ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-6xhg-q9c8-rj32
|
Credential leak in react-native-fast-image
|
This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
|
{'CVE-2020-7696'}
|
2021-05-10T21:06:00Z
|
2021-05-18T01:52:54Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228', 'https://github.com/DylanVann/react-native-fast-image/issues/690', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696', 'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624', 'https://github.com/DylanVann/react-native-fast-image/pull/691'}
| null |
npm
|
GHSA-9h4g-27m8-qjrg
|
Path Traversal in socket.io-file
|
All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on the server by sending relative paths on the `name` value, such as `../../test.js`. The `uploadDir` and `rename` options can be used to define the file upload path.
|
{'CVE-2020-15779'}
|
2021-09-22T20:28:29Z
|
2020-07-07T19:24:47Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1519', 'https://www.npmjs.com/package/socket.io-file', 'https://github.com/rico345100/socket.io-file', 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779'}
| null |
npm
|
GHSA-33gc-f8v9-v8hm
|
Malicious Package in ladder-text-js
|
`ladder-text-js` contained a malicious script that attempted to delete all files when `npm test` was run.
## Recommendation
This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
| null |
2021-10-01T13:27:36Z
|
2020-09-01T20:41:40Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/651'}
| null |
npm
|
GHSA-vr98-27qj-3c8q
|
Directory traversal in rollup-plugin-server
|
This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in readFile operation inside the readFileFromContentBase function.
|
{'CVE-2020-7686'}
|
2021-09-23T17:34:45Z
|
2020-07-29T18:07:35Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7686', 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124'}
| null |
npm
|
GHSA-37hx-4mcq-wc3h
|
Weak Password Recovery Mechanism for Forgotten Password in Strapi
|
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
|
{'CVE-2021-28128'}
|
2021-10-06T14:09:30Z
|
2021-10-06T17:48:16Z
|
HIGH
| null |
{'CWE-640'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28128', 'https://github.com/strapi/strapi/issues/9657', 'https://strapi.io/changelog', 'https://github.com/strapi/strapi', 'https://github.com/strapi/strapi/releases', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt'}
| null |
npm
|
GHSA-6m4r-m3gc-h4r5
|
OS Command Injection in install-package
|
install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
|
{'CVE-2020-7629'}
|
2021-07-28T22:39:48Z
|
2022-02-10T23:48:06Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7629', 'https://github.com/1000ch/install-package/blob/master/index.js#L82,', 'https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267'}
| null |
npm
|
GHSA-3p92-886g-qxpq
|
Remote Memory Exposure in floody
|
Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure.
.write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory.
Proof of Concept:
```
var f = require('floody')(process.stdout);
f.write(USERSUPPLIEDINPUT);
'f.stop();
## Recommendation
Update to version 0.1.1 or later.
| null |
2021-08-04T21:27:04Z
|
2019-06-04T15:42:32Z
|
MODERATE
| null |
{'CWE-201'}
|
{'https://www.npmjs.com/advisories/601', 'https://snyk.io/vuln/npm:floody:20160115', 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'}
| null |
npm
|
GHSA-f98m-q3hr-p5wq
|
Prototype Pollution in locutus
|
All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function.
|
{'CVE-2020-7719'}
|
2021-12-14T15:33:28Z
|
2021-05-06T18:12:22Z
|
CRITICAL
| null |
{'CWE-915', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7719', 'https://github.com/kvz/locutus/pull/418/', 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675', 'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f', 'https://github.com/kvz/locutus'}
| null |
npm
|
GHSA-xwjh-cp99-cj8q
|
Path Traversal in cordova-plugin-ionic-webview
|
Versions of `cordova-plugin-ionic-webview` prior to 2.2.0 are vulnerable to Path Traversal, allowing attackers access to OS local files that should be inaccessible by third-party applications. The package launches a webserver listening on http://localhost:8080 without restricting access of the app itself, thus escaping the iOS application sandbox and accessing local files.
## Recommendation
Upgrade to version 2.2.0
|
{'CVE-2018-16202'}
|
2021-09-22T18:20:58Z
|
2019-02-12T15:36:35Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xwjh-cp99-cj8q', 'https://www.npmjs.com/advisories/746', 'http://jvn.jp/en/jp/JVN60497148/index.html', 'https://github.com/ionic-team/cordova-plugin-ionic-webview', 'https://jvn.jp/en/jp/JVN69812763/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16202'}
| null |
npm
|
GHSA-4w97-57v2-3w44
|
False-negative validation results in MINT transactions with invalid baton
|
### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton.
### Patches
npm package [slp-validate](https://www.npmjs.com/package/slp-validate) has been patched and published as version 1.2.1.
### Workarounds
Upgrade to slp-validate 1.2.1.
### References
* slp-validate [commit](https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues)
|
{'CVE-2020-11072'}
|
2021-01-08T20:17:36Z
|
2020-05-12T00:45:24Z
|
CRITICAL
| null |
{'CWE-697'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11072', 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44'}
| null |
npm
|
GHSA-22cm-3qf2-2wc7
|
LDAP Injection in is-user-valid
|
All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.
|
{'CVE-2021-23335'}
|
2021-04-01T23:39:38Z
|
2021-04-13T15:30:27Z
|
HIGH
| null |
{'CWE-74', 'CWE-90'}
|
{'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}
| null |
npm
|
GHSA-jc83-cpf9-q7c6
|
False-negative validation results in MINT transactions with invalid baton
|
### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton.
### Patches
npm package [slpjs](https://www.npmjs.com/package/slpjs) has been patched and published as version 0.27.2.
### Workarounds
Upgrade to slpjs 0.27.2.
### References
* slpjs [commit](https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues) or [slpjs](https://github.com/simpleledger/slpjs/issues)
|
{'CVE-2020-11071'}
|
2021-01-08T20:17:31Z
|
2020-05-12T00:39:03Z
|
CRITICAL
| null |
{'CWE-697'}
|
{'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11071'}
| null |
npm
|
GHSA-6xv6-jpvw-cx6q
|
Command injection in bestzip
|
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.
|
{'CVE-2020-7730'}
|
2021-05-04T22:37:03Z
|
2021-05-06T18:27:36Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7730', 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'}
| null |
npm
|
GHSA-92v9-xh2q-fq9f
|
Prototype Pollution in @cookiex/deep
|
The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object.
|
{'CVE-2021-23442'}
|
2021-09-20T20:12:20Z
|
2021-09-20T20:12:38Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793', 'https://github.com/tony-tsx/cookiex-deep/issues/1', 'https://github.com/tony-tsx/cookiex-deep', 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442'}
| null |
npm
|
GHSA-39cx-xcwj-3rc4
|
Cross-Site Scripting in dojo
|
Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized.
## Recommendation
Update to version 1.1 or later.
|
{'CVE-2008-6681'}
|
2020-08-31T18:11:03Z
|
2020-09-01T15:25:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/107', 'http://trac.dojotoolkit.org/ticket/2140', 'https://bugs.dojotoolkit.org/ticket/2140', 'http://www.securityfocus.com/bid/34661', 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883', 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'}
| null |
npm
|
GHSA-f794-r6xc-hf3v
|
Improper Access Control in passport-oauth2
|
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.
|
{'CVE-2021-41580'}
|
2021-10-06T13:23:09Z
|
2021-09-29T17:18:32Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1', 'https://github.com/jaredhanson/passport-oauth2/pull/144', 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea', 'https://github.com/jaredhanson/passport-oauth2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41580', 'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262'}
| null |
npm
|
GHSA-m734-r4g6-34f9
|
NoSQL Injection in loopback-connector-mongodb
|
Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection.
MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a filter to execute JavaScript (client can pass in a malicious script) on the database Driver. This is an [intended feature of MongoDB](https://docs.mongodb.com/manual/core/server-side-javascript/) unless disabled ([instructions here](https://docs.mongodb.com/manual/core/server-side-javascript/#disable-server-side-js)).
A proof of concept malicious query:
```
GET /POST filter={"where": {"$where": "function(){sleep(5000); return this.title.contains('Hello');}"}}
```
The above makes the database sleep for 5 seconds and then returns all “Posts” with the title containing the word `Hello`.
## Recommendation
Update to version 3.6.0 or later.
| null |
2021-08-04T20:47:58Z
|
2019-06-04T19:36:17Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/strongloop/loopback-connector-mongodb/issues/403', 'https://www.npmjs.com/advisories/696', 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html', 'https://github.com/strongloop/loopback-connector-mongodb/pull/452', 'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'}
| null |
npm
|
GHSA-rrj3-qmh8-72pf
|
Sensitive Data In Log Files in grunt-gh-pages
|
Versions of `grunt-gh-pages` prior to 1.0.0 are affected by a vulnerability which may cause unencrypted github credentials to be written to a log file in certain circumstances.
In the `grunt-gh-pages` deployment scenario where authentication is performed by injecting a github token directly into the auth portion of the URL, `grunt-gh-pages` will write the token to a log file, unencrypted.
## Recommendation
Update to version 1.0.0 or later.
|
{'CVE-2016-10526'}
|
2020-08-31T18:10:15Z
|
2019-02-18T23:39:11Z
|
MODERATE
| null |
{'CWE-391'}
|
{'https://github.com/tschaub/grunt-gh-pages/pull/41', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10526', 'https://www.npmjs.com/advisories/85', 'https://github.com/advisories/GHSA-rrj3-qmh8-72pf', 'https://nodesecurity.io/advisories/85'}
| null |
npm
|
GHSA-hm6q-r2jc-cpqh
|
Malicious Package in lodahs
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
{'CVE-2019-19771'}
|
2021-07-28T16:49:22Z
|
2019-12-16T19:29:33Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19771', 'https://www.npmjs.com/package/lodahs', 'https://www.npmjs.com/advisories/1417'}
| null |
npm
|
GHSA-wjf2-7f9g-86f5
|
Malicious Package in fast-requests
|
All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
| null |
2021-09-30T20:05:43Z
|
2020-09-03T18:23:38Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1086'}
| null |
npm
|
GHSA-xmxh-g7wj-8m4m
|
OS Command Injection in curling
|
npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
|
{'CVE-2019-10789'}
|
2021-04-13T15:32:15Z
|
2021-04-13T15:32:26Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10789', 'https://snyk.io/vuln/SNYK-JS-CURLING-546484'}
| null |
npm
|
GHSA-g2pf-qjgf-6fw3
|
Downloads Resources over HTTP in openframe-glslviewer
|
Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`.
## Recommendation
No patch is currently available for this vulnerability, and the package hasn't been updated since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10607'}
|
2021-09-16T20:41:43Z
|
2019-02-18T23:33:42Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://www.npmjs.com/advisories/208', 'https://github.com/OpenframeProject/Openframe-glslViewer', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10607', 'https://nodesecurity.io/advisories/208', 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3'}
| null |
npm
|
GHSA-769c-qphh-g3wm
|
Downloads Resources over HTTP in macaca-chromedriver
|
Affected versions of `macaca-chromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver`.
## Recommendation
Update to version 1.0.29 or later.
|
{'CVE-2016-10586'}
|
2021-01-08T20:58:40Z
|
2019-02-18T23:51:09Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-769c-qphh-g3wm', 'https://www.npmjs.com/advisories/180', 'https://nodesecurity.io/advisories/180', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10586'}
| null |
npm
|
GHSA-6p48-xfj3-jw67
|
Downloads Resources over HTTP in fibjs
|
Affected versions of `fibjs` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fibjs`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10621'}
|
2021-01-08T19:21:01Z
|
2019-02-18T23:56:54Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10621', 'https://www.npmjs.com/advisories/217', 'https://nodesecurity.io/advisories/217', 'https://github.com/advisories/GHSA-6p48-xfj3-jw67'}
| null |
npm
|
GHSA-5q6m-3h65-w53x
|
Improper Neutralization of Special Elements used in an OS Command.
|
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
|
{'CVE-2021-24033'}
|
2021-03-11T22:25:51Z
|
2021-03-11T22:26:09Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://www.facebook.com/security/advisories/cve-2021-24033', 'https://github.com/facebook/create-react-app/pull/10644', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}
| null |
npm
|
GHSA-p32g-242c-76h3
|
Malicious Package in geoheat
|
Version 1.3.2 of `geoheat` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:40:59Z
|
2020-09-11T21:14:49Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/932'}
| null |
npm
|
GHSA-qwj8-p662-3m7x
|
Path Traversal in localhost-now
|
All versions of `localhost-now` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5416'}
|
2020-08-31T18:43:49Z
|
2019-03-25T16:17:05Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5416', 'https://www.npmjs.com/advisories/1005', 'https://github.com/advisories/GHSA-qwj8-p662-3m7x', 'https://hackerone.com/reports/334837'}
| null |
npm
|
GHSA-7jfh-2xc9-ccv7
|
Cross-Site Scripting in public
|
All versions of `public` are vulnerable to stored cross-site scripting (XSS).
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
| null |
2020-08-31T18:29:45Z
|
2019-05-31T23:46:40Z
|
LOW
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/609', 'https://hackerone.com/reports/316346'}
| null |
npm
|
GHSA-xg5r-8j97-2wrj
|
Directory Traversal in restafary
|
Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration.
Proof of Concept
```
curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd'
```
## Recommendation
Update to version 1.6.1 or later.
|
{'CVE-2016-10528'}
|
2020-08-31T18:10:25Z
|
2019-02-18T23:39:22Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xg5r-8j97-2wrj', 'https://www.npmjs.com/advisories/89', 'https://nodesecurity.io/advisories/89', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10528'}
| null |
npm
|
GHSA-79mx-88w7-8f7q
|
XSS Filter Bypass via Encoded URL in validator
|
Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability.
## Proof of Concept
The xss() function removes the word "javascript" when contained inside an attribute.
However, it does not properly handle cases where characters have been hex-encoded.
As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript.
For example:
```<a href="javascript:...">abc</a>```
will render as:
```<a href="javascript:...">abc</a>```
## Recommendation
The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application.
In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality.
|
{'CVE-2014-9772'}
|
2021-09-02T21:06:02Z
|
2018-11-06T23:12:49Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-9772', 'https://nodesecurity.io/advisories/43', 'http://www.securityfocus.com/bid/97102', 'https://github.com/advisories/GHSA-79mx-88w7-8f7q', 'https://github.com/chriso/validator.js', 'https://www.npmjs.com/advisories/43', 'https://github.com/chriso/validator.js/issues/181', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-v2p6-4mp7-3r9v
|
Regular Expression Denial of Service in underscore.string
|
Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS).
The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs.
## Recommendation
Upgrade to version 3.3.5 or higher.
| null |
2020-08-31T18:34:16Z
|
2019-06-14T16:26:22Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/epeli/underscore.string/pull/517', 'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/issues/510', 'https://www.npmjs.com/advisories/745'}
| null |
npm
|
GHSA-ph32-23p8-9rw5
|
Improper Input Validation in network-manager
|
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
|
{'CVE-2019-10786'}
|
2021-07-28T18:30:26Z
|
2021-04-13T15:17:45Z
|
CRITICAL
| null |
{'CWE-20', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10786', 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035'}
| null |
npm
|
GHSA-7c9w-qmrq-ff8r
|
Path Traversal in http-live-simulator
|
Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`.
## Recommendation
Upgrade to version 1.0.7
|
{'CVE-2018-16479'}
|
2020-08-31T18:35:12Z
|
2019-02-07T18:14:21Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/772', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479', 'https://hackerone.com/reports/411405', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json', 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'}
| null |
npm
|
GHSA-7phr-5m9x-rw9q
|
Directory traversal in fast-http
|
This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.
|
{'CVE-2020-7687'}
|
2021-09-22T21:15:28Z
|
2020-07-27T16:02:57Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7687', 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892'}
| null |
npm
|
GHSA-2v7q-2xqx-f4q5
|
Potential SQL Injection in sequelize
|
Affected versions of `sequelize` are vulnerable to SQL Injection when user input is passed into `findOne` or into a statement such as `where: "user input"`.
## Recommendation
Update to version 3.0.0 or later.
Version 3.0.0 will introduce a number of breaking changes.
Thankfully, the project authors have provided a 2.x -> 3.x [upgrade guide](https://github.com/sequelize/sequelize/wiki/Upgrade-from-2.0-to-3.0) to ease this transition.
If upgrading is not an option, it is also possible to mitigate this by ensuring that all uses of `where: "input"` and `findOne("input")` are properly sanitized, such as by the use of a wrapper function.
|
{'CVE-2016-10553'}
|
2020-08-31T18:11:09Z
|
2019-02-18T23:54:32Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://nodesecurity.io/advisories/109', 'https://github.com/advisories/GHSA-2v7q-2xqx-f4q5', 'https://www.npmjs.com/advisories/109', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10553', 'https://github.com/sequelize/sequelize/blob/master/changelog.md#300'}
| null |
npm
|
GHSA-6g47-63mv-qpgh
|
Prototype Pollution in dotty
|
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
|
{'CVE-2021-23624'}
|
2021-11-04T17:01:59Z
|
2021-11-08T17:55:48Z
|
MODERATE
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/deoxxa/dotty', 'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
| null |
npm
|
GHSA-vpgw-ffh3-648h
|
Prototype Pollution in fullpage.js
|
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.
Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.
|
{'CVE-2022-1295'}
|
2022-04-22T20:20:55Z
|
2022-04-12T00:00:38Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/alvarotrigo/fullpage.js', 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
| null |
npm
|
GHSA-49mg-94fc-2fx6
|
Command Injection in npm-git-publish
|
All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T19:00:00Z
|
2020-09-04T17:32:49Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1458', 'https://hackerone.com/reports/730121'}
| null |
npm
|
GHSA-8qx4-r7fx-xc4v
|
Malicious Package in requst
|
All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:08:31Z
|
2020-09-11T21:08:19Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/865'}
| null |
npm
|
GHSA-6354-6mhv-mvv5
|
Regular Expression Denial of Service in jadedown
|
The `jadedown` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in.
### Proof of concept
```
var jadedown = require('jadedown');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
for (i=1;i<=10000000;i=i+1) {
console.log("COUNT: " + i);
var str = genstr(i, 'f') + genstr(i, '#') + '{';
console.log("LENGTH: " + str.length);
var start = process.hrtime();
jadedown(str)
var end = process.hrtime(start);
console.log(end);
}
```
Results demonstrating blocking for 5 seconds using only 48 characters.
```
$ node jadedown.js
COUNT: 1
LENGTH: 6
[ 0, 4014065 ]
COUNT: 4
LENGTH: 12
[ 0, 503507 ]
COUNT: 7
LENGTH: 18
[ 0, 325225 ]
COUNT: 10
LENGTH: 24
[ 0, 1632684 ]
COUNT: 13
LENGTH: 30
[ 0, 7541230 ]
COUNT: 16
LENGTH: 36
[ 0, 80889495 ]
COUNT: 19
LENGTH: 42
[ 0, 636009936 ]
COUNT: 22
LENGTH: 48
[ 5, 820586760 ]
```
# Timeline
- October 24, 2015 - Vulnerability Identified
- October 24, 2015 - Maintainers Notified
- October 25, 2015 - Response from Maintainers with intent to fix
- January 5, 2016 - Advisory Published
- January 11, 2016 - CVE Requested
## Recommendation
This package is not actively maintained, and has not seen an update since 2011.
The package also provides unique functionality in the form of a templating language that is not available elsewhere. If this package is used to process user input, the best available mitigation is to refactor the dependent application to not make use of this module.
|
{'CVE-2016-10520'}
|
2021-01-08T19:47:37Z
|
2019-02-18T23:38:38Z
|
LOW
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10520', 'https://github.com/advisories/GHSA-6354-6mhv-mvv5', 'https://nodesecurity.io/advisories/52'}
| null |
npm
|
GHSA-87mg-h5r3-hw88
|
Cross-Site Scripting in bootbox
|
All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript.
## Recommendation
Sanitize user input being passed to `bootbox` or consider using an alternative package.
| null |
2021-09-16T21:01:13Z
|
2019-05-30T17:23:28Z
|
MODERATE
| null |
{'CWE-79', 'CWE-64'}
|
{'https://hackerone.com/reports/508446', 'https://github.com/makeusabrew/bootbox/issues/661', 'https://github.com/makeusabrew/bootbox', 'https://www.npmjs.com/advisories/882'}
| null |
npm
|
GHSA-54qm-37qr-w5wq
|
Sandbox Breakout / Arbitrary Code Execution in veval
|
All versions of `veval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:05Z
|
2020-09-04T15:04:20Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1321'}
| null |
npm
|
GHSA-jj6g-7j8p-7gf2
|
Cross-Site Scripting in bracket-template
|
All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
| null |
2020-08-31T18:29:43Z
|
2019-05-30T21:03:24Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/317125', 'https://www.npmjs.com/advisories/608'}
| null |
npm
|
GHSA-p8c3-7rj8-q963
|
ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign
|
### Impact
Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as:
- wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct)
- prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct)
- appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.)
This vulnerability was fixed by strict ASN.1 DER checking.
Here is an assessment of this vulnerability:
- If you are not use ECDSA signature validation, this vulnerability is not affected.
- Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin.
- This vulnerability is affected to all ECC curve parameters.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
- ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants.
As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking.
### Patches
Users using ECDSA signature validation should upgrade to 8.0.19.
### Workarounds
Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value.
### References
https://nvd.nist.gov/vuln/detail/CVE-2020-14966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966
https://vuldb.com/?id.157123
https://github.com/kjur/jsrsasign/issues/437
https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html
https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER
https://www.itu.int/rec/T-REC-X.690
|
{'CVE-2020-14966'}
|
2021-10-06T22:01:36Z
|
2020-06-26T16:54:15Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://github.com/kjur/jsrsasign/issues/437', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html', 'https://vuldb.com/?id.157123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966', 'https://www.npmjs.com/package/jsrsasign', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}
| null |
npm
|
GHSA-86p3-4gfq-38f2
|
Denial of Service in url-relative
|
All versions of `url-relative` are vulnerable to Denial of Service. If the values `to` and `from` are equal, the function hangs and never returns. This may cause a Denial of Service.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-08-04T21:31:03Z
|
2019-06-05T14:10:34Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/junosuarez/url-relative/issues/3', 'https://snyk.io/vuln/SNYK-JS-URLRELATIVE-173691', 'https://www.npmjs.com/advisories/783'}
| null |
npm
|
GHSA-27fj-mc8w-j9wg
|
RSA signature validation vulnerability on maleable encoded message in jsrsasign
|
### Impact
Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding.
Decoded RSA signature value consists following form:
01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]
Its byte length shall be the same as RSA key length however such checking was not sufficient.
To make crafted message for practical attack is very hard.
### Patches
Users validating RSA signature should upgrade to 10.2.0 or later.
### Workarounds
There is no workaround. Not to use RSA signature validation in jsrsasign.
### ACKNOWLEDGEMENT
Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.
|
{'CVE-2021-30246'}
|
2021-04-15T16:17:08Z
|
2021-04-16T19:52:35Z
|
CRITICAL
| null |
{'CWE-347'}
|
{'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-27fj-mc8w-j9wg', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/issues/478'}
| null |
npm
|
GHSA-3v5x-qjrp-q2hq
|
Unrestricted Upload of File with Dangerous Type in ButterCMS
|
An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.
|
{'CVE-2022-27260'}
|
2022-04-22T21:02:44Z
|
2022-04-13T00:00:24Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27260', 'https://github.com/ButterCMS/buttercms-js', 'https://www.youtube.com/watch?v=Tw8OhtVd-mE'}
| null |
npm
|
GHSA-cfjh-p3g4-3q2f
|
VBScript Content Injection in marked
|
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set.
## Proof of Concept ( IE10 Compatibility Mode Only )
`[xss link](vbscript:alert(1))`
will get a link
`<a href="vbscript:alert(1)">xss link</a>`
## Recommendation
Update to version 0.3.3 or later.
|
{'CVE-2015-1370'}
|
2021-09-09T17:02:02Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/markedjs/marked', 'https://www.npmjs.com/advisories/24', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://nodesecurity.io/advisories/marked_vbscript_injection', 'https://github.com/chjj/marked/issues/492', 'https://github.com/markedjs/marked/issues/492', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://www.npmjs.com/advisories/24/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}
| null |
npm
|
GHSA-gqq4-937c-2282
|
Malicious Package in juffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:18:15Z
|
2020-09-03T22:49:42Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1272'}
| null |
npm
|
GHSA-wfrj-qqc2-83cm
|
Remote command injection when using sendmail email transport
|
### Impact
Sites using the `sendmail` transport as part of their `mail` config are vulnerable to remote command injection due to a [vulnerability](https://github.com/advisories/GHSA-48ww-j4fc-435p) in the `nodemailer` dependency.
Ghost defaults to the `direct` transport so this is only exploitable if the `sendmail` transport is explicitly used.
### Patches
Fixed in 4.15.0, all sites should upgrade as soon as possible.
### Workarounds
* Use an alternative email transport as described in the [docs](https://ghost.org/docs/config/#mail).
### For more information
If you have any questions or comments about this advisory:
* email us at security@ghost.org
| null |
2021-09-17T17:48:56Z
|
2021-09-20T19:52:41Z
|
MODERATE
| null |
{'CWE-88'}
|
{'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://github.com/TryGhost/Ghost', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-wfrj-qqc2-83cm'}
| null |
npm
|
GHSA-7752-f4gf-94gc
|
Cross-Site Scripting in materialize-css
|
All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `autocomplete` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2019-11003'}
|
2021-09-02T19:56:38Z
|
2019-04-09T19:44:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11003', 'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174144', 'https://github.com/Dogfalo/materialize/issues/6286', 'https://github.com/advisories/GHSA-7752-f4gf-94gc', 'https://www.npmjs.com/advisories/817'}
| null |
npm
|
GHSA-4rv9-5vc4-88cg
|
Command injection in node-ps
|
This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.
|
{'CVE-2020-7785'}
|
2021-03-16T00:59:16Z
|
2021-03-19T21:21:06Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://www.npmjs.com/package/node-ps', 'https://snyk.io/vuln/SNYK-JS-NODEPS-1048335', 'https://github.com/fortruce/node-ps/blob/master/lib/index.js%23L72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7785'}
| null |
npm
|
GHSA-5pm8-492c-92p5
|
Prototype Pollution in chartkick
|
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server.
## Recommendation
Upgrade to version 3.2.0 or later.
|
{'CVE-2019-18841'}
|
2022-03-03T05:12:51.639263Z
|
2019-12-02T18:04:11Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1312', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://github.com/ankane/chartkick/commits/master', 'https://github.com/ankane/chartkick.js/issues/117', 'https://rubygems.org/gems/chartkick/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://chartkick.com', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'}
| null |
npm
|
GHSA-ww6v-677g-p656
|
Sandbox Breakout in safe-eval
|
Affected versions of `safe-eval` are vulnerable to a sandbox escape. By accessing object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
## Proof of Concept:
This code accesses the process object and calls `.exit()`
```
var safeEval = require('safe-eval');
safeEval("this.constructor.constructor('return process')().exit()");
```
## Recommendation
Update to version 0.4.0 or later
|
{'CVE-2017-16088'}
|
2020-08-31T18:19:47Z
|
2018-07-18T18:28:10Z
|
CRITICAL
| null |
{'CWE-610'}
|
{'https://www.npmjs.com/advisories/337', 'https://nodesecurity.io/advisories/337', 'https://github.com/advisories/GHSA-ww6v-677g-p656', 'https://github.com/hacksparrow/safe-eval/pull/13', 'https://github.com/hacksparrow/safe-eval/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16088', 'https://github.com/patriksimek/vm2/issues/59'}
| null |
npm
|
GHSA-hxhm-96pp-2m43
|
Remote Code Execution in Angular Expressions
|
### Impact
The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input.
* If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput).
* If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.
### Patches
Users should upgrade to version 1.0.1 of angular-expressions
### Workarounds
A temporary workaround might be either to :
* disable user-controlled input that will be fed into angular-expressions in your application
OR
* allow only following characters in the userControlledInput :
```js
if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) {
var result = expressions.compile(userControlledInput);
}
else {
result = undefined;
}
```
### References
[Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues)
* [Email us](mailto:contact@javascript-ninja.fr)
### Credits
The issue was reported by Maxime Nadeau from GoSecure, Inc.
|
{'CVE-2020-5219'}
|
2021-01-08T20:33:38Z
|
2020-01-24T15:27:25Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43'}
| null |
npm
|
GHSA-9jf3-f2pg-7868
|
Downloads Resources over HTTP in nw-with-arm
|
Affected versions of `nw-with-arm` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw-with-arm`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10629'}
|
2021-01-08T21:05:11Z
|
2019-02-18T23:57:01Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/226', 'https://github.com/advisories/GHSA-9jf3-f2pg-7868', 'https://www.npmjs.com/advisories/226', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10629'}
| null |
npm
|
GHSA-4328-8hgf-7wjr
|
Global node_modules Binary Overwrite in npm
|
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations.
For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory.
This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.4 or later.
|
{'CVE-2019-16777'}
|
2021-01-08T21:28:01Z
|
2019-12-13T15:39:32Z
|
LOW
| null |
{'CWE-22'}
|
{'https://access.redhat.com/errata/RHSA-2020:0573', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777', 'https://www.npmjs.com/advisories/1437', 'https://access.redhat.com/errata/RHEA-2020:0330', 'https://security.gentoo.org/glsa/202003-48', 'https://github.com/advisories/GHSA-4328-8hgf-7wjr', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}
| null |
npm
|
GHSA-gh88-3pxp-6fm8
|
Infinite Loop in colors.js
|
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0
|
{'CVE-2021-23567'}
|
2022-01-21T21:04:45Z
|
2022-01-21T23:39:50Z
|
HIGH
| null |
{'CWE-835'}
|
{'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://snyk.io/blog/open-source-maintainer-pulls-the-plug-on-npm-packages-colors-and-faker-now-what/'}
| null |
npm
|
GHSA-2479-qvv7-47qq
|
Denial of Service in parse-server
|
Versions of `parse-server` prior to 3.4.1 are vulnerable to Denial of Service (DoS). POST requests to `/parse/classes/_Audience` (or other volatile classes) cause the server to respond with a `500 Internal Server Error` for any subsequent POST requests.
## Recommendation
Upgrade to version 3.4.1 or later.
|
{'CVE-2019-1020012'}
|
2021-08-30T15:00:14Z
|
2019-06-13T16:22:13Z
|
HIGH
| null |
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1020012', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2479-qvv7-47qq', 'https://github.com/advisories/GHSA-2479-qvv7-47qq', 'https://github.com/parse-community/parse-server', 'https://www.npmjs.com/advisories/1113', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455635'}
| null |
npm
|
GHSA-7prf-vw4p-qr59
|
Prototype pollution in supermixer
|
Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
|
{'CVE-2020-24939'}
|
2021-06-22T15:45:35Z
|
2021-12-10T19:03:07Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://github.com/stampit-org/supermixer/issues/9', 'https://hackerone.com/reports/959987', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
| null |
npm
|
GHSA-765h-qjxv-5f44
|
Prototype Pollution in handlebars
|
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
|
{'CVE-2021-23383'}
|
2021-05-19T21:17:59Z
|
2022-02-10T23:51:42Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030', 'https://www.npmjs.com/package/handlebars', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029'}
| null |
npm
|
GHSA-9w87-4j72-gcv7
|
Insecure Default Configuration in graphql-code-generator
|
Versions of `graphql-code-generator` prior to 0.18.2 have an Insecure Default Configuration. The packages sets `NODE_TLS_REJECT_UNAUTHORIZED` to 0, disabling certificate verification for the entire project. This results in Insecure Communication for the process.
## Recommendation
Upgrade to version 0.18.2 or later.
| null |
2020-08-31T18:37:32Z
|
2020-09-02T18:27:54Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/834', 'https://github.com/dotansimha/graphql-code-generator/issues/1806'}
| null |
npm
|
GHSA-2fmp-7xwf-wvwr
|
Arbitrary File Read in Snyk Broker
|
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
|
{'CVE-2020-7650'}
|
2021-07-29T17:47:30Z
|
2020-06-03T22:02:16Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7650'}
| null |
npm
|
GHSA-5ggx-g294-qj3q
|
Malicious Package in buffeb-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:57:42Z
|
2020-09-03T21:47:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1239'}
| null |
npm
|
GHSA-ff7x-qrg7-qggm
|
Prototype Pollution in dot-prop
|
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
|
{'CVE-2020-8116'}
|
2022-01-04T19:34:31Z
|
2020-07-29T20:56:59Z
|
HIGH
| null |
{'CWE-425', 'CWE-471'}
|
{'https://hackerone.com/reports/719856', 'https://github.com/sindresorhus/dot-prop/tree/v4', 'https://github.com/advisories/GHSA-ff7x-qrg7-qggm', 'https://github.com/sindresorhus/dot-prop', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8116', 'https://github.com/sindresorhus/dot-prop/issues/63'}
| null |
npm
|
GHSA-qh73-qc3p-rjv2
|
Uncaught Exception in fastify-multipart
|
### Impact
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a `name=constructor` property it is still possible to crash the application.
The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116).
All users are recommended to upgrade
### Patches
v5.3.1 includes a patch
### Workarounds
No workarounds are possible.
### References
Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
|
{'CVE-2021-23597'}
|
2022-02-23T22:11:16Z
|
2022-02-11T18:57:53Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066', 'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597', 'https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480', 'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2'}
| null |
npm
|
GHSA-wv2f-3rxv-jqhp
|
Path Traversal in general-file-server
|
All versions of `general-file-server` are vulnerable to path traversal.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not use this module until a fix has been provided.
|
{'CVE-2018-3724'}
|
2020-08-31T18:29:05Z
|
2018-07-26T15:21:04Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-wv2f-3rxv-jqhp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3724', 'https://hackerone.com/reports/310943', 'https://www.npmjs.com/advisories/592'}
| null |
npm
|
GHSA-f3vw-587g-r29g
|
Path Traversal in sapper
|
Versions of `sapper` prior to 0.27.11 are vulnerable to Path Traversal. It is possible to access sensitive files on the server through HTTP requests containing URL-encoded `../`.
You may test a `sapper` application running in prod mode with `curl -vvv http://localhost:3000/client/750af05c3a69ddc6073a/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd`.
## Recommendation
Upgrade to version 0.27.11 or later.
| null |
2020-08-31T19:01:20Z
|
2020-09-03T15:50:38Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1494'}
| null |
npm
|
GHSA-984p-xq9m-4rjw
|
Rate Limiting Bypass in express-brute
|
All versions of `express-brute` are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-08-04T21:03:16Z
|
2019-06-07T21:01:53Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/823', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457', 'https://github.com/AdamPflug/express-brute/issues/46'}
| null |
npm
|
GHSA-hg79-j56m-fxgv
|
Cross-Site Scripting in react
|
Versions of `react` prior to 0.14.0 are vulnerable to Cross-Site Scripting (XSS). The package's `createElement` function fails to properly validate its input object, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.14.0 or later.
| null |
2021-10-01T20:15:16Z
|
2020-09-04T15:26:04Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://reactjs.org/blog/2015/10/07/react-v0.14.html#notable-enhancements', 'https://reactjs.org/blog/2019/10/22/react-release-channels.html#experimental-channel', 'https://github.com/facebook/react', 'http://danlec.com/blog/xss-via-a-spoofed-react-element', 'https://www.npmjs.com/advisories/1347', 'https://snyk.io/vuln/npm:react:20150318'}
| null |
npm
|
GHSA-27wq-qx3q-fxm9
|
Improper Handling of Unexpected Data Type in ced
|
### Impact
In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash.
### Patches
The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes.
### Workarounds
Before passing an argument to ced, verify it’s a `Buffer` using [`Buffer.isBuffer(obj)`](https://nodejs.org/api/buffer.html#buffer_static_method_buffer_isbuffer_obj).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since ced is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to ced. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const bodyParser = require("body-parser");
const ced = require("ced");
const app = express();
app.use(bodyParser.raw());
app.post("/", (req, res) => {
const encoding = ced(req.body);
res.end(encoding);
});
app.listen(3000);
```
`curl --request POST --header "Content-Type: text/plain" --data foo http://localhost:3000` crashes the server.
### References
- https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3
|
{'CVE-2021-39131'}
|
2021-10-21T14:15:51Z
|
2021-08-23T19:42:28Z
|
HIGH
| null |
{'CWE-241'}
|
{'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'}
| null |
npm
|
GHSA-rwxp-hwwf-653v
|
Insecure template handling in express-hbs
|
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.
|
{'CVE-2021-32817'}
|
2021-05-17T19:09:07Z
|
2021-05-17T20:58:51Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://www.npmjs.com/package/express-hbs', 'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32817'}
| null |
npm
|
GHSA-8v9x-9xqg-r8mr
|
Prototype pollution in json8-merge-patch
|
Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.
|
{'CVE-2020-8268'}
|
2021-04-19T22:31:31Z
|
2021-05-10T19:17:15Z
|
HIGH
| null |
{'CWE-471', 'CWE-20', 'CWE-1321'}
|
{'https://hackerone.com/reports/980649', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://github.com/sonnyp/JSON8/issues/113', 'https://www.npmjs.com/package/json8-merge-patch', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268'}
| null |
npm
|
GHSA-2j5v-fc74-j9q2
|
Cross-Site Scripting in editor.md
|
All versions of `editor.md` are vulnerable to Cross-Site Scripting. User input is insufficiently sanitized, allowing attackers to inject malicious code in payloads containing base64-encoded content.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2019-9737'}
|
2021-08-30T21:58:23Z
|
2019-03-14T15:38:56Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-2j5v-fc74-j9q2', 'https://www.npmjs.com/advisories/794', 'https://github.com/pandao/editor.md/issues/662', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9737'}
| null |
npm
|
GHSA-c3px-v9c7-m734
|
Prototype Pollution in mithril
|
Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`.
## Recommendation
If you are using mithril 2.x, upgrade to version 2.0.2 or later.
If you are using mithril 1.x, upgrade to version 1.1.7 or later.
| null |
2020-08-31T18:47:02Z
|
2020-09-03T19:04:39Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1094'}
| null |
npm
|
GHSA-v6c5-hwqg-3x5q
|
Improper Authorization in passport-cognito
|
All versions of `passport-cognito` are vulnerable to Improper Authorization. The package fails to properly scope the variables containing authorization information, such as access token, refresh token and ID token. This causes a race condition where simultaneous authenticated users may receive authorization tokens for a different user. This would allow a user to take actions on another user's behalf.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-19723'}
|
2020-08-31T18:59:30Z
|
2020-09-04T17:23:03Z
|
CRITICAL
| null |
{'CWE-285'}
|
{'https://www.npmjs.com/advisories/1443', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19723'}
| null |
npm
|
GHSA-44g9-w23c-5rw7
|
Directory Traversal in nhouston
|
All versions of the static file server module nhouston are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory.
## Recommendation
It is recommended that a different module be used, as we have been unable to reacher the maintainer of this module. We will continue to reach out to them, and if an update becomes available that fixes the issue, we will update this advisory accordingly.
|
{'CVE-2014-8883'}
|
2021-09-23T20:57:48Z
|
2020-08-31T22:53:54Z
|
MODERATE
| null |
{'CWE-23'}
|
{'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8883', 'https://snyk.io/vuln/npm:nhouston:20141114', 'https://www.npmjs.com/advisories/25'}
| null |
npm
|
GHSA-8wg9-92fr-6j7v
|
Downloads Resources over HTTP in marionette-socket-host
|
Affected versions of `marionette-socket-host` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `marionette-socket-host`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has removed the package from their Github account.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10648'}
|
2021-09-16T20:53:53Z
|
2018-08-15T18:50:31Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nodesecurity.io/advisories/252', 'https://github.com/advisories/GHSA-8wg9-92fr-6j7v', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10648', 'https://www.npmjs.com/advisories/252', 'https://github.com/mozilla-b2g/marionette-socket-host'}
| null |
npm
|
GHSA-4ccc-jm2p-vg3p
|
Downloads Resources over HTTP in windows-latestchromedriver
|
Affected versions of `windows-latestchromedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-latestchromedriver`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10696'}
|
2021-01-14T15:56:39Z
|
2020-09-01T16:14:22Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/295', 'https://www.npmjs.com/advisories/295', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10696'}
| null |
npm
|
GHSA-x8m7-cv39-xmg9
|
Malicious Package in jq-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:35:22Z
|
2020-09-03T22:56:10Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1278'}
| null |
npm
|
GHSA-whgm-jr23-g3j9
|
Uncontrolled Resource Consumption in ansi-html
|
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
|
{'CVE-2021-23424'}
|
2021-09-07T21:02:12Z
|
2021-09-02T17:15:24Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69', 'https://github.com/Tjatse/ansi-html', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424', 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849'}
| null |
npm
|
GHSA-7qcx-jmrc-h2rr
|
Cross-Site Scripting in keystone
|
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser.
## Recommendation
Update to version 4.0.0 or later.
|
{'CVE-2017-15878'}
|
2021-09-03T21:41:16Z
|
2017-11-15T19:44:16Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'http://www.securityfocus.com/bid/101541', 'https://www.npmjs.com/advisories/980', 'https://www.exploit-db.com/exploits/43054/', 'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/keystonejs/keystone', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878', 'https://github.com/keystonejs/keystone/pull/4478'}
| null |
npm
|
GHSA-wv67-9jq7-8r69
|
Improper Input Validation and Buffer Over-read in mqtt-packet
|
A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.
|
{'CVE-2019-5432'}
|
2021-08-03T21:47:43Z
|
2019-05-14T04:02:45Z
|
HIGH
| null |
{'CWE-126', 'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5432', 'https://hackerone.com/reports/541354'}
| null |
npm
|
GHSA-689x-x68p-fph3
|
Cross-site Scripting in vditor
|
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
|
{'CVE-2022-0350'}
|
2022-04-08T22:08:10Z
|
2022-04-01T00:00:41Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/vanessa219/vditor', 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}
| null |
npm
|
GHSA-4jj4-m52p-8rx3
|
Prototype pollution in set-object-value
|
Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28281'}
|
2021-04-07T22:31:58Z
|
2021-04-13T15:24:08Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28281', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281', 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16'}
| null |
npm
|
GHSA-j87c-cj65-vmh5
|
High severity vulnerability that affects rendertron
|
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
|
{'CVE-2017-18354'}
|
2021-09-14T19:19:11Z
|
2019-01-04T17:41:51Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
| null |
npm
|
GHSA-78p3-96hc-3j47
|
Malicious Package in jquery-airload
|
Version 0.2.5 of `jquery-airload` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:19Z
|
2020-09-03T19:11:17Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1102'}
| null |
npm
|
GHSA-vx5c-87qx-cv6c
|
Arbitrary Code Execution in mathjs
|
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
## Recommendation
Update to version 3.17.0 or later.
|
{'CVE-2017-1001002'}
|
2021-06-10T20:06:12Z
|
2017-12-18T22:27:45Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/552', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}
| null |
npm
|
GHSA-xw5p-hw6r-2j98
|
Denial of service in fastify
|
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
|
{'CVE-2020-8192'}
|
2020-08-03T21:25:40Z
|
2020-08-05T14:53:22Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8192', 'https://hackerone.com/reports/903521', 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}
| null |
npm
|
GHSA-x3j8-g4v9-67jq
|
Downloads Resources over HTTP in pennyworth
|
Affected versions of `pennyworth` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10619'}
|
2021-01-08T00:47:47Z
|
2019-02-18T23:56:51Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10619', 'https://www.npmjs.com/advisories/213', 'https://nodesecurity.io/advisories/213', 'https://github.com/advisories/GHSA-x3j8-g4v9-67jq'}
| null |
npm
|
GHSA-5888-ffcr-r425
|
Prototype Pollution leading to Remote Code Execution in superjson
|
### Impact
This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. In the case of Blitz.js, it would be at least one RPC call.
### Patches
This has been patched in superjson 1.8.1 and Blitz.js 0.45.3.
If you are unable to upgrade to Blitz.js 0.45.3 in a timely manner, you can instead upgrade only superjson to version 1.8.1 using yarn resolutions are similar. Blitz versions < 0.45.3 are only affected because they used superjson versions < 1.8.1.
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/blitz-js/superjson
* Email us at b@bayer.ws
|
{'CVE-2022-23631'}
|
2022-02-09T22:20:49Z
|
2022-02-09T22:20:49Z
|
CRITICAL
| null |
{'CWE-94', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23631', 'https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425', 'https://github.com/blitz-js/superjson'}
| null |
npm
|
GHSA-v45m-2wcp-gg98
|
Global node_modules Binary Overwrite in bin-links
|
Versions of `bin-links` prior to 1.1.6 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent globally-installed binaries to be overwritten by other package installs. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This behavior is still allowed in local installations.
## Recommendation
Upgrade to version 1.1.6 or later.
| null |
2020-08-31T18:59:19Z
|
2020-09-04T17:18:44Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/1438'}
| null |
npm
|
GHSA-42xw-2xvc-qx8m
|
Denial of Service in axios
|
Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.
## Recommendation
Upgrade to 0.18.1 or later.
|
{'CVE-2019-10742'}
|
2021-07-27T20:36:18Z
|
2019-05-29T18:04:45Z
|
HIGH
| null |
{'CWE-20', 'CWE-755'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10742', 'https://github.com/axios/axios/pull/1485', 'https://github.com/axios/axios/issues/1098', 'https://snyk.io/vuln/SNYK-JS-AXIOS-174505', 'https://www.npmjs.com/advisories/880', 'https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505'}
| null |
npm
|
GHSA-7j93-5m2h-rvjx
|
Malicious Package in bconi
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:37:33Z
|
2020-09-04T15:32:46Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1353'}
| null |
npm
|
GHSA-r587-7jh2-4qr3
|
Server secret was included in static assets and served to clients
|
### Impact
Server JWT signing secret was included in static assets and served to clients.
This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**.
### Background
Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`.
Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood.
### Patches
Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components.
Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend).
### Workarounds
Users shall upgrade if they use Flood's builtin authentication system.
While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments.
> Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication.
Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions.
### References
[Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions)
[Introduction to JSON Web Tokens](https://jwt.io/introduction/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [issue tracker](https://github.com/jesec/flood/issues)
* Email us at [jc@linux.com](mailto:jc@linux.com)
| null |
2020-08-26T19:32:37Z
|
2020-08-26T19:32:50Z
|
CRITICAL
| null | null |
{'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}
| null |
npm
|
GHSA-4r5x-qjqc-p579
|
Tracking Module in botbait
|
The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem.
`botbait` is known to record and track user information.
The module tracks the following information.
- Source IP
- process.versions
- process.platform
- How the module was invoked (test, require, pre-install)
## Recommendation
This package has no functional value, and should be removed from your environment if discovered.
|
{'CVE-2017-16126'}
|
2021-09-23T21:47:44Z
|
2020-09-01T18:57:44Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://www.npmjs.com/advisories/483', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126', 'https://nodesecurity.io/advisories/483'}
| null |
npm
|
GHSA-q75g-2496-mxpp
|
Regular Expression Denial of Service in parsejson
|
Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input.
## Recommendation
The `parsejson` package has not been functionally updated since it was initially released.
Additionally, it provides functionality which is natively included in Node.js, and therefore the native `JSON.parse()` should be used, for both performance and security reasons.
|
{'CVE-2017-16113'}
|
2020-08-31T18:26:32Z
|
2018-07-24T20:11:13Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16113', 'https://github.com/advisories/GHSA-q75g-2496-mxpp', 'https://nodesecurity.io/advisories/528', 'https://github.com/get/parsejson/issues/4', 'https://www.npmjs.com/advisories/528'}
| null |
npm
|
GHSA-652h-xwhf-q4h6
|
OS Command Injection in ssh2
|
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
|
{'CVE-2020-26301'}
|
2021-09-21T14:50:54Z
|
2021-09-21T16:50:46Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/mscdex/ssh2', 'https://www.npmjs.com/package/ssh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21', 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/'}
| null |
npm
|
GHSA-273r-mgr4-v34f
|
Uncaught Exception in engine.io
|
### Impact
A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process.
> RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear
> at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14)
> at Receiver.startLoop (/.../node_modules/ws/lib/receiver.js:136:22)
> at Receiver._write (/.../node_modules/ws/lib/receiver.js:83:10)
> at writeOrBuffer (internal/streams/writable.js:358:12)
This impacts all the users of the [`engine.io`](https://www.npmjs.com/package/engine.io) package starting from version `4.0.0`, including those who uses depending packages like [`socket.io`](https://www.npmjs.com/package/socket.io).
### Patches
A fix has been released for each major branch:
| Version range | Fixed version |
| --- | --- |
| `engine.io@4.x.x` | `4.1.2` |
| `engine.io@5.x.x` | `5.2.1` |
| `engine.io@6.x.x` | `6.1.1` |
Previous versions (`< 4.0.0`) are not impacted.
For `socket.io` users:
| Version range | `engine.io` version | Needs minor update? |
| --- | --- | --- |
| `socket.io@4.4.x` | `~6.1.0` | -
| `socket.io@4.3.x` | `~6.0.0` | Please upgrade to `socket.io@4.4.x`
| `socket.io@4.2.x` | `~5.2.0` | -
| `socket.io@4.1.x` | `~5.1.1` | Please upgrade to `socket.io@4.4.x`
| `socket.io@4.0.x` | `~5.0.0` | Please upgrade to `socket.io@4.4.x`
| `socket.io@3.1.x` | `~4.1.0` | -
| `socket.io@3.0.x` | `~4.0.0` | Please upgrade to `socket.io@3.1.x` or `socket.io@4.4.x` (see [here](https://socket.io/docs/v4/migrating-from-3-x-to-4-0/))
In most cases, running `npm audit fix` should be sufficient. You can also use `npm update engine.io --depth=9999`.
### Workarounds
There is no known workaround except upgrading to a safe version.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`engine.io`](https://github.com/socketio/engine.io)
Thanks to Marcus Wejderot from Mevisio for the responsible disclosure.
|
{'CVE-2022-21676'}
|
2022-01-21T13:25:59Z
|
2022-01-13T16:14:17Z
|
HIGH
| null |
{'CWE-754'}
|
{'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/releases/tag/5.2.1', 'https://github.com/socketio/engine.io/', 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab', 'https://github.com/socketio/engine.io/releases/tag/6.1.1', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21676', 'https://github.com/socketio/engine.io/releases/tag/4.1.2'}
| null |
npm
|
GHSA-v9wp-8r97-v6xg
|
Cross-Site Scripting in jquery.json-viewer
|
Versions of `jquery.json-viewer` prior to 1.3.0 are vulnerable to Cross-Site Scripting (XSS). The package insufficiently sanitizes user input when creating links, and concatenates the user input in an `<a>` tag. This allows attackers to create malicious links with JSON payloads such as:
```
{
"foo": "https://bar.com\" onmouseover=alert('xss') \""
}
```
This may lead to arbitrary JavaScript execution in a victim's browser.
## Recommendation
Upgrade to version 1.3.0 or later.
| null |
2020-08-31T18:44:56Z
|
2020-09-03T17:17:00Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1036'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.