisories/801'}
| null |
npm
|
GHSA-2m39-62fm-q8r3
|
Regular Expression Denial of Service in sshpk
|
Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
## Recommendation
Update to version 1.13.2, 1.14.1 or later.
|
{'CVE-2018-3737'}
|
2020-08-31T18:29:38Z
|
2018-08-15T13:22:23Z
|
HIGH
| null |
{'CWE-770'}
|
{'https://hackerone.com/reports/319593', 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17', 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737', 'https://www.npmjs.com/advisories/606', 'https://github.com/advisories/GHSA-2m39-62fm-q8r3'}
| null |
npm
|
GHSA-cgpp-wm2h-6hqx
|
SQL Injection in waterline-sequel
|
Affected versions of `waterline-sequel` are vulnerable to SQL injection in cases where user input is passed into the `like`, `contains`, `startsWith`, or `endsWith` methods.
## Recommendation
Upgrade to at least version 0.5.1
|
{'CVE-2016-10551'}
|
2020-08-31T18:11:18Z
|
2019-02-18T23:54:28Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/balderdashy/waterline-sequel/pull/66', 'https://www.npmjs.com/advisories/115', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10551', 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530', 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx', 'https://nodesecurity.io/advisories/115'}
| null |
npm
|
GHSA-pgr8-jg6h-8gw6
|
Cross-Site Scripting in webpack-bundle-analyzer
|
Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to version 3.3.2 or later.
| null |
2021-08-04T15:26:36Z
|
2019-05-23T09:26:20Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/826', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264', 'https://snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190'}
| null |
npm
|
GHSA-3wqh-h42r-x8fq
|
Denial of Service in @hapi/subtext
|
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 6.1.3 or 7.0.3
| null |
2020-08-31T19:00:42Z
|
2020-09-03T15:46:22Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1476'}
| null |
npm
|
GHSA-x52f-h74p-9jh8
|
Hijacked Environment Variables in node-sqlite
|
The `node-sqlite` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16048'}
|
2021-06-10T19:38:19Z
|
2018-07-23T21:00:07Z
|
HIGH
| null |
{'CWE-506', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16048', 'https://github.com/advisories/GHSA-x52f-h74p-9jh8', 'https://nodesecurity.io/advisories/493', 'https://www.npmjs.com/advisories/493'}
| null |
npm
|
GHSA-j866-8vxx-27hx
|
Hijacked Environment Variables in nodemailer.js
|
The `nodemailer.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16072'}
|
2020-08-31T18:25:54Z
|
2018-08-29T23:43:53Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-j866-8vxx-27hx', 'https://www.npmjs.com/advisories/511', 'https://nodesecurity.io/advisories/511', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16072'}
| null |
npm
|
GHSA-7cvf-p83w-48q6
|
Malicious Package in beffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:22:59Z
|
2020-09-03T21:37:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1229'}
| null |
npm
|
GHSA-r96c-57pf-9jjm
|
Prototype Pollution in node.extend
|
Versions of `node.extend` before 1.1.7 or 2.0.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 1.1.7, 2.0.1 or later.
|
{'CVE-2018-16491'}
|
2020-08-31T18:35:31Z
|
2019-02-07T18:17:34Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16491', 'https://github.com/advisories/GHSA-r96c-57pf-9jjm', 'https://www.npmjs.com/advisories/781', 'https://hackerone.com/reports/430831'}
| null |
npm
|
GHSA-2g8g-63j4-9w3r
|
RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend
|
The templating library used by the scaffolder backend assumes that templates are trusted which is an undesired property of the scaffolder-backend. This has now been mitigated by sandboxing the template code execution.
### Impact
A malicious actor with write access to a registered scaffolder template could manipulate the template in a way that allows for remote code execution on the scaffolder-backend instance. This was only exploitable in the template yaml definition itself and not by user input data.
### Patches
This is vulnerability is patched in version `0.15.14` of `@backstage/plugin-scaffolder-backend`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
| null |
2021-11-29T19:39:57Z
|
2021-12-01T18:29:12Z
|
HIGH
| null | null |
{'https://github.com/backstage/backstage', 'https://github.com/backstage/backstage/security/advisories/GHSA-2g8g-63j4-9w3r'}
| null |
npm
|
GHSA-p5p2-rhc3-wmf3
|
Malicious Package in siganle
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:40:00Z
|
2020-09-03T17:03:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1409'}
| null |
npm
|
GHSA-fg6m-q92x-vv38
|
Directory Traversal in dcserver
|
Affected versions of `dcserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16158'}
|
2020-08-31T18:21:36Z
|
2020-09-01T17:26:00Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/393', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://nodesecurity.io/advisories/393', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16158'}
| null |
npm
|
GHSA-8p2p-p8mg-x3cw
|
Insight API transaction broadcast endpoint can result in Full Path Disclosure
|
Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request.
|
{'CVE-2018-1000023'}
|
2022-04-25T22:32:08Z
|
2018-03-05T19:33:54Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000023', 'https://github.com/bitpay/insight-api/issues/542', 'https://github.com/advisories/GHSA-8p2p-p8mg-x3cw', 'https://github.com/bitpay/insight-api'}
| null |
npm
|
GHSA-wrw9-m778-g6mc
|
Memory Exposure in bl
|
Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure.
`bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory
## Recommendation
Update to version 0.9.5, 1.0.1 or later.
| null |
2020-08-31T18:29:15Z
|
2019-06-03T17:27:57Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/rvagg/bl/pull/22', 'https://www.npmjs.com/advisories/596'}
| null |
npm
|
GHSA-894f-rw44-qrw5
|
Hijacked Environment Variables in mongose
|
The `mongose` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16077'}
|
2020-08-31T18:26:06Z
|
2018-10-10T17:28:21Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-894f-rw44-qrw5', 'https://nodesecurity.io/advisories/516', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16077', 'https://www.npmjs.com/advisories/516'}
| null |
npm
|
GHSA-4v2c-g2xc-47fv
|
Downloads Resources over HTTP in massif
|
Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10682'}
|
2021-01-08T19:53:43Z
|
2019-02-18T23:54:38Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/290', 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv', 'https://www.npmjs.com/advisories/290', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}
| null |
npm
|
GHSA-cr6m-62pq-hmqh
|
OS Command injection in npm-lockfile
|
npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5.
|
{'CVE-2022-0841'}
|
2022-04-04T21:37:38Z
|
2022-03-04T00:00:18Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0841', 'https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1', 'https://github.com/ljharb/npm-lockfile'}
| null |
npm
|
GHSA-mvmf-cvfx-qg55
|
Regular Expression Denial of Service in bleach
|
All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function.
## Recommendation
The `bleach` package is not currently maintained, and has not seen an update since 2014.
To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal).
|
{'CVE-2014-8881'}
|
2021-09-23T21:06:09Z
|
2020-09-01T15:16:43Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/npm:bleach:20151024', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8881', 'https://www.npmjs.com/advisories/47'}
| null |
npm
|
GHSA-3cjv-4phw-gvvv
|
Malicious Package in getcookies
|
The `getcookies` module contained a backdoor that would allow for a remote attacker to execute arbitrary commands on the system running the malicious module.
## Recommendation
This module should be uninstalled if found used within an application. In addition to removing the installed module, you will also want to evaluate your application to determine whether or not user data or systems were compromised.
| null |
2021-10-01T13:25:15Z
|
2020-09-01T20:39:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/649'}
| null |
npm
|
GHSA-8f64-q7jc-ccgp
|
Cross-Site Scripting in metascraper
|
Versions of `metascraper` prior to 5.3.0 are vulnerable to stored cross-site scripting (XSS).
## Recommendation
Upgrade to version 5.3.0 or later.
|
{'CVE-2018-3773'}
|
2020-08-31T18:29:31Z
|
2018-08-08T22:25:57Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3773', 'https://hackerone.com/reports/309367', 'https://github.com/advisories/GHSA-8f64-q7jc-ccgp', 'https://www.npmjs.com/advisories/603'}
| null |
npm
|
GHSA-c6rq-rjc2-86v2
|
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
|
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
|
{'CVE-2017-18869'}
|
2021-05-12T20:23:29Z
|
2022-02-10T23:33:39Z
|
LOW
| null |
{'CWE-367'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1611614', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18869', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985', 'https://snyk.io/vuln/npm:chownr:20180731', 'https://github.com/isaacs/chownr/issues/14'}
| null |
npm
|
GHSA-2777-2vq8-c4v4
|
SQL Injection in sequelize
|
Versions of `sequelize` prior to 5.3.0 (excluding v3 and v4) are vulnerable to SQL Injection. PostgreSQL option`standard_conforming_strings` is not set to `on` by default, which may allow attackers to inject SQL statements due to poor handling of backslashes in string literals.
## Recommendation
Upgrade to version 5.3.0 or later.
|
{'CVE-2019-11069'}
|
2021-08-30T16:08:57Z
|
2019-04-11T16:33:17Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174167', 'https://www.npmjs.com/advisories/821', 'https://github.com/sequelize/sequelize/pull/10746/files', 'https://github.com/advisories/GHSA-2777-2vq8-c4v4', 'https://github.com/sequelize/sequelize', 'https://github.com/sequelize/sequelize/releases/tag/v5.3.0', 'https://github.com/sequelize/sequelize/pull/10746', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11069', 'https://github.com/sequelize/sequelize/blob/98cb17c17f73e2aa1792aa5a1d31216ba984b456/lib/dialects/postgres/connection-manager.js#L158-L160'}
| null |
npm
|
GHSA-7xcx-6wjh-7xp2
|
Command Injection in standard-version
|
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111`
The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version).
## Summary
The `standardVersion` function has a command injection vulnerability. Clients of the `standard-version` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
## Product
Standard Version
## Tested Version
Commit [2f04ac8](https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9/)
## Details
### Issue 1: Command injection in `standardVersion`
The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
```
npm install standard-version
git init
echo "foo" > foo.txt # the git repo has to be non-empty
git add foo.txt
git commit -am "initial commit"
```
Now create a file with the following contents:
```
var fs = require("fs");
// setting up a bit of environment
fs.writeFileSync("package.json", '{"name": "foo", "version": "1.0.0"}');
const standardVersion = require('standard-version')
standardVersion({
noVerify: true,
infile: 'foo.txt',
releaseCommitMessageFormat: "bla `touch exploit`"
})
```
and run it:
```
node test.js
```
Notice that a file named `exploit` has been created.
This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples:
[CVE-2020-7646](https://github.com/advisories/GHSA-m8xj-5v73-3hh8),
[CVE-2020-7614](https://github.com/advisories/GHSA-426h-24vj-qwxf),
[CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh),
[CVE-2019-10778](https://github.com/advisories/GHSA-4gp3-p7ph-x2jr),
[CVE-2019-10776](https://github.com/advisories/GHSA-84cm-v6jp-gjmr),
[CVE-2018-16462](https://github.com/advisories/GHSA-9jm3-5835-537m),
[CVE-2018-16461](https://github.com/advisories/GHSA-7g2w-6r25-2j7p),
[CVE-2018-16460](https://github.com/advisories/GHSA-cfhg-9x44-78h2),
[CVE-2018-13797](https://github.com/advisories/GHSA-pp57-mqmh-44h7),
[CVE-2018-3786](https://github.com/advisories/GHSA-c9j3-wqph-5xx9),
[CVE-2018-3772](https://github.com/advisories/GHSA-wjr4-2jgw-hmv8),
[CVE-2018-3746](https://github.com/advisories/GHSA-3pxp-6963-46r9),
[CVE-2017-16100](https://github.com/advisories/GHSA-jcw8-r9xm-32c6),
[CVE-2017-16042](https://github.com/advisories/GHSA-qh2h-chj9-jffq).
We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `standard-version` project [here](https://lgtm.com/query/237522640229151035/).
#### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
#### Remediation
We recommend not using an API that can interpret a string as a shell command. For example, use [`child_process.execFile`](https://nodejs.org/api/child_process.html#child_process_child_process_execfile_file_args_options_callback) instead of [`child_process.exec`](https://nodejs.org/api/child_process.html#child_process_child_process_exec_command_options_callback).
## Credit
This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
## Contact
You can contact the GHSL team at `securitylab@github.com`, please include `GHSL-2020-111` in any communication regarding this issue.
## Disclosure Policy
This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/disclosures#policy).
| null |
2021-09-22T21:03:04Z
|
2020-07-13T21:34:59Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9', 'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2', 'https://github.com/conventional-changelog/standard-version'}
| null |
npm
|
GHSA-5f38-9jw2-6r6h
|
Cross-site Scripting in teddy
|
Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).
|
{'CVE-2021-23447'}
|
2022-05-04T03:42:48Z
|
2021-10-12T16:22:04Z
|
MODERATE
| null |
{'CWE-79', 'CWE-843'}
|
{'https://github.com/rooseveltframework/teddy', 'https://github.com/rooseveltframework/teddy/pull/518', 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557', 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0', 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447'}
| null |
npm
|
GHSA-xh56-3f5w-9h25
|
Hijacked Environment Variables in nodemailer-js
|
The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16071'}
|
2020-08-31T18:25:52Z
|
2018-08-29T23:40:01Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-xh56-3f5w-9h25', 'https://nodesecurity.io/advisories/510', 'https://www.npmjs.com/advisories/510', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071'}
| null |
npm
|
GHSA-cjj8-wfrx-jqcf
|
Cross-Site Scripting (XSS) in pivottable
|
Affected versions of `pivottable` are vulnerable to cross-site scripting, due to a new mechanism used to render JSON elements.
## Recommendation
Update to version 2.0.0 or later.
|
{'CVE-2016-1000241'}
|
2021-09-23T21:36:34Z
|
2020-09-01T16:00:18Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000241', 'https://www.npmjs.com/advisories/139', 'https://github.com/nicolaskruchten/pivottable/pull/401', 'https://github.com/nicolaskruchten/pivottable'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.