ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-6xhg-q9c8-rj32
Credential leak in react-native-fast-image
This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
{'CVE-2020-7696'}
2021-05-10T21:06:00Z
2021-05-18T01:52:54Z
MODERATE
null
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228', 'https://github.com/DylanVann/react-native-fast-image/issues/690', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696', 'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624', 'https://github.com/DylanVann/react-native-fast-image/pull/691'}
null
npm
GHSA-9h4g-27m8-qjrg
Path Traversal in socket.io-file
All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on the server by sending relative paths on the `name` value, such as `../../test.js`. The `uploadDir` and `rename` options can be used to define the file upload path.
{'CVE-2020-15779'}
2021-09-22T20:28:29Z
2020-07-07T19:24:47Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1519', 'https://www.npmjs.com/package/socket.io-file', 'https://github.com/rico345100/socket.io-file', 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779'}
null
npm
GHSA-33gc-f8v9-v8hm
Malicious Package in ladder-text-js
`ladder-text-js` contained a malicious script that attempted to delete all files when `npm test` was run. ## Recommendation This module has been unpublished from the npm Registry. If you find this module in your environment remove it.
null
2021-10-01T13:27:36Z
2020-09-01T20:41:40Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/651'}
null
npm
GHSA-vr98-27qj-3c8q
Directory traversal in rollup-plugin-server
This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in readFile operation inside the readFileFromContentBase function.
{'CVE-2020-7686'}
2021-09-23T17:34:45Z
2020-07-29T18:07:35Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7686', 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124'}
null
npm
GHSA-37hx-4mcq-wc3h
Weak Password Recovery Mechanism for Forgotten Password in Strapi
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.
{'CVE-2021-28128'}
2021-10-06T14:09:30Z
2021-10-06T17:48:16Z
HIGH
null
{'CWE-640'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28128', 'https://github.com/strapi/strapi/issues/9657', 'https://strapi.io/changelog', 'https://github.com/strapi/strapi', 'https://github.com/strapi/strapi/releases', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt'}
null
npm
GHSA-6m4r-m3gc-h4r5
OS Command Injection in install-package
install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
{'CVE-2020-7629'}
2021-07-28T22:39:48Z
2022-02-10T23:48:06Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7629', 'https://github.com/1000ch/install-package/blob/master/index.js#L82,', 'https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267'}
null
npm
GHSA-3p92-886g-qxpq
Remote Memory Exposure in floody
Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure. .write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory. Proof of Concept: ``` var f = require('floody')(process.stdout); f.write(USERSUPPLIEDINPUT); 'f.stop(); ## Recommendation Update to version 0.1.1 or later.
null
2021-08-04T21:27:04Z
2019-06-04T15:42:32Z
MODERATE
null
{'CWE-201'}
{'https://www.npmjs.com/advisories/601', 'https://snyk.io/vuln/npm:floody:20160115', 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'}
null
npm
GHSA-f98m-q3hr-p5wq
Prototype Pollution in locutus
All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function.
{'CVE-2020-7719'}
2021-12-14T15:33:28Z
2021-05-06T18:12:22Z
CRITICAL
null
{'CWE-915', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7719', 'https://github.com/kvz/locutus/pull/418/', 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675', 'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f', 'https://github.com/kvz/locutus'}
null
npm
GHSA-xwjh-cp99-cj8q
Path Traversal in cordova-plugin-ionic-webview
Versions of `cordova-plugin-ionic-webview` prior to 2.2.0 are vulnerable to Path Traversal, allowing attackers access to OS local files that should be inaccessible by third-party applications. The package launches a webserver listening on http://localhost:8080 without restricting access of the app itself, thus escaping the iOS application sandbox and accessing local files. ## Recommendation Upgrade to version 2.2.0
{'CVE-2018-16202'}
2021-09-22T18:20:58Z
2019-02-12T15:36:35Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-xwjh-cp99-cj8q', 'https://www.npmjs.com/advisories/746', 'http://jvn.jp/en/jp/JVN60497148/index.html', 'https://github.com/ionic-team/cordova-plugin-ionic-webview', 'https://jvn.jp/en/jp/JVN69812763/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16202'}
null
npm
GHSA-4w97-57v2-3w44
False-negative validation results in MINT transactions with invalid baton
### Impact Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. ### Patches npm package [slp-validate](https://www.npmjs.com/package/slp-validate) has been patched and published as version 1.2.1. ### Workarounds Upgrade to slp-validate 1.2.1. ### References * slp-validate [commit](https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7) ### For more information If you have any questions or comments about this advisory: * Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues)
{'CVE-2020-11072'}
2021-01-08T20:17:36Z
2020-05-12T00:45:24Z
CRITICAL
null
{'CWE-697'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11072', 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44'}
null
npm
GHSA-22cm-3qf2-2wc7
LDAP Injection in is-user-valid
All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.
{'CVE-2021-23335'}
2021-04-01T23:39:38Z
2021-04-13T15:30:27Z
HIGH
null
{'CWE-74', 'CWE-90'}
{'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}
null
npm
GHSA-jc83-cpf9-q7c6
False-negative validation results in MINT transactions with invalid baton
### Impact Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result in the destruction of a user's minting baton. ### Patches npm package [slpjs](https://www.npmjs.com/package/slpjs) has been patched and published as version 0.27.2. ### Workarounds Upgrade to slpjs 0.27.2. ### References * slpjs [commit](https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754) ### For more information If you have any questions or comments about this advisory: * Open an issue in [slp-validate](https://github.com/simpleledger/slp-validate/issues) or [slpjs](https://github.com/simpleledger/slpjs/issues)
{'CVE-2020-11071'}
2021-01-08T20:17:31Z
2020-05-12T00:39:03Z
CRITICAL
null
{'CWE-697'}
{'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11071'}
null
npm
GHSA-6xv6-jpvw-cx6q
Command injection in bestzip
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.
{'CVE-2020-7730'}
2021-05-04T22:37:03Z
2021-05-06T18:27:36Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7730', 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'}
null
npm
GHSA-92v9-xh2q-fq9f
Prototype Pollution in @cookiex/deep
The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object.
{'CVE-2021-23442'}
2021-09-20T20:12:20Z
2021-09-20T20:12:38Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793', 'https://github.com/tony-tsx/cookiex-deep/issues/1', 'https://github.com/tony-tsx/cookiex-deep', 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442'}
null
npm
GHSA-39cx-xcwj-3rc4
Cross-Site Scripting in dojo
Affected versions of `dojo` are susceptible to a cross-site scripting vulnerability in the `dijit.Editor` and `textarea` components, which execute their contents as Javascript, even when sanitized. ## Recommendation Update to version 1.1 or later.
{'CVE-2008-6681'}
2020-08-31T18:11:03Z
2020-09-01T15:25:29Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/107', 'http://trac.dojotoolkit.org/ticket/2140', 'https://bugs.dojotoolkit.org/ticket/2140', 'http://www.securityfocus.com/bid/34661', 'https://nvd.nist.gov/vuln/detail/CVE-2008-6681', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/49883', 'http://www.dojotoolkit.org/book/dojo-1-1-release-notes'}
null
npm
GHSA-f794-r6xc-hf3v
Improper Access Control in passport-oauth2
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.
{'CVE-2021-41580'}
2021-10-06T13:23:09Z
2021-09-29T17:18:32Z
MODERATE
null
{'CWE-287'}
{'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1', 'https://github.com/jaredhanson/passport-oauth2/pull/144', 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea', 'https://github.com/jaredhanson/passport-oauth2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41580', 'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262'}
null
npm
GHSA-m734-r4g6-34f9
NoSQL Injection in loopback-connector-mongodb
Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection. MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a filter to execute JavaScript (client can pass in a malicious script) on the database Driver. This is an [intended feature of MongoDB](https://docs.mongodb.com/manual/core/server-side-javascript/) unless disabled ([instructions here](https://docs.mongodb.com/manual/core/server-side-javascript/#disable-server-side-js)). A proof of concept malicious query: ``` GET /POST filter={"where": {"$where": "function(){sleep(5000); return this.title.contains('Hello');}"}} ``` The above makes the database sleep for 5 seconds and then returns all “Posts” with the title containing the word `Hello`. ## Recommendation Update to version 3.6.0 or later.
null
2021-08-04T20:47:58Z
2019-06-04T19:36:17Z
HIGH
null
{'CWE-89'}
{'https://github.com/strongloop/loopback-connector-mongodb/issues/403', 'https://www.npmjs.com/advisories/696', 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html', 'https://github.com/strongloop/loopback-connector-mongodb/pull/452', 'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'}
null
npm
GHSA-rrj3-qmh8-72pf
Sensitive Data In Log Files in grunt-gh-pages
Versions of `grunt-gh-pages` prior to 1.0.0 are affected by a vulnerability which may cause unencrypted github credentials to be written to a log file in certain circumstances. In the `grunt-gh-pages` deployment scenario where authentication is performed by injecting a github token directly into the auth portion of the URL, `grunt-gh-pages` will write the token to a log file, unencrypted. ## Recommendation Update to version 1.0.0 or later.
{'CVE-2016-10526'}
2020-08-31T18:10:15Z
2019-02-18T23:39:11Z
MODERATE
null
{'CWE-391'}
{'https://github.com/tschaub/grunt-gh-pages/pull/41', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10526', 'https://www.npmjs.com/advisories/85', 'https://github.com/advisories/GHSA-rrj3-qmh8-72pf', 'https://nodesecurity.io/advisories/85'}
null
npm
GHSA-hm6q-r2jc-cpqh
Malicious Package in lodahs
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{'CVE-2019-19771'}
2021-07-28T16:49:22Z
2019-12-16T19:29:33Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19771', 'https://www.npmjs.com/package/lodahs', 'https://www.npmjs.com/advisories/1417'}
null
npm
GHSA-wjf2-7f9g-86f5
Malicious Package in fast-requests
All versions of `fast-requests` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T20:05:43Z
2020-09-03T18:23:38Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1086'}
null
npm
GHSA-xmxh-g7wj-8m4m
OS Command Injection in curling
npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
{'CVE-2019-10789'}
2021-04-13T15:32:15Z
2021-04-13T15:32:26Z
HIGH
null
{'CWE-78'}
{'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10789', 'https://snyk.io/vuln/SNYK-JS-CURLING-546484'}
null
npm
GHSA-g2pf-qjgf-6fw3
Downloads Resources over HTTP in openframe-glslviewer
Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`. ## Recommendation No patch is currently available for this vulnerability, and the package hasn't been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10607'}
2021-09-16T20:41:43Z
2019-02-18T23:33:42Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://www.npmjs.com/advisories/208', 'https://github.com/OpenframeProject/Openframe-glslViewer', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10607', 'https://nodesecurity.io/advisories/208', 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3'}
null
npm
GHSA-769c-qphh-g3wm
Downloads Resources over HTTP in macaca-chromedriver
Affected versions of `macaca-chromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver`. ## Recommendation Update to version 1.0.29 or later.
{'CVE-2016-10586'}
2021-01-08T20:58:40Z
2019-02-18T23:51:09Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-769c-qphh-g3wm', 'https://www.npmjs.com/advisories/180', 'https://nodesecurity.io/advisories/180', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10586'}
null
npm
GHSA-6p48-xfj3-jw67
Downloads Resources over HTTP in fibjs
Affected versions of `fibjs` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fibjs`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10621'}
2021-01-08T19:21:01Z
2019-02-18T23:56:54Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10621', 'https://www.npmjs.com/advisories/217', 'https://nodesecurity.io/advisories/217', 'https://github.com/advisories/GHSA-6p48-xfj3-jw67'}
null
npm
GHSA-5q6m-3h65-w53x
Improper Neutralization of Special Elements used in an OS Command.
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
{'CVE-2021-24033'}
2021-03-11T22:25:51Z
2021-03-11T22:26:09Z
MODERATE
null
{'CWE-78'}
{'https://www.facebook.com/security/advisories/cve-2021-24033', 'https://github.com/facebook/create-react-app/pull/10644', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}
null
npm
GHSA-p32g-242c-76h3
Malicious Package in geoheat
Version 1.3.2 of `geoheat` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:40:59Z
2020-09-11T21:14:49Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/932'}
null
npm
GHSA-qwj8-p662-3m7x
Path Traversal in localhost-now
All versions of `localhost-now` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5416'}
2020-08-31T18:43:49Z
2019-03-25T16:17:05Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5416', 'https://www.npmjs.com/advisories/1005', 'https://github.com/advisories/GHSA-qwj8-p662-3m7x', 'https://hackerone.com/reports/334837'}
null
npm
GHSA-7jfh-2xc9-ccv7
Cross-Site Scripting in public
All versions of `public` are vulnerable to stored cross-site scripting (XSS). ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
null
2020-08-31T18:29:45Z
2019-05-31T23:46:40Z
LOW
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/609', 'https://hackerone.com/reports/316346'}
null
npm
GHSA-xg5r-8j97-2wrj
Directory Traversal in restafary
Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration. Proof of Concept ``` curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd' ``` ## Recommendation Update to version 1.6.1 or later.
{'CVE-2016-10528'}
2020-08-31T18:10:25Z
2019-02-18T23:39:22Z
MODERATE
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-xg5r-8j97-2wrj', 'https://www.npmjs.com/advisories/89', 'https://nodesecurity.io/advisories/89', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10528'}
null
npm
GHSA-79mx-88w7-8f7q
XSS Filter Bypass via Encoded URL in validator
Versions of `validator` prior to 2.0.0 contained an xss filter method that is affected by several filter bypasses. This may result in a cross-site scripting vulnerability. ## Proof of Concept The xss() function removes the word "javascript" when contained inside an attribute. However, it does not properly handle cases where characters have been hex-encoded. As a result, it is possible to build an input that bypasses the filter but which the browser will accept as valid JavaScript. For example: ```<a href="jav&#x61;script:...">abc</a>``` will render as: ```<a href="javascript:...">abc</a>``` ## Recommendation The package author has decided to remove the xss filter functionality in the latest version of this module. If this feature is not currently being used, you are not affected by the vulnerability. If it is being used, updating to the latest version of the module will break your application. In order for affected users to mitigate this vulnerability, it is necessary to use an [alternative package](https://www.npmjs.com/search?q=xss%20filter&page=1&ranking=optimal) that provides similar functionality.
{'CVE-2014-9772'}
2021-09-02T21:06:02Z
2018-11-06T23:12:49Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-9772', 'https://nodesecurity.io/advisories/43', 'http://www.securityfocus.com/bid/97102', 'https://github.com/advisories/GHSA-79mx-88w7-8f7q', 'https://github.com/chriso/validator.js', 'https://www.npmjs.com/advisories/43', 'https://github.com/chriso/validator.js/issues/181', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-v2p6-4mp7-3r9v
Regular Expression Denial of Service in underscore.string
Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS). The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs. ## Recommendation Upgrade to version 3.3.5 or higher.
null
2020-08-31T18:34:16Z
2019-06-14T16:26:22Z
MODERATE
null
{'CWE-400'}
{'https://github.com/epeli/underscore.string/pull/517', 'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/issues/510', 'https://www.npmjs.com/advisories/745'}
null
npm
GHSA-ph32-23p8-9rw5
Improper Input Validation in network-manager
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
{'CVE-2019-10786'}
2021-07-28T18:30:26Z
2021-04-13T15:17:45Z
CRITICAL
null
{'CWE-20', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10786', 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035'}
null
npm
GHSA-7c9w-qmrq-ff8r
Path Traversal in http-live-simulator
Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`. ## Recommendation Upgrade to version 1.0.7
{'CVE-2018-16479'}
2020-08-31T18:35:12Z
2019-02-07T18:14:21Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/772', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479', 'https://hackerone.com/reports/411405', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json', 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'}
null
npm
GHSA-7phr-5m9x-rw9q
Directory traversal in fast-http
This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.
{'CVE-2020-7687'}
2021-09-22T21:15:28Z
2020-07-27T16:02:57Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7687', 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892'}
null
npm
GHSA-2v7q-2xqx-f4q5
Potential SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection when user input is passed into `findOne` or into a statement such as `where: "user input"`. ## Recommendation Update to version 3.0.0 or later. Version 3.0.0 will introduce a number of breaking changes. Thankfully, the project authors have provided a 2.x -> 3.x [upgrade guide](https://github.com/sequelize/sequelize/wiki/Upgrade-from-2.0-to-3.0) to ease this transition. If upgrading is not an option, it is also possible to mitigate this by ensuring that all uses of `where: "input"` and `findOne("input")` are properly sanitized, such as by the use of a wrapper function.
{'CVE-2016-10553'}
2020-08-31T18:11:09Z
2019-02-18T23:54:32Z
HIGH
null
{'CWE-89'}
{'https://nodesecurity.io/advisories/109', 'https://github.com/advisories/GHSA-2v7q-2xqx-f4q5', 'https://www.npmjs.com/advisories/109', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10553', 'https://github.com/sequelize/sequelize/blob/master/changelog.md#300'}
null
npm
GHSA-6g47-63mv-qpgh
Prototype Pollution in dotty
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23624'}
2021-11-04T17:01:59Z
2021-11-08T17:55:48Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/deoxxa/dotty', 'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
null
npm
GHSA-vpgw-ffh3-648h
Prototype Pollution in fullpage.js
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability. Javascript is "prototype" language which means when a new "object" is created, it carries the predefined properties and methods of an "object" with itself like toString, constructor etc. By using prototype-pollution vulnerability, an attacker can overwrite/create the property of that "object" type. If the victim developer has used that property anywhere in the code, then it will have severe effect on the application.
{'CVE-2022-1295'}
2022-04-22T20:20:55Z
2022-04-12T00:00:38Z
HIGH
null
{'CWE-1321'}
{'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/alvarotrigo/fullpage.js', 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
null
npm
GHSA-49mg-94fc-2fx6
Command Injection in npm-git-publish
All versions of `npm-git-publish` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `execSync` call, which may allow attackers to execute arbitrary code in the system. The `publish` function is vulnerable through the `gitRemoteUrl` variable. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T19:00:00Z
2020-09-04T17:32:49Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1458', 'https://hackerone.com/reports/730121'}
null
npm
GHSA-8qx4-r7fx-xc4v
Malicious Package in requst
All versions of `requst` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:08:31Z
2020-09-11T21:08:19Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/865'}
null
npm
GHSA-6354-6mhv-mvv5
Regular Expression Denial of Service in jadedown
The `jadedown` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in. ### Proof of concept ``` var jadedown = require('jadedown'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=1;i<=10000000;i=i+1) { console.log("COUNT: " + i); var str = genstr(i, 'f') + genstr(i, '#') + '{'; console.log("LENGTH: " + str.length); var start = process.hrtime(); jadedown(str) var end = process.hrtime(start); console.log(end); } ``` Results demonstrating blocking for 5 seconds using only 48 characters. ``` $ node jadedown.js COUNT: 1 LENGTH: 6 [ 0, 4014065 ] COUNT: 4 LENGTH: 12 [ 0, 503507 ] COUNT: 7 LENGTH: 18 [ 0, 325225 ] COUNT: 10 LENGTH: 24 [ 0, 1632684 ] COUNT: 13 LENGTH: 30 [ 0, 7541230 ] COUNT: 16 LENGTH: 36 [ 0, 80889495 ] COUNT: 19 LENGTH: 42 [ 0, 636009936 ] COUNT: 22 LENGTH: 48 [ 5, 820586760 ] ``` # Timeline - October 24, 2015 - Vulnerability Identified - October 24, 2015 - Maintainers Notified - October 25, 2015 - Response from Maintainers with intent to fix - January 5, 2016 - Advisory Published - January 11, 2016 - CVE Requested ## Recommendation This package is not actively maintained, and has not seen an update since 2011. The package also provides unique functionality in the form of a templating language that is not available elsewhere. If this package is used to process user input, the best available mitigation is to refactor the dependent application to not make use of this module.
{'CVE-2016-10520'}
2021-01-08T19:47:37Z
2019-02-18T23:38:38Z
LOW
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10520', 'https://github.com/advisories/GHSA-6354-6mhv-mvv5', 'https://nodesecurity.io/advisories/52'}
null
npm
GHSA-87mg-h5r3-hw88
Cross-Site Scripting in bootbox
All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript. ## Recommendation Sanitize user input being passed to `bootbox` or consider using an alternative package.
null
2021-09-16T21:01:13Z
2019-05-30T17:23:28Z
MODERATE
null
{'CWE-79', 'CWE-64'}
{'https://hackerone.com/reports/508446', 'https://github.com/makeusabrew/bootbox/issues/661', 'https://github.com/makeusabrew/bootbox', 'https://www.npmjs.com/advisories/882'}
null
npm
GHSA-54qm-37qr-w5wq
Sandbox Breakout / Arbitrary Code Execution in veval
All versions of `veval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:05Z
2020-09-04T15:04:20Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1321'}
null
npm
GHSA-jj6g-7j8p-7gf2
Cross-Site Scripting in bracket-template
All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
null
2020-08-31T18:29:43Z
2019-05-30T21:03:24Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/317125', 'https://www.npmjs.com/advisories/608'}
null
npm
GHSA-p8c3-7rj8-q963
ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign
### Impact Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as: - wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct) - prepending zeros with ASN.1 INTEGER value (ex. 0x00000123 even though 0x0123 is correct) - appending zeros to signature of ASN.1 TLV (ex. 0x3082....1fbc000000 even though 0x3082....1fbc, appending zeros are ignored.) This vulnerability was fixed by strict ASN.1 DER checking. Here is an assessment of this vulnerability: - If you are not use ECDSA signature validation, this vulnerability is not affected. - Not ASN.1 format signature like just concatenation of R and S value is not affected such as Bitcoin. - This vulnerability is affected to all ECC curve parameters. - Risk to accept a forged or crafted message to be signed is low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. - ECDSA signatures semantically the same to valid one may be accepted as valid. There are many malleable variants. As discussed [here](https://crypto.stackexchange.com/questions/24862/ber-or-der-x9-62-for-ecdsa-signature), there is no standards like X9.62 which requires ASN.1 DER. So ASN.1 BER can be applied to ECDSA however most of implementations like OpenSSL do strict ASN.1 DER checking. ### Patches Users using ECDSA signature validation should upgrade to 8.0.19. ### Workarounds Do strict ASN.1 DER checking for ASN.1 encoded ECDSA signature value. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-14966 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966 https://vuldb.com/?id.157123 https://github.com/kjur/jsrsasign/issues/437 https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER https://www.itu.int/rec/T-REC-X.690
{'CVE-2020-14966'}
2021-10-06T22:01:36Z
2020-06-26T16:54:15Z
HIGH
null
{'CWE-347'}
{'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://github.com/kjur/jsrsasign/issues/437', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://kjur.github.io/jsrsasign/api/symbols/ASN1HEX.html#.checkStrictDER', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://kjur.github.io/jsrsasign/api/symbols/KJUR.crypto.ECDSA.html', 'https://vuldb.com/?id.157123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14966', 'https://www.npmjs.com/package/jsrsasign', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17'}
null
npm
GHSA-86p3-4gfq-38f2
Denial of Service in url-relative
All versions of `url-relative` are vulnerable to Denial of Service. If the values `to` and `from` are equal, the function hangs and never returns. This may cause a Denial of Service. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-08-04T21:31:03Z
2019-06-05T14:10:34Z
MODERATE
null
{'CWE-400'}
{'https://github.com/junosuarez/url-relative/issues/3', 'https://snyk.io/vuln/SNYK-JS-URLRELATIVE-173691', 'https://www.npmjs.com/advisories/783'}
null
npm
GHSA-27fj-mc8w-j9wg
RSA signature validation vulnerability on maleable encoded message in jsrsasign
### Impact Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding. Decoded RSA signature value consists following form: 01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo] Its byte length shall be the same as RSA key length however such checking was not sufficient. To make crafted message for practical attack is very hard. ### Patches Users validating RSA signature should upgrade to 10.2.0 or later. ### Workarounds There is no workaround. Not to use RSA signature validation in jsrsasign. ### ACKNOWLEDGEMENT Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.
{'CVE-2021-30246'}
2021-04-15T16:17:08Z
2021-04-16T19:52:35Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-27fj-mc8w-j9wg', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/issues/478'}
null
npm
GHSA-3v5x-qjrp-q2hq
Unrestricted Upload of File with Dangerous Type in ButterCMS
An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.
{'CVE-2022-27260'}
2022-04-22T21:02:44Z
2022-04-13T00:00:24Z
CRITICAL
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27260', 'https://github.com/ButterCMS/buttercms-js', 'https://www.youtube.com/watch?v=Tw8OhtVd-mE'}
null
npm
GHSA-cfjh-p3g4-3q2f
VBScript Content Injection in marked
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. ## Proof of Concept ( IE10 Compatibility Mode Only ) `[xss link](vbscript:alert(1&#41;)` will get a link `<a href="vbscript:alert(1)">xss link</a>` ## Recommendation Update to version 0.3.3 or later.
{'CVE-2015-1370'}
2021-09-09T17:02:02Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/markedjs/marked', 'https://www.npmjs.com/advisories/24', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://nodesecurity.io/advisories/marked_vbscript_injection', 'https://github.com/chjj/marked/issues/492', 'https://github.com/markedjs/marked/issues/492', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://www.npmjs.com/advisories/24/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}
null
npm
GHSA-gqq4-937c-2282
Malicious Package in juffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:18:15Z
2020-09-03T22:49:42Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1272'}
null
npm
GHSA-wfrj-qqc2-83cm
Remote command injection when using sendmail email transport
### Impact Sites using the `sendmail` transport as part of their `mail` config are vulnerable to remote command injection due to a [vulnerability](https://github.com/advisories/GHSA-48ww-j4fc-435p) in the `nodemailer` dependency. Ghost defaults to the `direct` transport so this is only exploitable if the `sendmail` transport is explicitly used. ### Patches Fixed in 4.15.0, all sites should upgrade as soon as possible. ### Workarounds * Use an alternative email transport as described in the [docs](https://ghost.org/docs/config/#mail). ### For more information If you have any questions or comments about this advisory: * email us at security@ghost.org
null
2021-09-17T17:48:56Z
2021-09-20T19:52:41Z
MODERATE
null
{'CWE-88'}
{'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://github.com/TryGhost/Ghost', 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-wfrj-qqc2-83cm'}
null
npm
GHSA-7752-f4gf-94gc
Cross-Site Scripting in materialize-css
All versions of `materialize-css` are vulnerable to Cross-Site Scripting. The `autocomplete` component does not sufficiently sanitize user input, allowing an attacker to execute arbitrary JavaScript code if the malicious input is rendered by a user. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-11003'}
2021-09-02T19:56:38Z
2019-04-09T19:44:38Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11003', 'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-174144', 'https://github.com/Dogfalo/materialize/issues/6286', 'https://github.com/advisories/GHSA-7752-f4gf-94gc', 'https://www.npmjs.com/advisories/817'}
null
npm
GHSA-4rv9-5vc4-88cg
Command injection in node-ps
This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.
{'CVE-2020-7785'}
2021-03-16T00:59:16Z
2021-03-19T21:21:06Z
CRITICAL
null
{'CWE-78'}
{'https://www.npmjs.com/package/node-ps', 'https://snyk.io/vuln/SNYK-JS-NODEPS-1048335', 'https://github.com/fortruce/node-ps/blob/master/lib/index.js%23L72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7785'}
null
npm
GHSA-5pm8-492c-92p5
Prototype Pollution in chartkick
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. ## Recommendation Upgrade to version 3.2.0 or later.
{'CVE-2019-18841'}
2022-03-03T05:12:51.639263Z
2019-12-02T18:04:11Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1312', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://github.com/ankane/chartkick/commits/master', 'https://github.com/ankane/chartkick.js/issues/117', 'https://rubygems.org/gems/chartkick/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://chartkick.com', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'}
null
npm
GHSA-ww6v-677g-p656
Sandbox Breakout in safe-eval
Affected versions of `safe-eval` are vulnerable to a sandbox escape. By accessing object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox. ## Proof of Concept: This code accesses the process object and calls `.exit()` ``` var safeEval = require('safe-eval'); safeEval("this.constructor.constructor('return process')().exit()"); ``` ## Recommendation Update to version 0.4.0 or later
{'CVE-2017-16088'}
2020-08-31T18:19:47Z
2018-07-18T18:28:10Z
CRITICAL
null
{'CWE-610'}
{'https://www.npmjs.com/advisories/337', 'https://nodesecurity.io/advisories/337', 'https://github.com/advisories/GHSA-ww6v-677g-p656', 'https://github.com/hacksparrow/safe-eval/pull/13', 'https://github.com/hacksparrow/safe-eval/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16088', 'https://github.com/patriksimek/vm2/issues/59'}
null
npm
GHSA-hxhm-96pp-2m43
Remote Code Execution in Angular Expressions
### Impact The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. * If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). * If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. ### Patches Users should upgrade to version 1.0.1 of angular-expressions ### Workarounds A temporary workaround might be either to : * disable user-controlled input that will be fed into angular-expressions in your application OR * allow only following characters in the userControlledInput : ```js if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) { var result = expressions.compile(userControlledInput); } else { result = undefined; } ``` ### References [Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues) * [Email us](mailto:contact@javascript-ninja.fr) ### Credits The issue was reported by Maxime Nadeau from GoSecure, Inc.
{'CVE-2020-5219'}
2021-01-08T20:33:38Z
2020-01-24T15:27:25Z
HIGH
null
{'CWE-74'}
{'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43'}
null
npm
GHSA-9jf3-f2pg-7868
Downloads Resources over HTTP in nw-with-arm
Affected versions of `nw-with-arm` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw-with-arm`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10629'}
2021-01-08T21:05:11Z
2019-02-18T23:57:01Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/226', 'https://github.com/advisories/GHSA-9jf3-f2pg-7868', 'https://www.npmjs.com/advisories/226', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10629'}
null
npm
GHSA-4328-8hgf-7wjr
Global node_modules Binary Overwrite in npm
Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.4 or later.
{'CVE-2019-16777'}
2021-01-08T21:28:01Z
2019-12-13T15:39:32Z
LOW
null
{'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2020:0573', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777', 'https://www.npmjs.com/advisories/1437', 'https://access.redhat.com/errata/RHEA-2020:0330', 'https://security.gentoo.org/glsa/202003-48', 'https://github.com/advisories/GHSA-4328-8hgf-7wjr', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}
null
npm
GHSA-gh88-3pxp-6fm8
Infinite Loop in colors.js
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to have been revoked in an attempt to prevent them from fixing the issue. Vulnerable Code js for (let i = 666; i < Infinity; i++;) { Alternative Remediation Suggested * Pin dependancy to 1.4.0
{'CVE-2021-23567'}
2022-01-21T21:04:45Z
2022-01-21T23:39:50Z
HIGH
null
{'CWE-835'}
{'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://snyk.io/blog/open-source-maintainer-pulls-the-plug-on-npm-packages-colors-and-faker-now-what/'}
null
npm
GHSA-2479-qvv7-47qq
Denial of Service in parse-server
Versions of `parse-server` prior to 3.4.1 are vulnerable to Denial of Service (DoS). POST requests to `/parse/classes/_Audience` (or other volatile classes) cause the server to respond with a `500 Internal Server Error` for any subsequent POST requests. ## Recommendation Upgrade to version 3.4.1 or later.
{'CVE-2019-1020012'}
2021-08-30T15:00:14Z
2019-06-13T16:22:13Z
HIGH
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1020012', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2479-qvv7-47qq', 'https://github.com/advisories/GHSA-2479-qvv7-47qq', 'https://github.com/parse-community/parse-server', 'https://www.npmjs.com/advisories/1113', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455635'}
null
npm
GHSA-7prf-vw4p-qr59
Prototype pollution in supermixer
Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
{'CVE-2020-24939'}
2021-06-22T15:45:35Z
2021-12-10T19:03:07Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://github.com/stampit-org/supermixer/issues/9', 'https://hackerone.com/reports/959987', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
null
npm
GHSA-765h-qjxv-5f44
Prototype Pollution in handlebars
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
{'CVE-2021-23383'}
2021-05-19T21:17:59Z
2022-02-10T23:51:42Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279030', 'https://www.npmjs.com/package/handlebars', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029'}
null
npm
GHSA-9w87-4j72-gcv7
Insecure Default Configuration in graphql-code-generator
Versions of `graphql-code-generator` prior to 0.18.2 have an Insecure Default Configuration. The packages sets `NODE_TLS_REJECT_UNAUTHORIZED` to 0, disabling certificate verification for the entire project. This results in Insecure Communication for the process. ## Recommendation Upgrade to version 0.18.2 or later.
null
2020-08-31T18:37:32Z
2020-09-02T18:27:54Z
HIGH
null
null
{'https://www.npmjs.com/advisories/834', 'https://github.com/dotansimha/graphql-code-generator/issues/1806'}
null
npm
GHSA-2fmp-7xwf-wvwr
Arbitrary File Read in Snyk Broker
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
{'CVE-2020-7650'}
2021-07-29T17:47:30Z
2020-06-03T22:02:16Z
MODERATE
null
{'CWE-22'}
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570609', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7650'}
null
npm
GHSA-5ggx-g294-qj3q
Malicious Package in buffeb-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:57:42Z
2020-09-03T21:47:29Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1239'}
null
npm
GHSA-ff7x-qrg7-qggm
Prototype Pollution in dot-prop
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
{'CVE-2020-8116'}
2022-01-04T19:34:31Z
2020-07-29T20:56:59Z
HIGH
null
{'CWE-425', 'CWE-471'}
{'https://hackerone.com/reports/719856', 'https://github.com/sindresorhus/dot-prop/tree/v4', 'https://github.com/advisories/GHSA-ff7x-qrg7-qggm', 'https://github.com/sindresorhus/dot-prop', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8116', 'https://github.com/sindresorhus/dot-prop/issues/63'}
null
npm
GHSA-qh73-qc3p-rjv2
Uncaught Exception in fastify-multipart
### Impact This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a `name=constructor` property it is still possible to crash the application. The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116). All users are recommended to upgrade ### Patches v5.3.1 includes a patch ### Workarounds No workarounds are possible. ### References Read up https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/fastify/fastify-multipart](https://github.com/fastify/fastify-multipart) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-23597'}
2022-02-23T22:11:16Z
2022-02-11T18:57:53Z
HIGH
null
{'CWE-400'}
{'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066', 'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597', 'https://snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-2395480', 'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2'}
null
npm
GHSA-wv2f-3rxv-jqhp
Path Traversal in general-file-server
All versions of `general-file-server` are vulnerable to path traversal. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not use this module until a fix has been provided.
{'CVE-2018-3724'}
2020-08-31T18:29:05Z
2018-07-26T15:21:04Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-wv2f-3rxv-jqhp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3724', 'https://hackerone.com/reports/310943', 'https://www.npmjs.com/advisories/592'}
null
npm
GHSA-f3vw-587g-r29g
Path Traversal in sapper
Versions of `sapper` prior to 0.27.11 are vulnerable to Path Traversal. It is possible to access sensitive files on the server through HTTP requests containing URL-encoded `../`. You may test a `sapper` application running in prod mode with `curl -vvv http://localhost:3000/client/750af05c3a69ddc6073a/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/etc/passwd`. ## Recommendation Upgrade to version 0.27.11 or later.
null
2020-08-31T19:01:20Z
2020-09-03T15:50:38Z
CRITICAL
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1494'}
null
npm
GHSA-984p-xq9m-4rjw
Rate Limiting Bypass in express-brute
All versions of `express-brute` are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-08-04T21:03:16Z
2019-06-07T21:01:53Z
MODERATE
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/823', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457', 'https://github.com/AdamPflug/express-brute/issues/46'}
null
npm
GHSA-hg79-j56m-fxgv
Cross-Site Scripting in react
Versions of `react` prior to 0.14.0 are vulnerable to Cross-Site Scripting (XSS). The package's `createElement` function fails to properly validate its input object, allowing attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 0.14.0 or later.
null
2021-10-01T20:15:16Z
2020-09-04T15:26:04Z
HIGH
null
{'CWE-79'}
{'https://reactjs.org/blog/2015/10/07/react-v0.14.html#notable-enhancements', 'https://reactjs.org/blog/2019/10/22/react-release-channels.html#experimental-channel', 'https://github.com/facebook/react', 'http://danlec.com/blog/xss-via-a-spoofed-react-element', 'https://www.npmjs.com/advisories/1347', 'https://snyk.io/vuln/npm:react:20150318'}
null
npm
GHSA-27wq-qx3q-fxm9
Improper Handling of Unexpected Data Type in ced
### Impact In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. ### Patches The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes. ### Workarounds Before passing an argument to ced, verify it’s a `Buffer` using [`Buffer.isBuffer(obj)`](https://nodejs.org/api/buffer.html#buffer_static_method_buffer_isbuffer_obj). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since ced is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to ced. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const bodyParser = require("body-parser"); const ced = require("ced"); const app = express(); app.use(bodyParser.raw()); app.post("/", (req, res) => { const encoding = ced(req.body); res.end(encoding); }); app.listen(3000); ``` `curl --request POST --header "Content-Type: text/plain" --data foo http://localhost:3000` crashes the server. ### References - https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3
{'CVE-2021-39131'}
2021-10-21T14:15:51Z
2021-08-23T19:42:28Z
HIGH
null
{'CWE-241'}
{'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'}
null
npm
GHSA-rwxp-hwwf-653v
Insecure template handling in express-hbs
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .hbs appended to them. For complete details refer to the referenced GHSL-2021-019 report. Notes in documentation have been added to help users of express-hbs avoid this potential information exposure vulnerability.
{'CVE-2021-32817'}
2021-05-17T19:09:07Z
2021-05-17T20:58:51Z
MODERATE
null
{'CWE-200'}
{'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://www.npmjs.com/package/express-hbs', 'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32817'}
null
npm
GHSA-8v9x-9xqg-r8mr
Prototype pollution in json8-merge-patch
Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.
{'CVE-2020-8268'}
2021-04-19T22:31:31Z
2021-05-10T19:17:15Z
HIGH
null
{'CWE-471', 'CWE-20', 'CWE-1321'}
{'https://hackerone.com/reports/980649', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://github.com/sonnyp/JSON8/issues/113', 'https://www.npmjs.com/package/json8-merge-patch', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268'}
null
npm
GHSA-2j5v-fc74-j9q2
Cross-Site Scripting in editor.md
All versions of `editor.md` are vulnerable to Cross-Site Scripting. User input is insufficiently sanitized, allowing attackers to inject malicious code in payloads containing base64-encoded content. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-9737'}
2021-08-30T21:58:23Z
2019-03-14T15:38:56Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-2j5v-fc74-j9q2', 'https://www.npmjs.com/advisories/794', 'https://github.com/pandao/editor.md/issues/662', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9737'}
null
npm
GHSA-c3px-v9c7-m734
Prototype Pollution in mithril
Affected versions of `mithril`are vulnerable to prototype pollution. The function `parseQueryString` may allow a malicious user to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. A payload such as `__proto__%5BtoString%5D=123` in the query string would change the `toString()` function to `123`. ## Recommendation If you are using mithril 2.x, upgrade to version 2.0.2 or later. If you are using mithril 1.x, upgrade to version 1.1.7 or later.
null
2020-08-31T18:47:02Z
2020-09-03T19:04:39Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1094'}
null
npm
GHSA-v6c5-hwqg-3x5q
Improper Authorization in passport-cognito
All versions of `passport-cognito` are vulnerable to Improper Authorization. The package fails to properly scope the variables containing authorization information, such as access token, refresh token and ID token. This causes a race condition where simultaneous authenticated users may receive authorization tokens for a different user. This would allow a user to take actions on another user's behalf. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-19723'}
2020-08-31T18:59:30Z
2020-09-04T17:23:03Z
CRITICAL
null
{'CWE-285'}
{'https://www.npmjs.com/advisories/1443', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19723'}
null
npm
GHSA-44g9-w23c-5rw7
Directory Traversal in nhouston
All versions of the static file server module nhouston are vulnerable to directory traversal. An attacker can provide input such as `../` to read files outside of the served directory. ## Recommendation It is recommended that a different module be used, as we have been unable to reacher the maintainer of this module. We will continue to reach out to them, and if an update becomes available that fixes the issue, we will update this advisory accordingly.
{'CVE-2014-8883'}
2021-09-23T20:57:48Z
2020-08-31T22:53:54Z
MODERATE
null
{'CWE-23'}
{'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8883', 'https://snyk.io/vuln/npm:nhouston:20141114', 'https://www.npmjs.com/advisories/25'}
null
npm
GHSA-8wg9-92fr-6j7v
Downloads Resources over HTTP in marionette-socket-host
Affected versions of `marionette-socket-host` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `marionette-socket-host`. ## Recommendation No patch is currently available for this vulnerability, and the package author has removed the package from their Github account. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10648'}
2021-09-16T20:53:53Z
2018-08-15T18:50:31Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nodesecurity.io/advisories/252', 'https://github.com/advisories/GHSA-8wg9-92fr-6j7v', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10648', 'https://www.npmjs.com/advisories/252', 'https://github.com/mozilla-b2g/marionette-socket-host'}
null
npm
GHSA-4ccc-jm2p-vg3p
Downloads Resources over HTTP in windows-latestchromedriver
Affected versions of `windows-latestchromedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-latestchromedriver`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10696'}
2021-01-14T15:56:39Z
2020-09-01T16:14:22Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/295', 'https://www.npmjs.com/advisories/295', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10696'}
null
npm
GHSA-x8m7-cv39-xmg9
Malicious Package in jq-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:35:22Z
2020-09-03T22:56:10Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1278'}
null
npm
GHSA-whgm-jr23-g3j9
Uncontrolled Resource Consumption in ansi-html
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
{'CVE-2021-23424'}
2021-09-07T21:02:12Z
2021-09-02T17:15:24Z
HIGH
null
{'CWE-400'}
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69', 'https://github.com/Tjatse/ansi-html', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424', 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849'}
null
npm
GHSA-7qcx-jmrc-h2rr
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser. ## Recommendation Update to version 4.0.0 or later.
{'CVE-2017-15878'}
2021-09-03T21:41:16Z
2017-11-15T19:44:16Z
MODERATE
null
{'CWE-79'}
{'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'http://www.securityfocus.com/bid/101541', 'https://www.npmjs.com/advisories/980', 'https://www.exploit-db.com/exploits/43054/', 'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/keystonejs/keystone', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878', 'https://github.com/keystonejs/keystone/pull/4478'}
null
npm
GHSA-wv67-9jq7-8r69
Improper Input Validation and Buffer Over-read in mqtt-packet
A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.
{'CVE-2019-5432'}
2021-08-03T21:47:43Z
2019-05-14T04:02:45Z
HIGH
null
{'CWE-126', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5432', 'https://hackerone.com/reports/541354'}
null
npm
GHSA-689x-x68p-fph3
Cross-site Scripting in vditor
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
{'CVE-2022-0350'}
2022-04-08T22:08:10Z
2022-04-01T00:00:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/vanessa219/vditor', 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}
null
npm
GHSA-4jj4-m52p-8rx3
Prototype pollution in set-object-value
Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28281'}
2021-04-07T22:31:58Z
2021-04-13T15:24:08Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28281', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281', 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16'}
null
npm
GHSA-j87c-cj65-vmh5
High severity vulnerability that affects rendertron
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
{'CVE-2017-18354'}
2021-09-14T19:19:11Z
2019-01-04T17:41:51Z
HIGH
null
{'CWE-22'}
{'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
null
npm
GHSA-78p3-96hc-3j47
Malicious Package in jquery-airload
Version 0.2.5 of `jquery-airload` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:19Z
2020-09-03T19:11:17Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1102'}
null
npm
GHSA-vx5c-87qx-cv6c
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2017-1001002'}
2021-06-10T20:06:12Z
2017-12-18T22:27:45Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/552', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}
null
npm
GHSA-xw5p-hw6r-2j98
Denial of service in fastify
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
{'CVE-2020-8192'}
2020-08-03T21:25:40Z
2020-08-05T14:53:22Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8192', 'https://hackerone.com/reports/903521', 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}
null
npm
GHSA-x3j8-g4v9-67jq
Downloads Resources over HTTP in pennyworth
Affected versions of `pennyworth` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10619'}
2021-01-08T00:47:47Z
2019-02-18T23:56:51Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10619', 'https://www.npmjs.com/advisories/213', 'https://nodesecurity.io/advisories/213', 'https://github.com/advisories/GHSA-x3j8-g4v9-67jq'}
null
npm
GHSA-5888-ffcr-r425
Prototype Pollution leading to Remote Code Execution in superjson
### Impact This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. In the case of Blitz.js, it would be at least one RPC call. ### Patches This has been patched in superjson 1.8.1 and Blitz.js 0.45.3. If you are unable to upgrade to Blitz.js 0.45.3 in a timely manner, you can instead upgrade only superjson to version 1.8.1 using yarn resolutions are similar. Blitz versions < 0.45.3 are only affected because they used superjson versions < 1.8.1. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/blitz-js/superjson * Email us at b@bayer.ws
{'CVE-2022-23631'}
2022-02-09T22:20:49Z
2022-02-09T22:20:49Z
CRITICAL
null
{'CWE-94', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23631', 'https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425', 'https://github.com/blitz-js/superjson'}
null
npm
GHSA-v45m-2wcp-gg98
Global node_modules Binary Overwrite in bin-links
Versions of `bin-links` prior to 1.1.6 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent globally-installed binaries to be overwritten by other package installs. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This behavior is still allowed in local installations. ## Recommendation Upgrade to version 1.1.6 or later.
null
2020-08-31T18:59:19Z
2020-09-04T17:18:44Z
LOW
null
null
{'https://www.npmjs.com/advisories/1438'}
null
npm
GHSA-42xw-2xvc-qx8m
Denial of Service in axios
Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service. ## Recommendation Upgrade to 0.18.1 or later.
{'CVE-2019-10742'}
2021-07-27T20:36:18Z
2019-05-29T18:04:45Z
HIGH
null
{'CWE-20', 'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10742', 'https://github.com/axios/axios/pull/1485', 'https://github.com/axios/axios/issues/1098', 'https://snyk.io/vuln/SNYK-JS-AXIOS-174505', 'https://www.npmjs.com/advisories/880', 'https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505'}
null
npm
GHSA-7j93-5m2h-rvjx
Malicious Package in bconi
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:37:33Z
2020-09-04T15:32:46Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1353'}
null
npm
GHSA-r587-7jh2-4qr3
Server secret was included in static assets and served to clients
### Impact Server JWT signing secret was included in static assets and served to clients. This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**. ### Background Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`. Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood. ### Patches Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components. Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend). ### Workarounds Users shall upgrade if they use Flood's builtin authentication system. While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments. > Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication. Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions. ### References [Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions) [Introduction to JSON Web Tokens](https://jwt.io/introduction/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue tracker](https://github.com/jesec/flood/issues) * Email us at [jc@linux.com](mailto:jc@linux.com)
null
2020-08-26T19:32:37Z
2020-08-26T19:32:50Z
CRITICAL
null
null
{'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}
null
npm
GHSA-4r5x-qjqc-p579
Tracking Module in botbait
The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. `botbait` is known to record and track user information. The module tracks the following information. - Source IP - process.versions - process.platform - How the module was invoked (test, require, pre-install) ## Recommendation This package has no functional value, and should be removed from your environment if discovered.
{'CVE-2017-16126'}
2021-09-23T21:47:44Z
2020-09-01T18:57:44Z
MODERATE
null
{'CWE-200'}
{'https://www.npmjs.com/advisories/483', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126', 'https://nodesecurity.io/advisories/483'}
null
npm
GHSA-q75g-2496-mxpp
Regular Expression Denial of Service in parsejson
Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input. ## Recommendation The `parsejson` package has not been functionally updated since it was initially released. Additionally, it provides functionality which is natively included in Node.js, and therefore the native `JSON.parse()` should be used, for both performance and security reasons.
{'CVE-2017-16113'}
2020-08-31T18:26:32Z
2018-07-24T20:11:13Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16113', 'https://github.com/advisories/GHSA-q75g-2496-mxpp', 'https://nodesecurity.io/advisories/528', 'https://github.com/get/parsejson/issues/4', 'https://www.npmjs.com/advisories/528'}
null
npm
GHSA-652h-xwhf-q4h6
OS Command Injection in ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
{'CVE-2020-26301'}
2021-09-21T14:50:54Z
2021-09-21T16:50:46Z
HIGH
null
{'CWE-78'}
{'https://github.com/mscdex/ssh2', 'https://www.npmjs.com/package/ssh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21', 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/'}
null
npm
GHSA-273r-mgr4-v34f
Uncaught Exception in engine.io
### Impact A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. > RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear > at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14) > at Receiver.startLoop (/.../node_modules/ws/lib/receiver.js:136:22) > at Receiver._write (/.../node_modules/ws/lib/receiver.js:83:10) > at writeOrBuffer (internal/streams/writable.js:358:12) This impacts all the users of the [`engine.io`](https://www.npmjs.com/package/engine.io) package starting from version `4.0.0`, including those who uses depending packages like [`socket.io`](https://www.npmjs.com/package/socket.io). ### Patches A fix has been released for each major branch: | Version range | Fixed version | | --- | --- | | `engine.io@4.x.x` | `4.1.2` | | `engine.io@5.x.x` | `5.2.1` | | `engine.io@6.x.x` | `6.1.1` | Previous versions (`< 4.0.0`) are not impacted. For `socket.io` users: | Version range | `engine.io` version | Needs minor update? | | --- | --- | --- | | `socket.io@4.4.x` | `~6.1.0` | - | `socket.io@4.3.x` | `~6.0.0` | Please upgrade to `socket.io@4.4.x` | `socket.io@4.2.x` | `~5.2.0` | - | `socket.io@4.1.x` | `~5.1.1` | Please upgrade to `socket.io@4.4.x` | `socket.io@4.0.x` | `~5.0.0` | Please upgrade to `socket.io@4.4.x` | `socket.io@3.1.x` | `~4.1.0` | - | `socket.io@3.0.x` | `~4.0.0` | Please upgrade to `socket.io@3.1.x` or `socket.io@4.4.x` (see [here](https://socket.io/docs/v4/migrating-from-3-x-to-4-0/)) In most cases, running `npm audit fix` should be sufficient. You can also use `npm update engine.io --depth=9999`. ### Workarounds There is no known workaround except upgrading to a safe version. ### For more information If you have any questions or comments about this advisory: * Open an issue in [`engine.io`](https://github.com/socketio/engine.io) Thanks to Marcus Wejderot from Mevisio for the responsible disclosure.
{'CVE-2022-21676'}
2022-01-21T13:25:59Z
2022-01-13T16:14:17Z
HIGH
null
{'CWE-754'}
{'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/releases/tag/5.2.1', 'https://github.com/socketio/engine.io/', 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab', 'https://github.com/socketio/engine.io/releases/tag/6.1.1', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21676', 'https://github.com/socketio/engine.io/releases/tag/4.1.2'}
null
npm
GHSA-v9wp-8r97-v6xg
Cross-Site Scripting in jquery.json-viewer
Versions of `jquery.json-viewer` prior to 1.3.0 are vulnerable to Cross-Site Scripting (XSS). The package insufficiently sanitizes user input when creating links, and concatenates the user input in an `<a>` tag. This allows attackers to create malicious links with JSON payloads such as: ``` { "foo": "https://bar.com\" onmouseover=alert('xss') \"" } ``` This may lead to arbitrary JavaScript execution in a victim's browser. ## Recommendation Upgrade to version 1.3.0 or later.
null
2020-08-31T18:44:56Z
2020-09-03T17:17:00Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1036'}
null