ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-xgp2-cc4r-7vf6
|
Denial of Service in http-live-simulator
|
Versions of `http-live-simulator` prior to 1.0.8 are vulnerable to Denial of Service. The package fails to catch an exception that causes the Node process to crash, effectively shutting down the server. This allows an attacker to send an HTTP request that crashes the server.
## Recommendation
Upgrade to version 1.0.8 or later.
| null |
2020-08-31T18:50:28Z
|
2020-09-03T20:44:21Z
|
MODERATE
| null | null |
{'https://hackerone.com/reports/627376', 'https://www.npmjs.com/advisories/1189'}
| null |
npm
|
GHSA-cxm3-284p-qc4v
|
Prototype Pollution in sds
|
Affected versions of `sds` are vulnerable to prototype pollution. The `set` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 4.0.0 or later
|
{'CVE-2020-7618'}
|
2021-07-29T15:56:20Z
|
2020-09-03T15:53:12Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://www.npmjs.com/advisories/1506', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7618', 'https://snyk.io/vuln/SNYK-JS-SDS-564123', 'https://github.com/monsterkodi/sds/blob/master/js/set.js#L31'}
| null |
npm
|
GHSA-qj3g-wfr7-3cv7
|
Malicious Package in require-ports
|
Version 10.4.0 of `require-ports` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:56:11Z
|
2020-09-02T21:41:53Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/909'}
| null |
npm
|
GHSA-wxgw-qj99-44c2
|
Prototype Pollution in node-forge util.setPath API
|
### Impact
`forge.util.setPath` had a potential prototype pollution issue if called with untrusted keys. This API was not used by forge itself.
### Patches
The `forge.util.setPath` API and related functions were removed in 0.10.0.
### Workarounds
Don't call `forge.util.setPath` directly or indirectly with untrusted keys.
### References
- https://security.snyk.io/vuln/SNYK-JS-NODEFORGE-598677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7720
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge).
* Email us at support@digitalbazaar.com.
| null |
2022-01-07T22:20:50Z
|
2022-01-08T00:22:40Z
|
LOW
| null | null |
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2'}
| null |
npm
|
GHSA-jhgp-hvj6-x2p2
|
Stored Cross-Site Scripting in tianma-static
|
All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static`
## Recommendation
As no fix is available for this vulnerability at this time it is our recommendation to use another static file server.
|
{'CVE-2018-16474'}
|
2020-08-31T18:34:08Z
|
2018-11-06T23:12:01Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/403692', 'https://www.npmjs.com/advisories/741', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474', 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2'}
| null |
npm
|
GHSA-vj72-mwrj-m2xq
|
Prototype Pollution in deepmergefn
|
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
|
{'CVE-2021-23417'}
|
2021-08-31T21:21:45Z
|
2021-08-10T16:09:25Z
|
MODERATE
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/jesusgm/deepmergefn/blob/master/index.js#23L6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23417', 'https://github.com/jesusgm/deepmergefn', 'https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984'}
| null |
npm
|
GHSA-9p49-cwh3-4qhf
|
Malicious Package in grunt-radic
|
Version 0.1.1 of `grunt-radic` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:04Z
|
2020-09-11T21:21:19Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/934'}
| null |
npm
|
GHSA-jp6r-xcjj-5h7r
|
Cross-Site Scripting in cyberchef
|
Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 8.31.3 or later.
|
{'CVE-2019-15532'}
|
2021-08-17T22:11:11Z
|
2019-08-27T17:36:32Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1149', 'https://github.com/gchq/CyberChef/issues/544', 'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf', 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2', 'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296', 'https://github.com/gchq/CyberChef/issues/539', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532'}
| null |
npm
|
GHSA-wmcq-3wfx-qjx5
|
Directory Traversal in nodeload-nmickuli
|
Affected versions of `nodeload-nmickuli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2020-08-31T18:22:02Z
|
2020-09-01T17:33:30Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeload-nmickuli', 'https://www.npmjs.com/advisories/410'}
| null |
npm
|
GHSA-cx8m-8xmx-q8v3
|
Denial of Service in memjs
|
Versions of `memjs` prior to 1.2.2 are vulnerable to Denial of Service (DoS). The package fails to sanitize the `value` option passed to the Buffer constructor, which may allow attackers to pass large values exhausting system resources.
## Recommendation
Upgrade to version 1.2.2 or later.
|
{'CVE-2018-3767'}
|
2020-08-31T18:42:27Z
|
2018-10-10T17:25:12Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://hackerone.com/reports/319809', 'https://github.com/advisories/GHSA-cx8m-8xmx-q8v3', 'https://www.npmjs.com/advisories/970', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3767'}
| null |
npm
|
GHSA-xr3g-4gg5-w3wq
|
Malicious Package in degbu
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:00:58Z
|
2020-09-03T17:06:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1393'}
| null |
npm
|
GHSA-5f7m-mmpc-qhh4
|
Remote Memory Exposure in mysql
|
Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure.
Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password.
Only `mysql` running on Node.js versions below 6.0.0 is affected due to a throw added in newer node.js versions.
Proof of Concept:
```
require('mysql').createConnection({
host: 'localhost',
user: 'user',
password : USERPROVIDEDINPUT, // number
database : 'my_db'
}).connect();
```
## Recommendation
Update to version 2.14.0 or later.
| null |
2020-08-31T18:29:28Z
|
2019-05-23T09:27:00Z
|
MODERATE
| null |
{'CWE-201'}
|
{'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52', 'https://www.npmjs.com/advisories/602', 'https://nodesecurity.io/advisories/602'}
| null |
npm
|
GHSA-rrfc-g2gh-xvjm
|
Directory Traversal in 22lixian
|
Affected versions of `22lixian` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16162'}
|
2020-08-31T18:21:29Z
|
2018-07-23T20:46:07Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16162', 'https://nodesecurity.io/advisories/390', 'https://github.com/advisories/GHSA-rrfc-g2gh-xvjm', 'https://www.npmjs.com/advisories/390', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian'}
| null |
npm
|
GHSA-jv35-xqg7-f92r
|
Prototype Pollution
|
Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25949'}
|
2021-10-21T13:11:54Z
|
2021-06-21T17:16:09Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25949', 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949', 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56', 'https://github.com/doowb/set-getter'}
| null |
npm
|
GHSA-8j4w-5fw4-rm27
|
Prototype Pollution in deeply
|
Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
Upgrade to version 3.1.0 or later.
|
{'CVE-2019-10750'}
|
2021-08-17T22:18:25Z
|
2019-08-27T17:45:33Z
|
CRITICAL
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1030', 'https://snyk.io/vuln/SNYK-JS-DEEPLY-451026', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10750'}
| null |
npm
|
GHSA-mq6c-fh97-4gwv
|
Denial of Service vulnerability with large JSON payloads in fastify
|
Affected versions of `fastify` are vulnerable to a denial of service when processing a request with `Content-Type` set to `application/json` and a very large payload.
## Recommendation
Update to version 0.38.0 or later.
|
{'CVE-2018-3711'}
|
2022-03-01T22:18:16Z
|
2018-07-18T21:20:34Z
|
HIGH
| null |
{'CWE-770'}
|
{'https://github.com/advisories/GHSA-mq6c-fh97-4gwv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3711', 'https://github.com/fastify/fastify/pull/627', 'https://hackerone.com/reports/303632', 'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76', 'https://www.npmjs.com/advisories/564'}
| null |
npm
|
GHSA-vpj4-89q8-rh38
|
Cross-Site Scripting in bpmn-js-properties-panel
|
Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.31.0 or later.
| null |
2020-08-31T18:46:32Z
|
2020-09-03T18:16:59Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1079'}
| null |
npm
|
GHSA-74fj-2j2h-c42q
|
Exposure of sensitive information in follow-redirects
|
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
|
{'CVE-2022-0155'}
|
2022-01-20T15:34:48Z
|
2022-01-12T22:46:26Z
|
HIGH
| null |
{'CWE-359'}
|
{'https://github.com/follow-redirects/follow-redirects/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155', 'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22', 'https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406'}
| null |
npm
|
GHSA-p8fm-w787-x6x3
|
Malicious Package in portionfatty12
|
All versions of `portionfatty12` are considered malicious. The package is malware designed to steal user's data. When installed it uploads the user's public SSH keys to a remote server.
## Recommendation
This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
| null |
2021-10-01T13:42:27Z
|
2020-09-02T15:50:28Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/765'}
| null |
npm
|
GHSA-fgxq-p49f-qw99
|
Directory Traversal in isomorphic-git
|
isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.
|
{'CVE-2021-30483'}
|
2021-08-31T21:02:23Z
|
2021-09-02T22:00:20Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30483', 'https://github.com/isomorphic-git/isomorphic-git', 'https://vuln.ryotak.me/advisories/28', 'https://github.com/isomorphic-git/isomorphic-git/releases/tag/v1.8.2', 'https://github.com/isomorphic-git/isomorphic-git/pull/1339'}
| null |
npm
|
GHSA-43m5-c88r-cjvv
|
XSS due to lack of CSRF validation for replying/publishing
|
### Impact
Due to lack of CSRF validation, a logged in user is potentially vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum.
### Patches
Upgrade to the latest version v0.7.0
### Workarounds
You can cherry-pick the following commit: [https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618](https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618)
### References
Visit https://community.nodebb.org if you have any questions about this issue or on how to patch / upgrade your instance.
|
{'CVE-2020-15156'}
|
2021-01-07T23:39:51Z
|
2020-08-26T18:55:38Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://www.npmjs.com/package/nodebb-plugin-blog-comments', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15156', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/security/advisories/GHSA-43m5-c88r-cjvv', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618'}
| null |
npm
|
GHSA-96r7-mrqf-jhcc
|
Prototype Pollution in ini-parser
|
All versions of `ini-parser` are vulnerable to prototype pollution. The `parse` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2020-7617'}
|
2021-08-30T13:39:02Z
|
2020-06-10T20:27:53Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-INIPARSER-564122', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7617', 'https://www.npmjs.com/advisories/1508', 'https://github.com/rawiroaisen/node-ini-parser/blob/master/index.js#L14'}
| null |
npm
|
GHSA-qcg2-h349-vwm3
|
Cross-site Scripting in React Draft Wysiwyg
|
react-draft-wysiwyg (aka React Draft Wysiwyg) before 1.14.6 allows a javascript: URi in a Link Target of the link decorator in decorators/Link/index.js when a draft is shared across users, leading to XSS.
|
{'CVE-2021-31712'}
|
2021-04-26T18:46:48Z
|
2021-05-06T15:52:35Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31712', 'https://github.com/jpuri/react-draft-wysiwyg/pull/1104', 'https://github.com/jpuri/react-draft-wysiwyg/issues/1102'}
| null |
npm
|
GHSA-f2jv-r9rf-7988
|
Remote code execution in handlebars when compiling templates
|
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
|
{'CVE-2021-23369'}
|
2021-04-23T18:55:25Z
|
2021-05-06T15:57:44Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767', 'https://security.netapp.com/advisory/ntap-20210604-0008/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23369', 'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8'}
| null |
npm
|
GHSA-5rc6-2r3r-fv79
|
Downloads Resources over HTTP in slimerjs-edge
|
Affected versions of `slimerjs-edge` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `slimerjs-edge`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10644'}
|
2021-01-08T19:48:46Z
|
2018-08-15T19:25:47Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/243', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10644', 'https://www.npmjs.com/advisories/243', 'https://github.com/advisories/GHSA-5rc6-2r3r-fv79'}
| null |
npm
|
GHSA-36j3-xxf7-4pqg
|
Universal XSS in Android WebView
|
A universal cross-site scripting (UXSS) vulnerability, CVE-2020-6506 (https://crbug.com/1083819), has been identified in the Android WebView system component, which allows cross-origin iframes to execute arbitrary JavaScript in the top-level document. This vulnerability affects React Native apps which use a `react-native-webview` that allows navigation to arbitrary URLs, and when that app runs on systems with an Android WebView version prior to 83.0.4103.106.
## Pending mitigation
Ensure users update their Android WebView system component via the Google Play Store to 83.0.4103.106 or higher to avoid this UXSS. 'react-native-webview' is working on a mitigation but it could take some time.
### References
https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/
|
{'CVE-2020-6506'}
|
2021-10-06T21:26:56Z
|
2020-10-02T16:22:41Z
|
MODERATE
| null |
{'CWE-79', 'CWE-863'}
|
{'https://security.gentoo.org/glsa/202101-30', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6506', 'https://lists.apache.org/thread.html/r1eadf38b38ee20405811958c8a01f78d6b28e058c84c9fa6c1a8663d@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/rf082834ad237f78a63671aec0cef8874f9232b7614529cc3d3e304c5@%3Ccommits.cordova.apache.org%3E', 'https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html', 'https://github.com/react-native-community/react-native-webview', 'https://alesandroortiz.com/articles/uxss-android-webview-cve-2020-6506/', 'https://lists.apache.org/thread.html/r2769c33da7f7ece7e4e31837c1e1839d6657c7c13bb8d228670b8da0@%3Cissues.cordova.apache.org%3E', 'https://www.npmjs.com/advisories/1560', 'https://security.gentoo.org/glsa/202007-08', 'https://lists.apache.org/thread.html/rc0ebe639927fa09e222aa56bf5ad6e700218f334ecc6ba9da4397728@%3Cissues.cordova.apache.org%3E', 'https://crbug.com/1083819', 'https://lists.apache.org/thread.html/r1ab80f8591d5c2147898076e3945dad1c897513630aabec556883275@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/rc81e12fc9287f8743d59099b1af40f968f1cfec9eac98a63c2c62c69@%3Cissues.cordova.apache.org%3E', 'https://lists.apache.org/thread.html/ra58733fbb88d5c513b3f14a14850083d506b9129103e0ab433c3f680@%3Cissues.cordova.apache.org%3E', 'https://github.com/react-native-community/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg', 'https://github.com/react-native-webview/react-native-webview/security/advisories/GHSA-36j3-xxf7-4pqg'}
| null |
npm
|
GHSA-23wc-v4mf-x7v4
|
Directory Traversal in intsol-package
|
`intsol-package` is a file server.
`intsol-package` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:localhost
```
and the server's Response
```
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16178'}
|
2020-08-31T18:24:00Z
|
2018-07-23T20:44:45Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/461', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16178', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/intsol-package', 'https://www.npmjs.com/advisories/461', 'https://github.com/advisories/GHSA-23wc-v4mf-x7v4'}
| null |
npm
|
GHSA-pwm7-qr6j-3vjg
|
Prototype Pollution in realms-shim
|
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
|
{'CVE-2021-23594'}
|
2022-01-11T18:14:15Z
|
2022-01-12T22:56:13Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/Agoric/realms-shim', 'https://www.npmjs.com/package/realms-shim', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23594', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907'}
| null |
npm
|
GHSA-4852-vrh7-28rf
|
Reflected XSS in GraphQL Playground
|
### Impact
**directly impacted:**
- `graphql-playground-html@<1.6.22` - all unsanitized user input for `renderPlaygroundPage()`
**all of our consuming packages** of `graphql-playground-html` are impacted:
- `graphql-playground-middleware-express@<1.7.16` - unsanitized user input to `expressPlayground()`
- `graphql-playground-middleware-koa@<1.6.15` - unsanitized user input to `koaPlayground()`
- `graphql-playground-middleware-lambda@<1.7.17` - unsanitized user input to `lambdaPlayground()`
- `graphql-playground-middleware-hapi@<1.6.13` - unsanitized user input to `hapiPlayground()`
as well as ***any other packages*** that use these methods with unsanitized user input.
**not impacted:**
- `graphql-playground-electron` - uses `renderPlaygroundPage()` statically for a webpack build for electron bundle, no dynamic user input
- `graphql-playground-react` - usage of the component directly in a react application does not expose reflected XSS vulnerabilities. only the demo in `public/` contains the vulnerability, because it uses an old version of the html pacakge.
### Patches
upgrading to the above mentioned versions will solve the issue.
If you're using `graphql-playground-html` directly, then:
```
yarn add graphql-playground-html@^1.6.22
```
or
```
npm install --save graphql-playground-html@^1.6.22
```
Then, similar steps need to be taken for each middleware:
- [Upgrade Express Middleware](https://www.npmjs.com/package/graphql-playground-middleware-express#security-upgrade-steps)
- [Upgrade Koa Middleware](https://www.npmjs.com/package/graphql-playground-middleware-koa#security-upgrade-steps)
- [Upgrade Lambda Middleware](https://www.npmjs.com/package/graphql-playground-middleware-lambda#security-upgrade-steps)
- [Upgrade Hapi Middleware](https://www.npmjs.com/package/graphql-playground-middleware-hapi#security-upgrade-steps)
### Workarounds
Ensure you properly sanitize *all* user input for options you use for whatever function to initialize GraphQLPlayground:
for example, with `graphql-playground-html` and express:
```js
const { sanitizeUrl } = require('@braintree/sanitize-url');
const qs = require('querystringify');
const { renderPlaygroundPage } = require('graphql-playground-html');
module.exports = (req, res, next) => {
const { endpoint } = qs.parse(req.url)
res.html(renderPlaygroundPage({endpoint: sanitizeUrl(endpoint) })).status(200)
next()
}
```
or, with `graphql-playground-express`:
```js
const { expressPlayground } = require('graphql-playground-middleware-express');
const { sanitizeUrl } = require('@braintree/sanitize-url');
const qs = require('querystringify');
const { renderPlaygroundPage } = require('graphql-playground-html');
module.exports = (req, res, next) => {
const { endpoint } = qs.parse(req.url)
res.html(expressPlayground({endpoint: sanitizeUrl(endpoint) })).status(200)
next()
}
```
### References
- [OWASP: How to Test for CSS Reflection Attacks](https://github.com/OWASP/wstg/blob/master/document/4-Web_Application_Security_Testing/07-Input_Validation_Testing/01-Testing_for_Reflected_Cross_Site_Scripting.md)
- [Original Report from Cure53](https://user-images.githubusercontent.com/1368727/84191028-dfb7b980-aa65-11ea-8e18-4b8706f538e2.jpg) (jpg)
### Credits
Masato Kinugawa of Cure53
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [graphql-playground](https://github.com/prisma-labs/graphql-playground/issues/new/choose)
* Email us at [rikki.schulte@gmail.com](mailto:rikki.schulte@gmail.com)
|
{'CVE-2020-4038'}
|
2021-11-04T17:11:46Z
|
2020-06-09T00:24:57Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/prisma-labs/graphql-playground#security-details', 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf', 'https://github.com/prisma-labs/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4038', 'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7'}
| null |
npm
|
GHSA-cqjg-whmm-8gv6
|
Denial of Service via malformed accept-encoding header in hapi
|
Affected versions of `hapi` will crash or lock the event loop when a malformed `accept-encoding` header is recieved.
## Recommendation
Update to version 16.1.1 or later.
|
{'CVE-2017-16013'}
|
2020-08-31T18:19:42Z
|
2018-10-09T00:57:28Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16013', 'https://github.com/advisories/GHSA-cqjg-whmm-8gv6', 'https://github.com/hapijs/hapi/issues/3466', 'https://nodesecurity.io/advisories/335', 'https://www.npmjs.com/advisories/335'}
| null |
npm
|
GHSA-j7wp-vjj6-cp5m
|
Cross-Site Scripting in @progress/kendo-angular-editor
|
Kendo UI for Angular Editor Component (npm package @progress/kendo-angular-editor) before version 1.2.3 is vulnerable to Cross-Site Scripting. When the Editor content contains potentially malicious scripts in element event handlers, they get executed.
Adding the following content to the Editor value demonstrates the issue: `<img src="" onerror=alert(document.domain)>`.
| null |
2021-09-23T18:55:46Z
|
2020-08-11T19:40:10Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/telerik/kendo-angular-editor', 'https://stackblitz.com/edit/angular-6xzuzp-tef7lb?file=app/app.component.ts', 'https://www.npmjs.com/advisories/1549'}
| null |
npm
|
GHSA-4m6q-rxhm-675w
|
OS Command Injection in adb-driver
|
adb-driver through 0.1.8 is vulnerable to Command Injection.It allows execution of arbitrary commands via the command function.
|
{'CVE-2020-7636'}
|
2021-07-28T23:08:13Z
|
2021-12-09T19:54:29Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://www.npmjs.com/package/adb-driver', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7636', 'https://snyk.io/vuln/SNYK-JS-ADBDRIVER-564430'}
| null |
npm
|
GHSA-mg85-8mv5-ffjr
|
Denial of Service in ammo
|
All versions of `ammo` are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
This package is deprecated and is now maintained as `@hapi/ammo`. Please update your dependencies to use `@hapi/ammo`.
| null |
2020-08-31T19:00:33Z
|
2020-09-03T15:45:40Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1472'}
| null |
npm
|
GHSA-425c-ccf3-3jrr
|
Critical severity vulnerability that affects slpjs
|
## Validator parsing discrepancy due to string encoding
### Impact
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus.
### Patches
All versions > 0.21.3 are patched.
### Workarounds
Upgrade to any version >= 0.21.4.
### References
The bug was located and fixed [here](https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [slpjs repo](https://github.com/simpleledger/slpjs/issues)
* Email us at [info@slp.cash](mailto:info@slp.cash)
|
{'CVE-2019-16762'}
|
2021-01-08T19:57:59Z
|
2019-11-15T23:10:35Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16762', 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701', 'https://github.com/advisories/GHSA-425c-ccf3-3jrr'}
| null |
npm
|
GHSA-pfv6-prqm-85q8
|
Prototype Pollution in madlib-object-utils
|
The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
|
{'CVE-2022-24279'}
|
2022-04-22T20:50:33Z
|
2022-04-16T00:00:26Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24279', 'https://github.com/Qwerios/madlib-object-utils', 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572'}
| null |
npm
|
GHSA-j32x-j8pj-pg2h
|
Prototype Pollution in decal
|
This affects all versions of package decal. The vulnerability is in the extend function.
|
{'CVE-2020-28450'}
|
2021-03-22T22:36:42Z
|
2021-04-13T15:20:34Z
|
HIGH
| null |
{'CWE-94', 'CWE-400', 'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-DECAL-1051028', 'https://github.com/gigafied/decal.js/blob/master/src/utils/extend.js%23L23-L56', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28450', 'https://www.npmjs.com/package/decal'}
| null |
npm
|
GHSA-xvch-5gv4-984h
|
Prototype Pollution in minimist
|
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
|
{'CVE-2021-44906'}
|
2022-04-04T21:39:38Z
|
2022-03-18T00:01:09Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068', 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip', 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764', 'https://github.com/substack/minimist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44906', 'https://github.com/substack/minimist/issues/164', 'https://github.com/substack/minimist/blob/master/index.js#L69'}
| null |
npm
|
GHSA-vm7j-4rj6-mw2p
|
Malicious Package in ember_cli_babe
|
Version 6.16.0 of `ember_cli_babe` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-29T20:46:35Z
|
2020-09-03T21:08:42Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1200'}
| null |
npm
|
GHSA-hr2v-3952-633q
|
Prototype Pollution in deep-extend
|
Versions of `deep-extend` before 0.5.1 are vulnerable to prototype pollution.
## Recommendation
Update to version 0.5.1 or later.
|
{'CVE-2018-3750'}
|
2021-09-14T17:26:45Z
|
2018-10-09T00:44:59Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-hr2v-3952-633q', 'https://www.npmjs.com/advisories/612', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3750', 'https://hackerone.com/reports/311333'}
| null |
npm
|
GHSA-vvwp-3f54-xc39
|
Downloads Resources over HTTP in broccoli-closure
|
Affected versions of `broccoli-closure` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `broccoli-closure`.
## Recommendation
Update to version 1.3.1 or later.
|
{'CVE-2016-10635'}
|
2021-01-08T01:57:11Z
|
2019-02-18T23:57:05Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/242', 'https://nodesecurity.io/advisories/242', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10635', 'https://github.com/advisories/GHSA-vvwp-3f54-xc39'}
| null |
npm
|
GHSA-j657-59rv-qwm6
|
Cross-Site Scripting in min-http-server
|
All versions of `min-http-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5457'}
|
2020-08-31T18:47:40Z
|
2019-07-31T04:22:27Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/570568', 'https://www.npmjs.com/advisories/1111', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5457'}
| null |
npm
|
GHSA-gxr4-xjj5-5px2
|
Potential XSS vulnerability in jQuery
|
### Impact
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
### Patches
This problem is patched in jQuery 3.5.0.
### Workarounds
To workaround the issue without upgrading, adding the following to your code:
```js
jQuery.htmlPrefilter = function( html ) {
return html;
};
```
You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround.
### References
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://jquery.com/upgrade-guide/3.5/
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
|
{'CVE-2020-11022'}
|
2022-02-08T22:06:37Z
|
2020-04-29T22:18:55Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.tenable.com/security/tns-2020-11', 'https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@%3Cissues.flink.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://www.tenable.com/security/tns-2021-10', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/jquery/jquery', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/', 'https://www.drupal.org/sa-core-2020-002', 'https://jquery.com/upgrade-guide/3.5/', 'https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@%3Cissues.flink.apache.org%3E', 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2', 'https://github.com/jquery/jquery/releases/tag/3.5.0', 'https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@%3Cissues.flink.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://security.netapp.com/advisory/ntap-20200511-0006/', 'http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html', 'https://www.debian.org/security/2020/dsa-4693', 'https://www.tenable.com/security/tns-2020-10', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/', 'https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@%3Cissues.flink.apache.org%3E', 'https://security.gentoo.org/glsa/202007-03', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@%3Ccommits.airflow.apache.org%3E', 'https://www.tenable.com/security/tns-2021-02', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11022', 'https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@%3Cissues.flink.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html', 'https://github.com/advisories/GHSA-gxr4-xjj5-5px2', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.npmjs.com/advisories/1518', 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@%3Cissues.flink.apache.org%3E'}
| null |
npm
|
GHSA-g3xp-v2ff-x5c3
|
Downloads Resources over HTTP in go-ipfs-dep
|
Affected versions of `go-ipfs-deps` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 0.4.4 or later.
|
{'CVE-2016-10563'}
|
2020-08-31T18:12:48Z
|
2019-02-18T23:54:18Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10563', 'https://nodesecurity.io/advisories/156', 'https://github.com/advisories/GHSA-g3xp-v2ff-x5c3', 'https://github.com/diasdavid/go-ipfs-dep/pull/12', 'https://www.npmjs.com/advisories/156'}
| null |
npm
|
GHSA-2hhw-p8mg-jrm6
|
Path Traversal in http-live-simulator
|
Versions of `http-live-simulator` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 1.0.6
|
{'CVE-2019-5423'}
|
2020-08-31T18:36:11Z
|
2019-04-08T15:18:40Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5423', 'https://www.npmjs.com/advisories/799', 'https://hackerone.com/reports/384939', 'https://github.com/advisories/GHSA-2hhw-p8mg-jrm6'}
| null |
npm
|
GHSA-jw37-5gqr-cf9j
|
Server-Side Request Forgery in ftp-srv
|
### Background
The FTP protocol creates two connections, one for commands and one for transferring data.
This second data connection can be created in two ways, on the server by sending the PASV command, or on the client by sending the PORT command.
The PORT command sends the IP and port for the server to connect to the client with.
### Issue
Since the client can send an arbitrary IP with the PORT command, this can be used to cause the server to make a connection elsewhere.
### Patches
* _fix: disallow PORT connections to alternate hosts_: e449e75219d918c400dec65b4b0759f60476abca
Deprecation notices have been published for older versions.
### Workarounds
Blacklisting the FTP Command `PORT` will prevent the server from exposing this behaviour through active connections until a fix is applied.
```js
const ftp = new FtpSrv({
blacklist: ['PORT']
});
```
### References
https://www.npmjs.com/advisories/1445
### Credits
Thank you to;
@trs for fixing it
@andreeleuterio for reporting it to us for an anonymous user (Vincent) through the NPM platform
@quiquelhappy for bringing it to our attention after it slipped through the cracks during Christmas
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/autovance/ftp-srv](https://github.com/autovance/ftp-srv)
* Email us directly; security@autovance.com
|
{'CVE-2020-15152'}
|
2021-01-12T19:30:42Z
|
2020-08-17T21:44:54Z
|
CRITICAL
| null |
{'CWE-918'}
|
{'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5', 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-jw37-5gqr-cf9j', 'https://www.npmjs.com/advisories/1445', 'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15152', 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3', 'https://www.npmjs.com/package/ftp-srv'}
| null |
npm
|
GHSA-4fc4-chg7-h8gh
|
Unprotected dynamically loaded chunks
|
### Impact
All dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected.
### Patches
This issue is patched in version 1.5.1.
### Workarounds
N/A
### References
https://github.com/waysact/webpack-subresource-integrity/issues/131
### For more information
If you have any questions or comments about this advisory:
* Comment on [webpack-subresource-integrity issue #131](https://github.com/waysact/webpack-subresource-integrity/issues/131)
* Or email us at [security@waysact.com](mailto:security@waysact.com)
|
{'CVE-2020-15262'}
|
2021-11-19T14:40:52Z
|
2020-10-19T20:02:44Z
|
LOW
| null |
{'CWE-345'}
|
{'https://github.com/waysact/webpack-subresource-integrity/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15262', 'https://github.com/waysact/webpack-subresource-integrity/issues/131', 'https://github.com/waysact/webpack-subresource-integrity/security/advisories/GHSA-4fc4-chg7-h8gh', 'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'}
| null |
npm
|
GHSA-8225-6cvr-8pqp
|
Large gzip Denial of Service in superagent
|
Affected versions of `superagent` do not check the post-decompression size of ZIP compressed HTTP responses prior to decompressing. This results in the package being vulnerable to a [ZIP bomb](https://en.wikipedia.org/wiki/Zip_bomb) attack, where an extremely small ZIP file becomes many orders of magnitude larger when decompressed.
This may result in unrestrained CPU/Memory/Disk consumption, causing a denial of service condition.
## Recommendation
Update to version 3.7.0 or later.
|
{'CVE-2017-16129'}
|
2020-08-31T18:24:43Z
|
2018-08-09T20:13:01Z
|
LOW
| null |
{'CWE-409'}
|
{'https://en.wikipedia.org/wiki/Zip_bomb', 'https://github.com/visionmedia/superagent/issues/1259', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16129', 'https://github.com/advisories/GHSA-8225-6cvr-8pqp', 'https://www.npmjs.com/advisories/479', 'https://nodesecurity.io/advisories/479'}
| null |
npm
|
GHSA-5rc4-8qqh-vq7f
|
Handling of URL Encoding permitting access to ignored
|
serve node module suffers from Improper Handling of URL Encoding by permitting access to ignored files if a filename is URL encoded.
|
{'CVE-2018-3718'}
|
2021-08-09T22:24:10Z
|
2021-08-09T22:24:26Z
|
MODERATE
| null |
{'CWE-177'}
|
{'https://hackerone.com/reports/308721', 'https://github.com/vercel/serve', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3718'}
| null |
npm
|
GHSA-jrhj-2j3q-xf3v
|
Stored Cross-Site Scripting in simplehttpserver
|
All versions of simplehttpserver are vulnerable to stored cross-site scripting (XSS). To be exploited an attacker needs to control the filename of a file that is used in the directory listing output.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not use this module if the exploitable conditions are met.
|
{'CVE-2018-3716'}
|
2020-08-31T18:28:49Z
|
2018-07-26T15:03:30Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-jrhj-2j3q-xf3v', 'https://hackerone.com/reports/309648', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3716', 'https://www.npmjs.com/advisories/585'}
| null |
npm
|
GHSA-v4x8-gw49-7hv4
|
Path Traversal in swagger-injector
|
All versions of `swagger-injector` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the configured `dist` folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:49:54Z
|
2020-09-03T20:37:42Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1172'}
| null |
npm
|
GHSA-257v-vj4p-3w2h
|
Regular Expression Denial of Service (ReDOS)
|
In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for
linearly increasing input lengths for `hwb()` color strings.
Strings reaching more than 5000 characters would see several
milliseconds of processing time; strings reaching more than
50,000 characters began seeing 1500ms (1.5s) of processing time.
The cause was due to a the regular expression that parses
hwb() strings - specifically, the hue value - where
the integer portion of the hue value used a 0-or-more quantifier
shortly thereafter followed by a 1-or-more quantifier.
This caused excessive backtracking and a cartesian scan,
resulting in exponential time complexity given a linear
increase in input length.
|
{'CVE-2021-29060'}
|
2021-06-30T18:03:29Z
|
2021-06-22T01:14:09Z
|
MODERATE
| null |
{'CWE-770'}
|
{'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js', 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3', 'https://www.npmjs.com/package/color-string', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29060/Color-String.md', 'https://github.com/Qix-/color-string/releases/tag/1.5.5'}
| null |
npm
|
GHSA-8px5-63x9-5c7p
|
Command Injection in pullit
|
Versions of `pullit` prior to 1.4.0 are vulnerable to Command Injection. The package does not validate input on git branch names and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.4.0 or later.
## Credits
This vulnerability was discovered by @lirantal
| null |
2022-04-01T19:35:31Z
|
2020-09-03T16:47:30Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://hackerone.com/reports/315773', 'https://github.com/jkup/pullit', 'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb', 'https://github.com/jkup/pullit/issues/23', 'https://www.npmjs.com/advisories/1004'}
| null |
npm
|
GHSA-r9w3-g83q-m6hq
|
Prototype Pollution in deepmerge-ts
|
deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround.
|
{'CVE-2022-24802'}
|
2022-04-13T16:28:10Z
|
2022-04-01T17:26:03Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b', 'https://github.com/RebeccaStevens/deepmerge-ts', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24802'}
| null |
npm
|
GHSA-55xv-f85c-248q
|
Regular Expression Denial of Service (ReDoS) in jsx-slack
|
jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources.
```javascript
/** @jsxImportSource jsx-slack */
import { Section } from 'jsx-slack'
console.log(
<Section>
<blockquote>
{[...Array(40)].map((_, i) => (
<p>{i + 1}</p>
))}
</blockquote>
</Section>
)
```
### Patches
_See also: https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6_
jsx-slack v4.5.2 has updated regular expressions to prevent catastrophic backtracking.
jsx-slack v4.5.1 also had patched a workaround. It has no problems to contents with ASCII characters, but _still vulnerable to contents with multibyte characters_. (https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d)
### References
- https://nvd.nist.gov/vuln/detail/CVE-2021-43838
- https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d
### Credits
Thanks to @hieki for finding out this vulnerability.
|
{'CVE-2021-43838'}
|
2022-01-04T19:52:06Z
|
2021-12-17T19:59:02Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/yhatt/jsx-slack/', 'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43838'}
| null |
npm
|
GHSA-4wm5-q7wv-6jx3
|
Downloads Resources over HTTP in bkjs-wand
|
Affected versions of `bkjs-wand` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `bkjs-wand`.
## Recommendation
Update to version 0.3.2 or later.
|
{'CVE-2016-10571'}
|
2021-01-08T19:52:58Z
|
2019-02-18T23:52:20Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-4wm5-q7wv-6jx3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10571', 'https://www.npmjs.com/advisories/220', 'https://nodesecurity.io/advisories/220'}
| null |
npm
|
GHSA-59r9-6jp6-jcm7
|
XSS vulnerability in GraphQL Playground from untrusted schemas
|
## GraphQL Playground introspection schema template injection attack: Advisory Statement
This is a security advisory for an XSS vulnerability in `graphql-playground`.
A similar vulnerability affects `graphiql`, the package from which `graphql-playground` was forked. There is a corresponding `graphiql` [advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8).
- [1. Impact](#1-impact)
- [2. Scope](#2-scope)
- [3. Patches](#3-patches)
- [4. Reproducing the exploit](#4-reproducing-the-exploit)
- [5. Credit](#5-credit)
- [6. For more information](#6-for-more-information)
### 1. Impact
All versions of `graphql-playground-react` older than `graphql-playground-react@1.7.28` are vulnerable to compromised HTTP schema introspection responses or `schema` prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete.
In order for the attack to take place, the user must load a malicious schema in `graphql-playground`. There are several ways this can occur, including by specifying the URL to a malicious schema in the `endpoint` query parameter. If a user clicks on a link to a GraphQL Playground installation that specifies a malicious server, arbitrary JavaScript can run in the user's browser, which can be used to exfiltrate user credentials or other harmful goals.
### 2. Scope
This advisory describes the impact on the `graphql-playground-react` package. The vulnerability also affects `graphiql`, the package from which `graphql-playground` was forked, with a less severe impact; see the [`graphiql` advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8) for details. It affects all versions of `graphql-playground-react` older than `v1.7.28`.
This vulnerability was introduced with the first public release of `graphql-playground`, so it impacts both the original legacy `graphql-playground` and the contemporary `graphql-playground-react` npm package. It is most easily exploited on `graphql-playground-react@1.7.0` and newer, as that release added functionality which made it possible to override the endpoint URL via query parameter even if it is explicitly specified in the code.
`graphql-playground-react` is commonly loaded via the `graphql-playground-html` package or a middleware package that wraps it (`graphql-playground-express`, `graphql-playground-middleware-koa`, `graphql-playground-middleware-hapi`, or `graphql-playground-middleware-lambda`). By default, these packages render an HTML page which loads the *latest* version of `graphql-playground-react` through a CDN. If you are using one of these packages to install GraphQL Playground on your domain *and you do not explicitly pass the `version` option to `renderPlaygroundPage` or the middleware function*, then you do not need to take any action to resolve this vulnerability, as the latest version of the React app will automatically be loaded.
`graphql-playground-react` is also commonly loaded via HTML served by Apollo Server. Apollo Server always pins a specific version of `graphql-playground-react`, so if you are using Apollo Server you do need to take action to resolve this vulnerability. See the [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw) for details.
### 3. Patches
`graphql-playground-react@1.7.28` addresses this issue via defense in depth:
- **HTML-escaping text** that should be treated as text rather than HTML. In most of the app, this happens automatically because React escapes all interpolated text by default. However, one vulnerable component uses the unsafe `innerHTML` API and interpolated type names directly into HTML. We now properly escape that type name, which fixes the known vulnerability.
- **Validates the schema** upon receiving the introspection response or schema changes. Schemas with names that violate the GraphQL spec will no longer be loaded. (This includes preventing the Doc Explorer from loading.) This change is also sufficient to fix the known vulnerability.
- **Ensuring that user-generated HTML is safe**. Schemas can contain Markdown in `description` and `deprecationReason` fields, and the web app renders them to HTML using the `markdown-it` library. Prior to `graphql-playground-react@1.7.28`, GraphQL Playground used two separate libraries to render Markdown: `markdown-it` and `marked`. As part of the development of `graphql-playground-react@1.7.28`, we verified that our use of `markdown-it` prevents the inclusion of arbitrary HTML. We use `markdown-it` without setting `html: true`, so we are comfortable relying on [`markdown-it`'s HTML escaping](https://github.com/markdown-it/markdown-it/blob/master/docs/security.md) here. We considered running a second level of sanitization over all rendered Markdown using a library such as `dompurify` but believe that is unnecessary as `markdown-it`'s sanitization appears to be adequate. `graphiql@1.4.3` does update to the latest version of `markdown-it` (v12, from v10) so that any security fixes in v11 and v12 will take effect. On the other hand, [`marked`](https://github.com/markedjs/marked) recommends the use of a separate HTML sanitizer if its input is untrusted. In this release, we switch the one component which uses `marked` to use `markdown-it` like the rest of the app.
**If you are using `graphql-playground-react` directly in your client app**, upgrade to version 1.7.28 or later.
**If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are passing the `version` option to a function imported from that package, change that `version` option to be at least `"1.7.28"`.
**If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are **NOT** passing the `version` option to a function imported from that package, no action is necessary; your app automatically loads the latest version of `graphql-playground-react` from CDN.
### 4. Reproducing the exploit
We are hosting a "malicious" server at https://graphql-xss-schema.netlify.app/graphql . This server has a hard-coded introspection result that includes unsafe HTML in type names.
If you manually change a GraphQL Playground installation to use that endpoint, clear the operation pane, and type `{x` into the operation pane, an alert will pop up; this demonstrates execution of code provided by the malicious server.
An URL like https://YOUR-PLAYGROUND-SERVER/?endpoint=https%3A%2F%2Fgraphql-xss-schema.netlify.app%2Fgraphql&query=%7B will load already configured with the endpoint in question. (This URL-based exploit works on `graphql-playground-react@1.7.0` and newer; older versions may be protected from this particular URL-based exploit depending on their configuration.)
### 5. Credit
This vulnerability was discovered by [@Ry0taK](https://github.com/Ry0taK), thank you! :1st_place_medal:
Others who contributed:
- extensive help from [@glasser](https://github.com/glasser) at [Apollo](https://github.com/apollographql)
- [@acao](https://github.com/acao)
- [@imolorhe](https://github.com/imolorhe)
- [@divyenduz](https://github.com/divyenduz)
- [@dotansimha](https://github.com/dotansimha)
- [@timsuchanek](http://github.com/timsuchanek)
- [@benjie](https://github.com/Ry0taK) and many others who provided morale support
### 6. For more information
If you have any questions or comments about this advisory:
- The `graphiql` advisory document contains [more information](https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability) about how both the client-side and server-side vulnerabilities work
- Open an issue in the [graphql-playground repo](https://github.com/graphql/graphql-playground/new/issues)
|
{'CVE-2021-41249'}
|
2021-11-04T19:36:13Z
|
2021-11-08T18:06:09Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41249', 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7', 'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8', 'https://github.com/graphql/graphql-playground', 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability', 'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'}
| null |
npm
|
GHSA-phph-xpj4-wvcv
|
Cross-Site Scripting in hexo-admin
|
All versions of `hexo-admin` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize rendered markdown, allowing attackers to execute arbitrary JavaScript in a victim's browser if they are able to create new posts.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-29T18:51:18Z
|
2020-09-03T21:13:07Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/jaredly/hexo-admin', 'https://www.npmjs.com/advisories/1211', 'https://github.com/jaredly/hexo-admin/issues/185'}
| null |
npm
|
GHSA-mgh5-4h95-qj4p
|
Information Exposure in Snyk Broker
|
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.
|
{'CVE-2020-7654'}
|
2021-07-29T17:51:23Z
|
2020-06-03T22:02:14Z
|
HIGH
| null |
{'CWE-532'}
|
{'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570613', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7654'}
| null |
npm
|
GHSA-43vf-2x6g-p2m5
|
Malicious Package in browserift
|
Version 16.3.3 of `browserift` contained malicious code as a preinstall script. The package was a backdoor that opened a connection to a remote server and executed incoming commands on both Unix and Windows machines
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:37:54Z
|
2020-09-02T21:33:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/900'}
| null |
npm
|
GHSA-j3f7-7rmc-6wqj
|
Improper certificate management in AWS IoT Device SDK v2
|
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.
|
{'CVE-2021-40831'}
|
2022-03-03T05:14:12.538986Z
|
2021-11-24T20:35:03Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40831', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
| null |
npm
|
GHSA-j6px-jwvv-vpwq
|
Angular Expressions - Remote Code Execution
|
### Impact
The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input.
This time, the security of the package could be bypassed by using a more complex payload, using a `.constructor.constructor` technique.
* If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput).
* If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.
### Patches
Users should upgrade to version 1.1.2 of angular-expressions
### Workarounds
A temporary workaround might be either to :
* disable user-controlled input that will be fed into angular-expressions in your application
OR
* allow only following characters in the userControlledInput :
```js
if (/^[|a-zA-Z.0-9 :"'+-?]+$/.test(userControlledInput)) {
var result = expressions.compile(userControlledInput);
}
else {
result = undefined;
}
```
### References
[Removal of angular-expression sandbox](http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [angular-expressions](https://github.com/peerigon/angular-expressions/issues)
* [Email us](mailto:contact@javascript-ninja.fr)
### Credits
The issue was reported by Maxime Nadeau from GoSecure, Inc.
|
{'CVE-2021-21277'}
|
2021-02-01T15:00:53Z
|
2021-02-01T15:01:26Z
|
LOW
| null |
{'CWE-74'}
|
{'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-j6px-jwvv-vpwq', 'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21277', 'https://www.npmjs.com/package/angular-expressions', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html'}
| null |
npm
|
GHSA-v8g7-9qv2-j865
|
Malicious Package in bitcoin-osp
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:42:19Z
|
2020-09-04T16:38:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1365'}
| null |
npm
|
GHSA-v6gv-fg46-h89j
|
Sensitive Data Exposure in put
|
All versions of `put` are vulnerable to Uninitialized Memory Exposure. The package incorrectly calculates the allocated Buffer size and does not trim the bytes written, which may allow attackers to access uninitialized memory containing sensitive data. This vulnerability only affects versions of Node.js <=6.x.
## Recommendation
Upgrade your Node.js version or consider using an alternative package.
| null |
2020-08-31T18:43:51Z
|
2020-09-03T16:48:36Z
|
LOW
| null |
{'CWE-200'}
|
{'https://www.npmjs.com/advisories/1007', 'https://hackerone.com/reports/321702'}
| null |
npm
|
GHSA-7x92-2j68-h32c
|
Directory Traversal in featurebook
|
Affected versions of `featurebook` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
The `featurebook` package is not intended to be run in production code nor to be exposed to an untrusted network.
## Proof of Concept
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No direct patch is currently available.
At this time, the best mitigation is to ensure that `featurebook` is not running in production or exposed to an untrusted network.
| null |
2020-08-31T18:27:38Z
|
2020-09-01T19:03:02Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/556', 'https://hackerone.com/reports/296305'}
| null |
npm
|
GHSA-72fg-jqhx-c68p
|
Open Redirect in st
|
st is a module for serving static files.
An attacker is able to craft a request that results in an `HTTP 301` (redirect) to an entirely different domain.
A request for: `http://some.server.com//nodesecurity.org/%2e%2e` would result in a 301 to `//nodesecurity.org/%2e%2e` which most browsers treat as a proper redirect as `//` is translated into the current schema being used.
Mitigating factor:
In order for this to work, `st` must be serving from the root of a server (`/`) rather than the typical sub directory (`/static/`) and the redirect URL will end with some form of URL encoded `..` ("%2e%2e", "%2e.", ".%2e").
Code example (provided by Xin Gao):
[example.js]
```
var st = require('st')
var http = require('http')
http.createServer(st(process.cwd())).listen(1337)
```
```
$ curl -v http://localhost:1337//cve.mitre.com/%2e%2e
* Trying ::1...
* TCP_NODELAY set
* Connected to localhost (::1) port 1337 (#0)
> GET //cve.mitre.com/%2e%2e HTTP/1.1
> Host: localhost:1337
> User-Agent: curl/7.54.0
> Accept: */*
>
< HTTP/1.1 301 Moved Permanently
< cache-control: public, max-age=600
< last-modified: Fri, 13 Oct 2017 22:56:33 GMT
< etag: "16777220-46488904-1507935393000"
< location: //cve.mitre.com/%2e%2e/
< Date: Fri, 13 Oct 2017 22:56:41 GMT
< Connection: keep-alive
< Content-Length: 30
<
* Connection #0 to host localhost left intact
```
## Recommendation
Update to version 1.2.2 or later.
|
{'CVE-2017-16224'}
|
2020-08-31T18:27:16Z
|
2018-08-06T21:33:31Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://www.npmjs.com/advisories/547', 'https://github.com/advisories/GHSA-72fg-jqhx-c68p', 'https://nodesecurity.io/advisories/547', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16224'}
| null |
npm
|
GHSA-xmjj-3c76-5w84
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in directus
|
### Impact
Unauthorized JavaScript can be executed by inserting an iframe into the rich text html interface that links to a file uploaded HTML file that loads another uploaded JS file in its script tag. This satisfies the regular content security policy header, which in turn allows the file to run any arbitrary JS.
### Patches
This was resolved in https://github.com/directus/directus/pull/12020 which is released in 9.7.0
### Workarounds
You can disable the live embed in the WYSIWYG by adding `{ "media_live_embeds": false }` to the _Options Overrides_ option of the Rich Text HTML interface.
### References
https://github.com/directus/directus/pull/12020
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [directus/directus](https://github.com/directus/directus)
* Email us at [security@directus.io](mailto:security@directus.io)
|
{'CVE-2022-24814'}
|
2022-04-05T18:30:15Z
|
2022-04-05T18:30:15Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/directus/directus/security/advisories/GHSA-xmjj-3c76-5w84', 'https://github.com/directus/directus/releases/tag/v9.7.0', 'https://github.com/directus/directus', 'https://github.com/directus/directus/pull/12020', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24814'}
| null |
npm
|
GHSA-6mrq-7r7m-hh4p
|
Malicious Package in hs-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:21:58Z
|
2020-09-03T22:52:58Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1275'}
| null |
npm
|
GHSA-9cq3-fj2h-ggj5
|
Vulnerability in remove function leads to arbitrary code execution via filePath parameters
|
Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36379'}
|
2022-05-04T01:52:12Z
|
2021-11-02T15:42:31Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36379', 'https://github.com/shenzhim/aaptjs'}
| null |
npm
|
GHSA-9w6v-m7wp-jwg4
|
Http request which redirect to another hostname do not strip authorization header in @actions/http-client
|
### Impact
If consumers of the http-client:
1. make an http request with an authorization header
2. that request leads to a redirect (302) and
3. the redirect url redirects to another domain or hostname
The authorization header will get passed to the other domain.
Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with [these permissions](https://help.github.com/en/actions/configuring-and-managing-workflows/authenticating-with-the-github_token#permissions-for-the-github_token).
### Patches
The problem is fixed in 1.0.8 at [npm here](https://www.npmjs.com/package/@actions/http-client). In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different.
### Workarounds
None.
### References
https://github.com/actions/http-client/pull/27
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/actions/http-client/issues
|
{'CVE-2020-11021'}
|
2021-08-25T21:03:11Z
|
2020-04-29T17:58:53Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/actions/http-client/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021', 'https://github.com/actions/http-client/pull/27', 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a', 'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4'}
| null |
npm
|
GHSA-77xq-cpvg-7xm2
|
Prototype pollution in @tsed/core
|
"This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program."
|
{'CVE-2020-7748'}
|
2021-04-20T17:41:36Z
|
2021-05-10T19:07:56Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7748', 'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b', 'https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36'}
| null |
npm
|
GHSA-gff7-g5r8-mg8m
|
Prototype Pollution in simple-plist
|
simple-plist v1.3.0 was discovered to contain a prototype pollution vulnerability via .parse().
|
{'CVE-2022-26260'}
|
2022-03-29T13:08:19Z
|
2022-03-23T00:00:22Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/wollardj/simple-plist/issues/60', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26260', 'https://github.com/wollardj/simple-plist'}
| null |
npm
|
GHSA-2w8q-69fh-9gq6
|
Malicious Package in bufger-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:27:54Z
|
2020-09-03T22:25:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1263'}
| null |
npm
|
GHSA-qwp9-52h8-xgg8
|
Prototype pollution in JointJS
|
The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.
|
{'CVE-2020-28480'}
|
2021-01-20T05:24:47Z
|
2021-01-20T21:21:16Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062036', 'https://github.com/clientIO/joint/blob/master/src/util/util.mjs%23L150', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062037', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28480', 'https://github.com/clientIO/joint/pull/1406', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1024444'}
| null |
npm
|
GHSA-gfjr-xqhm-qvv3
|
Malicious Package in aysnc
|
All versions of `aysnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:01:11Z
|
2020-09-02T20:16:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/848'}
| null |
npm
|
GHSA-cgc7-mwp4-3ccx
|
Cross-site Scripting in Joplin
|
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
|
{'CVE-2020-15930'}
|
2021-04-28T12:42:46Z
|
2021-05-07T16:29:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/laurent22/joplin/issues/3552', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15930', 'https://github.com/laurent22/joplin/releases/tag/v1.1.4', 'http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html'}
| null |
npm
|
GHSA-x55w-vjjp-222r
|
Inefficient Regular Expression in inflect
|
inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3820'}
|
2022-05-04T03:41:09Z
|
2021-09-29T17:12:19Z
|
MODERATE
| null |
{'CWE-400', 'CWE-697', 'CWE-1333'}
|
{'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3820', 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b', 'https://github.com/pksunkara/inflect'}
| null |
npm
|
GHSA-5vj8-3v2h-h38v
|
Remote Code Execution in next
|
Versions of `next` prior to 5.1.0 are vulnerable to Remote Code Execution. The `/path:` route fails to properly sanitize input and passes it to a `require()` call. This allows attackers to execute JavaScript code on the server. Note that prior version 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
## Recommendation
Upgrade to version 5.1.0.
| null |
2022-04-28T19:57:43Z
|
2020-09-04T18:04:08Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/1538', 'https://github.com/vercel/next.js'}
| null |
npm
|
GHSA-g694-m8vq-gv9h
|
URL Confusion When Scheme Not Supplied in medialize/uri.js
|
Medialize is a Javascript URL mutation library. When parsing a URL without a scheme and with excessive slashes, like ///www.example.com, URI.js will parse the hostname as null and the path as /www.example.com. Such behaviour is different from that exhibited by browsers, which will parse ///www.example.com as http://www.example.com instead. For example, the following will cause a redirect to http://www.example.com: A fix was released in version 1.19.11.
|
{'CVE-2022-1233'}
|
2022-04-15T02:53:33Z
|
2022-04-05T00:00:17Z
|
MODERATE
| null |
{'CWE-115', 'CWE-601'}
|
{'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277', 'https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c', 'https://github.com/medialize/uri.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1233'}
| null |
npm
|
GHSA-9r7h-6639-v5mw
|
Cross-Site Scripting in bootstrap-select
|
Versions of `bootstrap-select` prior to 1.13.6 are vulnerable to Cross-Site Scripting (XSS). The package does not escape `title` values on `<option>` tags. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.13.6 or later.
| null |
2021-10-04T21:12:36Z
|
2020-09-03T15:54:00Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://github.com/snapappointments/bootstrap-select', 'https://github.com/dimpu/ngx-md/issues/129', 'https://www.npmjs.com/advisories/1522'}
| null |
npm
|
GHSA-h3m2-h22h-695r
|
Malicious Package in ali-contributor
|
All versions of `ali-contributor` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T17:49:52Z
|
2020-09-03T17:29:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1045'}
| null |
npm
|
GHSA-hj48-42vr-x3v9
|
Regular Expression Denial of Service in path-parse
|
Affected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
|
{'CVE-2021-23343'}
|
2021-08-10T15:34:57Z
|
2021-08-10T15:33:47Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028', 'https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23343', 'https://github.com/jbgutierrez/path-parse', 'https://github.com/jbgutierrez/path-parse/issues/8', 'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7', 'https://github.com/jbgutierrez/path-parse/pull/10'}
| null |
npm
|
GHSA-7xcv-wvr7-4h6p
|
Malicious npm package: an0n-chat-lib
|
The npm `an0n-chat-lib` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-01-29T18:11:48Z
|
2021-01-29T18:12:19Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1598', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}
| null |
npm
|
GHSA-h26f-j4mv-84g7
|
Malicious Package in asycn
|
All versions of `asycn` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:00:36Z
|
2020-09-02T18:39:43Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/846'}
| null |
npm
|
GHSA-fx46-whrj-73v5
|
Bypassing Sanitization using DOM clobbering in html-janitor
|
All versions of `html-janitor` are vulnerable to cross-site scripting (XSS).
Arbitrary HTML can pass the sanitization process, which can be unexpected and dangerous (XSS) in case user-controlled input is passed to the clean function."
## Recommendation
Upgrade to version 2.0.4 or later.
|
{'CVE-2017-0928'}
|
2020-08-31T18:28:09Z
|
2018-07-24T20:06:17Z
|
HIGH
| null |
{'CWE-547', 'CWE-642'}
|
{'https://github.com/advisories/GHSA-fx46-whrj-73v5', 'https://www.npmjs.com/advisories/569', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0928', 'https://hackerone.com/reports/308158', 'https://github.com/guardian/html-janitor/issues/35'}
| null |
npm
|
GHSA-h5q8-5697-9p9h
|
Cross-Site Request Forgery in express-cart
|
The express-cart package through 1.1.10 for Node.js allows CSRF.
|
{'CVE-2020-22403'}
|
2021-08-30T17:02:20Z
|
2021-08-30T17:22:15Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb', 'https://www.npmjs.com/package/express-cart', 'https://hackerone.com/reports/395944', 'https://security.netapp.com/advisory/ntap-20210909-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22403', 'https://github.com/mrvautin/expressCart'}
| null |
npm
|
GHSA-2r5h-gh4x-8hp9
|
Resources Downloaded over Insecure Protocol in igniteui
|
Affected versions of `igniteui` download Javascript and CSS resources over an unencrypted HTTP connection. An attacker with a privileged network position can intercept and view or modify any content sent or recieved over an unencrypted HTTP connection.
## Recommendation
The `igniteui` package has been deprecated by the package author and now exists under [`ignite-ui`](https://preview.npmjs.com/package/ignite-ui), which should be used in place of this package.
|
{'CVE-2016-10552'}
|
2020-08-31T18:11:21Z
|
2019-02-18T23:40:14Z
|
LOW
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10552', 'https://github.com/advisories/GHSA-2r5h-gh4x-8hp9', 'https://nodesecurity.io/advisories/116', 'https://www.npmjs.com/advisories/116'}
| null |
npm
|
GHSA-p7qp-3fh7-pv4p
|
Malicious Package in buffur-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:27:36Z
|
2020-09-03T22:24:04Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1262'}
| null |
npm
|
GHSA-2xw5-3767-qxvm
|
Malicious Package in ng-ui-library
|
Version 1.0.987 of `ng-ui-library` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T22:07:45Z
|
2020-09-11T21:21:20Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/940'}
| null |
npm
|
GHSA-8cpw-73f2-w58m
|
Cross-Site Scripting in selectize-plugin-a11y
|
Versions of `selectize-plugin-a11y ` prior to 1.1.0 are vulnerable to Cross-Site Scripting. The `accessibility.liveRegion.speak` function does not sanitize the `msg` variable before rendering it as HTML. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 1.1.0 or later.
|
{'CVE-2019-15482'}
|
2021-08-17T22:13:00Z
|
2019-08-27T17:38:33Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15482', 'https://www.npmjs.com/package/selectize-plugin-a11y/v/1.1.0', 'https://www.npmjs.com/advisories/1145', 'https://github.com/SLMNBJ/selectize-plugin-a11y/pull/9'}
| null |
npm
|
GHSA-w973-2qcc-p78x
|
User Impersonation in converse.js
|
Versions of `converse.js` prior to 1.0.7 for 1.x or 2.0.5 for 2.x are vulnerable to User Impersonation. The package provides an incorrect implementation of [XEP-0280: Message Carbons](https://xmpp.org/extensions/xep-0280.html) that allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks.
## Recommendation
If you're using `converse.js` 1.x, upgrade to 1.0.7 or later.
If you're using `converse.js` 2.x, upgrade to 2.0.5 or later.
|
{'CVE-2017-5858'}
|
2021-09-28T16:56:35Z
|
2020-09-11T21:19:09Z
|
MODERATE
| null |
{'CWE-20', 'CWE-346'}
|
{'https://www.npmjs.com/advisories/974', 'https://www.openwall.com/lists/oss-security/2017/02/09/29', 'https://snyk.io/vuln/SNYK-JS-CONVERSEJS-449664', 'http://openwall.com/lists/oss-security/2017/02/09/29', 'https://github.com/jcbrand/converse.js', 'https://rt-solutions.de/en/2017/02/CVE-2017-5589_xmpp_carbons/', 'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf', 'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5858', 'http://www.securityfocus.com/bid/96183'}
| null |
npm
|
GHSA-hxmg-hm46-cf62
|
Remote code execution in mongo-express
|
mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
|
{'CVE-2020-24391'}
|
2021-03-31T20:14:37Z
|
2021-04-13T15:41:01Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/mongodb-js/query-parser/issues/16', 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}
| null |
npm
|
GHSA-w4wq-rvmq-77x7
|
Cross-site scripting in anchorme
|
All versions of package anchorme are vulnerable to Cross-site Scripting (XSS) via the main functionality.
|
{'CVE-2021-23411'}
|
2021-07-26T17:36:48Z
|
2021-07-26T21:23:58Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23411', 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts#23L81', 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81', 'https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695'}
| null |
npm
|
GHSA-j5mg-fpq8-vvxv
|
Directory Traversal in commentapp.stetsonwood
|
Affected versions of `commentapp.stetsonwood` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16143'}
|
2020-08-31T18:24:21Z
|
2018-07-23T20:48:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/470', 'https://nodesecurity.io/advisories/470', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/commentapp.stetsonwood', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16143', 'https://github.com/advisories/GHSA-j5mg-fpq8-vvxv'}
| null |
npm
|
GHSA-m6q2-9pfm-2wvr
|
Malicious Package in wallet-address-vaildator
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T15:56:06Z
|
2020-09-03T17:02:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1412'}
| null |
npm
|
GHSA-q22g-8fr4-qpj4
|
Regular Expression Denial of Service in remarkable
|
lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.
|
{'CVE-2019-12041'}
|
2021-08-04T21:36:58Z
|
2019-06-06T15:32:15Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/jonschlinkert/remarkable/issues/331', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12041', 'https://snyk.io/vuln/SNYK-JS-REMARKABLE-174639'}
| null |
npm
|
GHSA-pmg9-p9r2-6q87
|
ReDoS via long UserAgent header in ua-parser
|
Affected versions of `ua-parser` are vulnerable to regular expression denial of service when given a specially crafted `User-Agent` header.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different, functionally equivalent package such as [useragent](https://www.npmjs.com/package/useragent).
|
{'CVE-2017-16086'}
|
2021-01-08T18:20:33Z
|
2018-07-24T19:46:37Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16086', 'https://github.com/advisories/GHSA-pmg9-p9r2-6q87', 'https://www.npmjs.com/advisories/316', 'https://nodesecurity.io/advisories/316'}
| null |
npm
|
GHSA-g5m5-v5cp-5p7m
|
Directory Traversal in wintiwebdev
|
Affected versions of `wintiwebdev` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16181'}
|
2020-08-31T18:23:53Z
|
2020-09-01T18:50:16Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16181', 'https://www.npmjs.com/advisories/458', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wintiwebdev', 'https://nodesecurity.io/advisories/458'}
| null |
npm
|
GHSA-cf2x-rqc8-grfq
|
Regular expression deinal of service in express-validators
|
All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls.
|
{'CVE-2020-7767'}
|
2021-04-19T22:44:18Z
|
2021-05-10T19:16:27Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7767', 'https://snyk.io/vuln/SNYK-JS-EXPRESSVALIDATORS-1017404'}
| null |
npm
|
GHSA-j27j-4w6m-8fc4
|
Path Traversal in statics-server
|
All versions of `statics-server` are vulnerable to Path Traversal. The package fails to limit access to files outside of the served folder through symlinks.
## Recommendation
No fix is currently available. Do not use `statics-server` in production or consider using an alternative module until a fix is made available.
|
{'CVE-2019-15596'}
|
2020-08-31T18:54:26Z
|
2020-03-31T17:02:12Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/695416', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15596', 'https://www.npmjs.com/advisories/1303'}
| null |
npm
|
GHSA-gcfc-mgg3-8j2c
|
Malicious Package in sdfjghlkfjdshlkjdhsfg
|
All versions of `sdfjghlkfjdshlkjdhsfg` contain malicious code. The package is essentially a worm that fetches all packages owned by the user, adds a script to self-replicate as a preinstall script and publishes a new version.
## Recommendation
Remove the package from your environment and ensure all packages owned were not impacted.
| null |
2021-09-30T20:03:20Z
|
2020-09-03T18:11:29Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1072'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.