ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-qj2g-642f-4jrv
|
Malicious Package in carloprojectlesang
|
All versions of `carloprojectlesang` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
| null |
2021-09-30T21:15:22Z
|
2020-09-02T21:17:30Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/872'}
| null |
npm
|
GHSA-xmmp-hrmx-x5g7
|
Malicious Package in bowe
|
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:37:37Z
|
2020-09-02T21:32:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/899'}
| null |
npm
|
GHSA-4gfq-6m28-m5mg
|
Improper neutralization of arguments in freediskspace
|
This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js.
|
{'CVE-2020-7775'}
|
2021-03-19T23:11:49Z
|
2021-04-13T15:16:11Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7775', 'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716'}
| null |
npm
|
GHSA-j6v9-xgvh-f796
|
Command Injection in wxchangba
|
All versions of `wxchangba` are vulnerable to Command Injection. The package does not validate user input on the `reqPostMaterial` function, passing contents of the `file` parameter to an exec call. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:42:04Z
|
2020-09-11T21:11:34Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/960'}
| null |
npm
|
GHSA-jfx5-7mr2-g8hg
|
Malicious Package in alico
|
All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T18:35:26Z
|
2020-09-03T17:31:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1047'}
| null |
npm
|
GHSA-2q4g-w47c-4674
|
Unpreventable top-level navigation
|
### Impact
The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites.
### Patches
* `11.0.0-beta.1`
* `10.0.1`
* `9.3.0`
* `8.5.1`
### Workarounds
Sandbox all your iframes using the [`sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox). This will prevent them creating top-frame navigations and is good practice anyway.
### For more information
If you have any questions or comments about this advisory:
* Email us at security@electronjs.org
|
{'CVE-2020-15174'}
|
2021-11-19T14:44:04Z
|
2020-10-06T14:24:04Z
|
HIGH
| null |
{'CWE-20', 'CWE-693'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15174', 'https://github.com/electron/electron', 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674', 'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'}
| null |
npm
|
GHSA-gwg9-rgvj-4h5j
|
Code Injection in morgan
|
Verisons of `morgan` before 1.9.1 are vulnerable to code injection when user input is allowed into the filter or combined with a prototype pollution attack.
## Recommendation
Update to version 1.9.1 or later.
|
{'CVE-2019-5413'}
|
2020-08-31T18:33:56Z
|
2019-03-25T18:03:23Z
|
MODERATE
| null |
{'CWE-94'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/473.json', 'https://www.npmjs.com/advisories/736', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5413', 'https://github.com/advisories/GHSA-gwg9-rgvj-4h5j', 'https://hackerone.com/reports/390881'}
| null |
npm
|
GHSA-3cqr-58rm-57f8
|
Arbitrary Code Execution in Handlebars
|
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
|
{'CVE-2019-20920'}
|
2021-04-22T23:38:32Z
|
2022-02-10T20:38:19Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e', 'https://www.npmjs.com/advisories/1316', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920', 'https://www.npmjs.com/advisories/1324', 'https://www.npmjs.com/package/handlebars', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478'}
| null |
npm
|
GHSA-cg57-p69r-3m7p
|
Improper file handling in matrix-react-sdk
|
Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. This vulnerability is patched in version 3.21.0.
|
{'CVE-2021-32622'}
|
2021-05-19T17:48:44Z
|
2022-02-10T23:46:51Z
|
MODERATE
| null |
{'CWE-74', 'CWE-434'}
|
{'https://www.npmjs.com/package/matrix-react-sdk', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32622', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv', 'https://github.com/matrix-org/matrix-react-sdk/pull/5981'}
| null |
npm
|
GHSA-2xm2-xj2q-qgpj
|
receiving subscription objects with deleted session
|
Original Message:
Hi,
I create objects with one client with an ACL of all users with a specific column value. Thats working so far.
Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them.
The client with the deleted session cant create new objects, which Parse restricts right.
The LiveQueryServer doesnt detect deleted sessions after the websocket connection was established.
There should be a mechanism that checks in an specific interval if the session exists.
I dont know if its true with expired sessions.
Any solutions?
Parse version: 4.3.0
Parse js SDK version: 2.17
Solution:
Hi guys.
I've found and fixed the problem. It happens because there are two caches in place for the session token:
- at Parse Server level, which, according with the docs, should be changed via cacheTTL option and defaults to 5 seconds;
- at Parse Live Query level, which, according with the docs, should be changed via liveQueryServerOptions.cacheTimeout and defaults to 30 days.
But there are three problems:
- cacheTTL has currently no effect over Live Query Server;
- cacheTimeout also has currently no effect over Live Query Server;
- cacheTimeout actually defaults to 1h.
So, currently, if you wait 1 hour after the session token was invalidated, the clients using the old session token are not able to receive the events.
What I did:
- Added a test case for the problem;
- Fixed cacheTTL for Live Query Server;
- Fixed cacheTimeout for Live Query Server;
- Changed the cacheTimeout to default 5s;
- Changed the docs to reflect the actual 5s default for cacheTimeout.
|
{'CVE-2020-15270'}
|
2021-10-06T22:02:05Z
|
2020-10-27T19:15:19Z
|
MODERATE
| null |
{'CWE-672'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15270', 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj', 'https://github.com/parse-community/parse-server'}
| null |
npm
|
GHSA-3mgp-fx93-9xv5
|
XSS vulnerability that affects bootstrap
|
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
|
{'CVE-2018-20676'}
|
2021-07-26T21:50:29Z
|
2019-01-17T13:57:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://github.com/advisories/GHSA-3mgp-fx93-9xv5', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/pull/27047', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/issues/27044', 'https://access.redhat.com/errata/RHSA-2019:1456'}
| null |
npm
|
GHSA-77g4-36jp-5v3m
|
Remote Memory Disclosure in bittorrent-dht
|
Versions of `bittorrent-dht` prior to 5.1.3 are affected by a remote memory disclosure vulnerability. This vulnerability allows an attacker to send a specific series of of messages to a listening peer and get it to reveal internal memory.
There are two mitigating factors here, that slightly reduce the impact of this vulnerability:
1. Any modern kernel will zero out new memory pages before handing them off to a process. This means that only memory previously used and deallocated by the node process can be leaked.
1. Node.js manages Buffers by creating a few large internal SlowBuffers, and slicing them up into smaller Buffers which are made accessible in JS. They are not stored on V8's heap, because garbage collection would interfere. The result is that only memory that has been previously allocated as a Buffer can be leaked.
## Recommendation
Update to version 5.1.3 or later.
|
{'CVE-2016-10519'}
|
2020-08-31T18:09:58Z
|
2020-09-01T15:22:12Z
|
MODERATE
| null |
{'CWE-201'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10519', 'https://github.com/feross/bittorrent-dht/issues/87', 'https://nodesecurity.io/advisories/68', 'https://www.npmjs.com/advisories/68'}
| null |
npm
|
GHSA-6jqp-j69q-pm62
|
AWS Lambda parser is vulnerable to Regular Expression Denial of Service
|
index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string.
|
{'CVE-2018-7560'}
|
2022-04-25T22:28:16Z
|
2018-03-05T19:16:56Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/myshenin/aws-lambda-multipart-parser', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560', 'https://github.com/advisories/GHSA-6jqp-j69q-pm62', 'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'}
| null |
npm
|
GHSA-7vm7-j8p7-h346
|
Code injection in blamer
|
Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker.
|
{'CVE-2020-8137'}
|
2021-05-04T22:31:46Z
|
2021-05-06T18:27:55Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://hackerone.com/reports/772448', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8137'}
| null |
npm
|
GHSA-g8m7-qhv7-9h5x
|
Path Traversal in serve-here.js
|
Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 1.2.0 or later.
| null |
2021-09-22T18:35:22Z
|
2019-07-05T21:07:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/569966', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://nodesecurity.io/advisories/554', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/pull/17', 'https://www.npmjs.com/advisories/554'}
| null |
npm
|
GHSA-3h99-v4qw-p2h5
|
Malicious Package in coinpayment
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:57:40Z
|
2020-09-03T19:41:56Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1382'}
| null |
npm
|
GHSA-f8rq-m28h-8hxj
|
Cross-Site Scripting in htmr
|
Versions of `htmr` prior to 0.8.7 are vulnerable to Cross-Site Scripting (XSS). The package uses `innerHTML` to unescape HTML entities. This may lead to [DOM-based XSS](https://owasp.org/www-community/attacks/DOM_Based_XSS) through HTML-encoded XSS payloads. This may allow an attacker to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.8.7 or later.
| null |
2020-08-31T19:01:22Z
|
2020-09-03T15:50:29Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/753971', 'https://www.npmjs.com/advisories/1496'}
| null |
npm
|
GHSA-76qm-4f93-fg6f
|
Improper Input Validation in xdLocalStorage
|
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
|
{'CVE-2015-9545'}
|
2021-05-25T16:14:14Z
|
2021-12-09T19:30:29Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client', 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}
| null |
npm
|
GHSA-vhx6-cp8w-295m
|
Directory Traversal in serverliujiayi1
|
Affected versions of `serverliujiayi1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16095'}
|
2020-08-31T18:20:39Z
|
2020-09-01T16:55:45Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16095', 'https://www.npmjs.com/advisories/367', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1', 'https://nodesecurity.io/advisories/367'}
| null |
npm
|
GHSA-f523-2f5j-gfcg
|
Regular Expression Denial of Service in timespan
|
Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates.
The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds.
## Recommendation
No direct patch is available for this vulnerability.
Currently, the best available solution is to use a functionally equivalent alternative package.
It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases.
|
{'CVE-2017-16115'}
|
2020-08-31T18:26:44Z
|
2018-08-29T23:04:14Z
|
LOW
| null |
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/533', 'https://github.com/indexzero/TimeSpan.js/issues/10', 'https://github.com/advisories/GHSA-f523-2f5j-gfcg', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16115', 'https://www.npmjs.com/advisories/533'}
| null |
npm
|
GHSA-j977-g5vj-j27g
|
Cross-Site Scripting in scratch-svg-renderer
|
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.
|
{'CVE-2020-7750'}
|
2021-01-07T22:49:01Z
|
2020-11-09T14:21:17Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750', 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497'}
| null |
npm
|
GHSA-pm9p-9926-w68m
|
Denial of Service in ecstatic
|
`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory.
[Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/)
```
A payload of 22kB caused a lag of 1 second,
A payload of 35kB caused a lag of 3 seconds,
A payload of 86kB caused the server to crash
```
## Recommendation
Update to version 2.0.0 or later.
|
{'CVE-2016-10703'}
|
2021-09-16T18:15:09Z
|
2017-12-28T22:52:47Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/', 'https://advisory.checkmarx.net/advisory/CX-2016-4450', 'https://github.com/jfhbrook/node-ecstatic', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/advisories/GHSA-pm9p-9926-w68m', 'https://www.npmjs.com/advisories/553', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}
| null |
npm
|
GHSA-2vqq-jgxx-fxjc
|
Malicious Package in motiv.scss
|
Version 0.4.20 of `motiv.scss` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T22:07:26Z
|
2020-09-11T21:24:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/939'}
| null |
npm
|
GHSA-73jp-3c67-hjfv
|
Authentication Bypass in passport-azure-ad
|
Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token.
## Recommendation
Version 1.x: Update to version 1.4.6 or later.
Version 2.x: Update to version 2.0.1 or later.
|
{'CVE-2016-7191'}
|
2021-09-02T19:18:46Z
|
2018-07-26T15:53:31Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://support.microsoft.com/en-us/kb/3187742', 'http://www.securitytracker.com/id/1036996', 'http://www.securityfocus.com/bid/93213', 'https://support.microsoft.com/kb/3187742', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7191', 'https://github.com/advisories/GHSA-73jp-3c67-hjfv', 'https://www.npmjs.com/advisories/151', 'https://github.com/AzureAD/passport-azure-ad', 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD'}
| null |
npm
|
GHSA-vwrf-r5r4-7775
|
Incorrect handling of CORS preflight request headers in hapi
|
Versions of `hapi` prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden.
If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route.
## Recommendation
Update to version 11.0.0 or later.
|
{'CVE-2015-9236'}
|
2020-08-31T18:09:06Z
|
2018-06-07T19:43:25Z
|
MODERATE
| null |
{'CWE-284'}
|
{'https://nodesecurity.io/advisories/45', 'https://github.com/advisories/GHSA-vwrf-r5r4-7775', 'https://github.com/hapijs/hapi/issues/2840', 'https://www.npmjs.com/advisories/45', 'https://github.com/hapijs/hapi/issues/2850', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9236'}
| null |
npm
|
GHSA-xgh6-85xh-479p
|
Regular Expression Denial of Service in npm-user-validate
|
`npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters.
### Impact
The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service.
### Patches
The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit.
### Workarounds
Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand.
| null |
2020-10-16T18:56:02Z
|
2020-10-16T18:56:26Z
|
LOW
| null | null |
{'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}
| null |
npm
|
GHSA-38vq-cjh5-vw7x
|
Malicious Package in nodes.js
|
All versions of `nodes.js ` contain malicious code. The package searches and installs globally thousands of packages based on keywords `node`, `react`, `react-native`, `vue`, `angular` and `babel` to fill the system's memory.
## Recommendation
Remove the package from your environment and validate what packages are installed.
| null |
2021-09-30T20:04:09Z
|
2020-09-03T18:13:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1074'}
| null |
npm
|
GHSA-gjhx-gxwx-jx9j
|
Cross-Site Scripting in jqtree
|
Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data.
When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed.
## Recommendation
Update to 1.3.4 or later.
|
{'CVE-2016-1000234'}
|
2021-09-23T21:33:49Z
|
2020-09-01T15:35:22Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/mbraak/jqTree', 'https://github.com/mbraak/jqTree/issues/437', 'https://www.npmjs.com/advisories/132', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234'}
| null |
npm
|
GHSA-jxwx-85vp-gvwm
|
Regular Expression Denial of Service in jquery-validation
|
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.
The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)
This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
|
{'CVE-2021-21252'}
|
2021-01-13T18:21:42Z
|
2021-01-13T18:21:54Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/package/jquery-validation', 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21252', 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm', 'https://github.com/jquery-validation/jquery-validation/pull/2371', 'https://security.netapp.com/advisory/ntap-20210219-0005/'}
| null |
npm
|
GHSA-w2pf-g6r8-pg22
|
Placeholder property does not indicate HTML capable, could lead to inadvertent abuse
|
## Overview
Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allow cross-site scripting (XSS) on their signup pages.
## Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using Auth0 Lock version 11.20.4 or earlier.
- You pass `additionalSignUpFields` as options when initializing Lock which includes a field of type `checkbox` whose `placeholder` value is obtained from an untrusted source.
An example of a vulnerable snippet is the following where the `placeholder` value is partially user-controlled by the `name` query parameter:
```javascript
<script>
var params = new URLSearchParams(window.location.search);
var options = {
auth: {
redirectUrl: 'http://localhost:12345/callback',
responseType: 'code',
params: {
scope: 'openid email',
},
},
additionalSignUpFields: [{
name: 'agree',
type: 'checkbox',
placeholder: "I agree to Terms and Conditions for " + params.get('name'),
}],
};
var lock = new Auth0Lock('<CLIENT_ID>', '<TENANT_NAME>.auth0.com', options);
lock.show({
allowShowPassword: true,
initialScreen: 'signUp',
});
</script>
```
## How to fix that?
Developers using Auth0’s signin solution Lock need to upgrade to version 11.21.0 or later. Version 11.21.0 introduces two changes:
1. The existing `placeholder` property is now treated as plain text to mitigate the problem.
2. A new `placeholderHTML` property is introduced that indicates the level of control it provides and that it should be only supplied from trusted sources.
## Will this update impact my users?
This fix patches the Auth0 Lock widget and may require changes in application code, but it will not impact your users, their current state, or any existing sessions.
Developers using the `placeholder` property with HTML content from a trusted source should start using the `placeholderHTML` property to continue providing the same user experience.
|
{'CVE-2019-20174'}
|
2021-08-19T16:48:59Z
|
2020-01-31T17:59:51Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5', 'https://github.com/auth0/lock/releases/tag/v11.21.0', 'https://auth0.com/docs/security/bulletins/cve-2019-20174', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20174', 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'}
| null |
npm
|
GHSA-cg48-9hh2-x6mx
|
HTML Injection in preact
|
Versions of `preact` 10.x on prerelease tags alpha and beta prior to 10.0.0-beta.1 are vulnerable to HTML Injection. Due to insufficient input validation the package allows attackers to inject JavaScript objects as virtual-dom nodes, which may lead to Cross-Site Scripting. This requires user input parsed with `JSON.parse()` to be passed directly into JSX without sanitization.
## Recommendation
Upgrade to version 10.0.0-beta.1.
| null |
2021-09-27T20:53:56Z
|
2020-09-02T18:28:58Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://github.com/developit/preact/pull/1528', 'https://medium.com/dailyjs/exploiting-script-injection-flaws-in-reactjs-883fb1fe36c1', 'https://www.npmjs.com/advisories/835', 'https://github.com/developit/preact', 'https://github.com/developit/preact/releases/tag/10.0.0-beta.1'}
| null |
npm
|
GHSA-p72p-rjr2-r439
|
Server-Side Request Forgery in terriajs-server
|
Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment.
## Recommendation
Upgrade to version 2.7.4 or later.
| null |
2020-08-31T18:35:03Z
|
2019-05-29T20:24:02Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://www.npmjs.com/advisories/768', 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5', 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}
| null |
npm
|
GHSA-hwqf-gcqm-7353
|
Header injection in nodemailer
|
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
|
{'CVE-2021-23400'}
|
2021-06-30T17:38:02Z
|
2021-12-10T18:56:57Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737', 'https://github.com/nodemailer/nodemailer/issues/1289'}
| null |
npm
|
GHSA-hx3r-jv9q-85jw
|
Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (CVE-2018-17145)
|
There was an easily exploitable uncontrolled memory resource consumption denial-of-service vulnerability that existed in the peer-to-peer network code of three implementations of Bitcoin and several alternative chains.
For more details please see:
https://invdos.net/
For the paper:
https://invdos.net/paper/CVE-2018-17145.pdf
|
{'CVE-2018-17145'}
|
2021-10-04T21:16:21Z
|
2020-09-10T19:44:58Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md', 'https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145', 'https://github.com/bcoin-org/bcoin/security/advisories/GHSA-hx3r-jv9q-85jw', 'https://invdos.net', 'https://invdos.net/paper/CVE-2018-17145.pdf', 'https://github.com/bcoin-org/bcoin', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17145'}
| null |
npm
|
GHSA-6xwr-q98w-rvg7
|
Prototype Pollution in nconf
|
nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype.
|
{'CVE-2022-21803'}
|
2022-04-22T20:32:05Z
|
2022-04-13T00:00:30Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21803', 'https://snyk.io/vuln/SNYK-JS-NCONF-2395478', 'https://github.com/indexzero/nconf', 'https://github.com/indexzero/nconf/pull/397', 'https://github.com/indexzero/nconf/releases/tag/v0.11.4'}
| null |
npm
|
GHSA-fvc6-qjp7-m4g4
|
Arbitrary file upload in Ghost
|
An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file.
|
{'CVE-2022-27139'}
|
2022-04-22T20:29:43Z
|
2022-04-13T00:00:24Z
|
CRITICAL
| null |
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27139', 'https://github.com/TryGhost/Ghost', 'https://youtu.be/FCqWEvir2wE'}
| null |
npm
|
GHSA-r3j7-x2g5-9gx6
|
Command injection in samba-client
|
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
|
{'CVE-2021-27185'}
|
2022-05-03T03:44:37Z
|
2021-02-11T20:47:27Z
|
CRITICAL
| null |
{'CWE-74', 'CWE-77', 'CWE-78'}
|
{'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://advisory.checkmarx.net/advisory/CX-2021-4302', 'https://github.com/eflexsystems/node-samba-client', 'https://www.npmjs.com/package/samba-client', 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235', 'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27185'}
| null |
npm
|
GHSA-3hw5-q855-g6cw
|
Prototype Pollution in Dojox
|
The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution.
Affected Area:
```
//https://github.com/dojo/dojox/blob/master/jq.js#L442
var tobj = {};
for(var x in props){
// the "tobj" condition avoid copying properties in "props"
// inherited from Object.prototype. For example, if obj has a custom
// toString() method, don't overwrite it with the toString() method
// that props inherited from Object.prototype
if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){
if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){
if(dojo.isArray(props[x])){
obj[x] = props[x];
}else{
obj[x] = jqMix(obj[x], props[x]);
}
}else{
obj[x] = props[x];
}
```
|
{'CVE-2020-5259'}
|
2021-02-18T19:45:35Z
|
2020-03-10T18:03:32Z
|
LOW
| null |
{'CWE-94'}
|
{'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da', 'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html'}
| null |
npm
|
GHSA-p2hm-8725-c8x8
|
Downloads Resources over HTTP in cue-sdk-node
|
Affected versions of `cue-sdk-node` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cue-sdk-node`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10590'}
|
2021-01-08T18:24:35Z
|
2019-02-18T23:50:58Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10590', 'https://github.com/advisories/GHSA-p2hm-8725-c8x8', 'https://nodesecurity.io/advisories/190', 'https://www.npmjs.com/advisories/190'}
| null |
npm
|
GHSA-hgr5-82rc-p936
|
Cross-Site Scripting in md-data-table
|
All versions of `md-data-table` are vulnerable to cross-site scripting (XSS). This vulnerability is exploitable if an attacker has control over data that is rendered by `mdt-row`
## Recommendation
As there is no fix for this vulnerability at this time we recommend either selecting another package to perform this functionality or properly sanitizing all user data prior to rendering with `md-data-table`
| null |
2020-08-31T18:34:23Z
|
2020-09-01T21:24:41Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/748'}
| null |
npm
|
GHSA-4hpf-3wq7-5rpr
|
Regular expression deinal of service (ReDoS) in is-my-json-valid
|
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
|
{'CVE-2018-1107'}
|
2021-04-23T20:09:28Z
|
2022-01-06T20:44:07Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1107', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1546357', 'https://snyk.io/vuln/npm:is-my-json-valid:20180214'}
| null |
npm
|
GHSA-r8hx-3qx6-hxq9
|
Malicious Package in commandre
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:59:17Z
|
2020-09-03T19:41:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1387'}
| null |
npm
|
GHSA-qmv4-jgp7-mf68
|
Broken CORS in sails
|
Affected versions of `sails` have an issue with the CORS configuration where the value of the origin header is reflected as the value for the `Access-Control-Allow-Origin` header. This may allow an attacker to make AJAX requests to vulnerable hosts through cross-site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy.
## Mitigating Factors
This is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file.
The problem can be compounded when the cors `credentials` setting is not provided, because at that point authenticated cross domain requests are possible.
## Recommendation
Update to version 0.12.7 or later.
As this vulnerability is primarily a user error, the patch for the vulnerability will simply cause the application to write an error message to the console when a vulnerable configuration is used in a production environment.
Writing a proper CORS configuration is still the responsibility of the user, so it is necessary to check for the error message after installing the patch. Be sure you are not using `allRoutes: true` with `origin:'*'`, and that you uncomment `origin` and set it to a reasonable value. Ensure that if `origin` is set to `*` that you truly mean for all other websites to be able to make cross-domain requests to your API.
Likewise, ensure `credentials` is uncommented out and set to the appropriate value. Make sure to explicitly set which origins may request resources via CORS.
|
{'CVE-2016-10549'}
|
2020-08-31T18:12:30Z
|
2019-02-18T23:40:10Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://github.com/advisories/GHSA-qmv4-jgp7-mf68', 'https://nodesecurity.io/advisories/148', 'http://sailsjs.org/documentation/reference/configuration/sails-config-cors', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10549', 'http://sailsjs.org/documentation/concepts/security/cors', 'https://www.npmjs.com/advisories/148'}
| null |
npm
|
GHSA-pq5x-rprq-8jrj
|
Directory Traversal in exxxxxxxxxxx
|
Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability is only effective for files that have a file extension, which provides a partial mitigation.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16130'}
|
2020-08-31T18:24:41Z
|
2018-07-23T22:06:14Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx', 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16130', 'https://nodesecurity.io/advisories/478', 'https://www.npmjs.com/advisories/478'}
| null |
npm
|
GHSA-83pq-466j-fc6j
|
Prototype Pollution in sahmat
|
All versions of `sahmat ` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:34Z
|
2020-09-04T15:17:50Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1336'}
| null |
npm
|
GHSA-pjwm-rvh2-c87w
|
Embedded malware in ua-parser-js
|
The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-22T21:43:36Z
|
2021-10-22T20:38:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/faisalman/ua-parser-js/issues/536', 'https://github.com/faisalman/ua-parser-js', 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496', 'https://www.npmjs.com/package/ua-parser-js'}
| null |
npm
|
GHSA-xm7f-x4wx-wmgv
|
Out-of-bounds Read in byte
|
Versions of `byte` before 1.4.1 allocate uninitialized buffers and read data from them past the initialized length
## Recommendation
Update to version 1.4.1 or later.
| null |
2020-08-31T18:31:36Z
|
2019-06-04T15:47:43Z
|
MODERATE
| null |
{'CWE-125'}
|
{'https://www.npmjs.com/advisories/657', 'https://hackerone.com/reports/330351', 'https://github.com/node-modules/byte/pull/3'}
| null |
npm
|
GHSA-957j-59c2-j692
|
Prototype pollution vulnerability in 'getobject'
|
Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28282'}
|
2021-10-08T22:07:57Z
|
2021-10-12T16:26:37Z
|
CRITICAL
| null | null |
{'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282', 'https://github.com/cowboy/node-getobject'}
| null |
npm
|
GHSA-9fg5-f5pj-rwcc
|
Hijacked Environment Variables in gruntcli
|
The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16058'}
|
2020-08-31T18:25:27Z
|
2018-11-09T17:43:52Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/498', 'https://nodesecurity.io/advisories/498', 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16058'}
| null |
npm
|
GHSA-v99v-xgjx-7m7g
|
Malicious Package in asnyc
|
All versions of `asnyc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:00:55Z
|
2020-09-02T18:40:47Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/847'}
| null |
npm
|
GHSA-8xj3-7258-w4q2
|
Directory Traversal in dasafio
|
Affected versions of `dasafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16179'}
|
2020-08-31T18:23:58Z
|
2020-09-01T18:51:22Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/460', 'https://nodesecurity.io/advisories/460', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16179'}
| null |
npm
|
GHSA-8c8c-4vfj-rrpc
|
Reflected Cross-Site Scripting in redis-commander
|
Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander.
Mitigating factors:
Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/)
## Proof of concept
```
http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}//
```
## Recommendation
No direct patch for this vulnerability is currently available.
At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links.
| null |
2022-03-04T22:02:50Z
|
2020-09-01T19:05:11Z
|
LOW
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/562', 'https://github.com/joeferner/redis-commander', 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14', 'https://hackerone.com/reports/296377', 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}
| null |
npm
|
GHSA-4943-9vgg-gr5r
|
Cross-site Scripting in quill
|
A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned.
This CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364).
|
{'CVE-2021-3163'}
|
2022-03-22T15:00:36Z
|
2021-05-10T15:38:12Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/quilljs/quill', 'https://quilljs.com', 'https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html', 'https://github.com/quilljs/quill/issues/3364', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3163', 'https://github.com/quilljs/quill/issues/3273', 'https://github.com/quilljs/quill/issues/3359'}
| null |
npm
|
GHSA-j5qg-46p9-w2rp
|
Malicious Package in jekyll-for-github-projects
|
Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:08Z
|
2020-09-03T00:33:32Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/936'}
| null |
npm
|
GHSA-35g4-qx3c-vjhx
|
Automatic room upgrade handling can be used maliciously to bridge a room non-consentually
|
### Impact
If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any mailcious admin of a bridged room can repoint the traffic to a different room without the new room being aware.
### Patches
Versions 2.6.1 and greater are patched.
### Workarounds
Disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options.
### References
The issue is patched by https://github.com/matrix-org/matrix-appservice-bridge/pull/330
### For more information]
If you have any questions or comments about this advisory, email us at security@matrix.org.
|
{'CVE-2021-32659'}
|
2021-06-16T20:08:37Z
|
2021-06-21T17:09:22Z
|
MODERATE
| null |
{'CWE-306'}
|
{'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f', 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330', 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32659', 'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1'}
| null |
npm
|
GHSA-6vfc-qv3f-vr6c
|
Uncontrolled Resource Consumption in markdown-it
|
### Impact
Special patterns with length > 50K chars can slow down parser significantly.
```js
const md = require('markdown-it')();
md.render(`x ${' '.repeat(150000)} x \nx`);
```
### Patches
Upgrade to v12.3.2+
### Workarounds
No.
### References
Fix + test sample: https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101
|
{'CVE-2022-21670'}
|
2022-01-19T18:25:52Z
|
2022-01-12T22:20:22Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21670', 'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101', 'https://github.com/markdown-it/markdown-it', 'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c'}
| null |
npm
|
GHSA-j9xp-92vc-559j
|
SQL Injection in sequelize
|
Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
If you are using `sequelize` 5.x, upgrade to version 5.8.11 or later.
If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later.
If you are using `sequelize` 3.x, upgrade to version 3.35.1 or later.
|
{'CVE-2019-10748'}
|
2021-08-18T22:09:33Z
|
2019-11-06T17:11:10Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221', 'https://github.com/sequelize/sequelize/commit/a72a3f5,', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748', 'https://www.npmjs.com/advisories/1018', 'https://github.com/sequelize/sequelize/pull/11089,'}
| null |
npm
|
GHSA-45cp-hpc9-8347
|
Malicious Package in css_transform_support
|
Version 1.0.2 of `css_transform_support` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:19Z
|
2020-09-01T19:52:35Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/624'}
| null |
npm
|
GHSA-g4hj-r7r3-9rwv
|
OS Command Injection in gulp-scss-lint
|
gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the "exec" function located in "src/command.js" via the provided options.
|
{'CVE-2020-7601'}
|
2021-07-28T20:50:13Z
|
2021-05-07T16:15:37Z
|
CRITICAL
| null |
{'CWE-98'}
|
{'https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7601'}
| null |
npm
|
GHSA-49r3-3h96-rwj6
|
Cross-Site Scripting in ids-enterprise
|
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later
| null |
2020-08-31T18:41:54Z
|
2019-06-13T19:09:31Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/infor-design/enterprise-ng/issues/503', 'https://www.npmjs.com/advisories/956', 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}
| null |
npm
|
GHSA-2563-83p7-f34p
|
Malicious Package in requestt
|
All versions of `requestt` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:04:11Z
|
2020-09-02T20:24:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/856'}
| null |
npm
|
GHSA-p65h-233c-jxvm
|
Downloads Resources over HTTP in resourcehacker
|
Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `resourcehacker`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10646'}
|
2021-01-08T18:23:55Z
|
2018-08-15T19:03:59Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/254', 'https://nodesecurity.io/advisories/254', 'https://github.com/advisories/GHSA-p65h-233c-jxvm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646', 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'}
| null |
npm
|
GHSA-gcm9-cc3r-c6vj
|
Cross-site Scripting (XSS) in Eclipse Theia
|
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
|
{'CVE-2020-27224'}
|
2021-03-29T22:10:04Z
|
2021-04-13T15:18:09Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://github.com/eclipse-theia/theia/pull/7971', 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224', 'https://github.com/eclipse-theia/theia/issues/7954'}
| null |
npm
|
GHSA-g7q5-pjjr-gqvp
|
Regular Expression Denial of Service in tough-cookie
|
Affected versions of `tough-cookie` are susceptible to a regular expression denial of service.
The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.
If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.
## Recommendation
Update to version 2.3.3 or later.
|
{'CVE-2017-15010'}
|
2021-09-10T20:28:19Z
|
2018-07-24T20:14:39Z
|
HIGH
| null |
{'CWE-400'}
|
{'http://www.securityfocus.com/bid/101185', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://github.com/salesforce/tough-cookie', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/', 'https://www.npmjs.com/advisories/525', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010', 'https://access.redhat.com/errata/RHSA-2018:1264', 'https://access.redhat.com/errata/RHSA-2017:2913', 'https://github.com/advisories/GHSA-g7q5-pjjr-gqvp', 'https://github.com/salesforce/tough-cookie/issues/92', 'https://snyk.io/vuln/npm:tough-cookie:20170905', 'https://nodesecurity.io/advisories/525'}
| null |
npm
|
GHSA-5p28-63mc-cgr9
|
Cross-Site Scripting bypass in html-purify
|
All versions of html-purify are vulnerable to cross-site scripting. The data attribute inside of object tags is not properly sanitized and allows javascript URIs leading to code execution.
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-12-04T20:02:42Z
|
2020-12-04T20:04:37Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1586'}
| null |
npm
|
GHSA-pwqj-h62h-q35c
|
Directory Traversal in goserv
|
Affected versions of `goserv` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16133'}
|
2020-08-31T18:24:28Z
|
2018-07-23T20:49:03Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16133', 'https://github.com/advisories/GHSA-pwqj-h62h-q35c', 'https://nodesecurity.io/advisories/473', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv', 'https://www.npmjs.com/advisories/473'}
| null |
npm
|
GHSA-q8pj-2vqx-8ggc
|
Denial of service in css-what
|
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
|
{'CVE-2021-33587'}
|
2021-12-02T17:48:49Z
|
2021-06-07T22:11:39Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/fb55/css-what/releases/tag/v5.0.1', 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33587', 'https://security.netapp.com/advisory/ntap-20210706-0007/', 'https://github.com/fb55/css-what'}
| null |
npm
|
GHSA-7pr3-p5fm-8r9x
|
LiveQuery publishes user session tokens in parse-server
|
### Impact
For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload.
### Patches
Remove session token from LiveQuery payload.
### Workaround
Set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.
|
{'CVE-2021-41109'}
|
2021-09-30T16:43:12Z
|
2021-09-30T17:09:47Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/parse-community/parse-server/releases/tag/4.10.4', 'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109', 'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x'}
| null |
npm
|
GHSA-9r2w-394v-53qc
|
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created.
This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems.
By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite.
Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created.
These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7.
The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below.
### Patches
4.4.16 || 5.0.8 || 6.1.7
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links.
```js
const tar = require('tar')
tar.x({
file: 'archive.tgz',
filter: (file, entry) => {
if (entry.type === 'SymbolicLink') {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves.
### Fix
The problem is addressed in the following ways:
1. All paths are normalized to use `/` as a path separator, replacing `\` with `/` on Windows systems, and leaving `\` intact in the path on posix systems. This is performed in depth, at every level of the program where paths are consumed.
2. Directory cache pruning is performed case-insensitively. This _may_ result in undue cache misses on case-sensitive file systems, but the performance impact is negligible.
#### Caveat
Note that this means that the `entry` objects exposed in various parts of tar's API will now always use `/` as a path separator, even on Windows systems. This is not expected to cause problems, as `/` is a valid path separator on Windows systems, but _may_ result in issues if `entry.path` is compared against a path string coming from some other API such as `fs.realpath()` or `path.resolve()`.
Users are encouraged to always normalize paths using a well-tested method such as `path.resolve()` before comparing paths to one another.
|
{'CVE-2021-37701'}
|
2021-08-31T16:01:50Z
|
2021-08-31T16:05:27Z
|
HIGH
| null |
{'CWE-59', 'CWE-22'}
|
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37701', 'https://www.debian.org/security/2021/dsa-5008', 'https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc', 'https://github.com/npm/node-tar'}
| null |
npm
|
GHSA-g973-978j-2c3p
|
Denial of Service in SheetJS Pro
|
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.
|
{'CVE-2021-32014'}
|
2022-03-03T05:14:12.644117Z
|
2021-07-22T19:47:15Z
|
MODERATE
| null |
{'CWE-345', 'CWE-400'}
|
{'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
npm
|
GHSA-g74r-ffvr-5q9f
|
Memory Exposure in concat-stream
|
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()`
Versions <1.3.0 are not affected due to not using unguarded Buffer constructor.
## Recommendation
Update to version 1.5.2, 1.4.11, 1.3.2 or later.
If you are unable to update make sure user provided input into the `write()` function is not a number.
| null |
2020-08-31T18:29:17Z
|
2019-06-03T17:26:44Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://nodesecurity.io/advisories/597', 'https://github.com/maxogden/concat-stream/pull/47', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'}
| null |
npm
|
GHSA-qw96-mm2g-c8m7
|
Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page
|
Next.js 7.0.0 and 7.0.1 has XSS via the 404 or 500 /_error page.
|
{'CVE-2018-18282'}
|
2022-04-26T18:43:28Z
|
2018-10-15T21:43:12Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/zeit/next.js', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18282', 'https://github.com/zeit/next.js/releases/tag/7.0.2', 'https://github.com/advisories/GHSA-qw96-mm2g-c8m7'}
| null |
npm
|
GHSA-5fg8-2547-mr8q
|
Misinterpretation of malicious XML input
|
### Impact
xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`)
See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved.
### Workarounds
Downstream applications can validate the input and reject the maliciously crafted documents.
### References
Similar to this one reported on the Go standard library:
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
- https://mattermost.com/blog/securing-xml-implementations-across-the-web/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom)
* Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom`
|
{'CVE-2021-32796'}
|
2022-01-04T19:36:30Z
|
2021-08-03T16:57:05Z
|
MODERATE
| null |
{'CWE-116'}
|
{'https://www.npmjs.com/package/@xmldom/xmldom', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://github.com/xmldom/xmldom', 'https://mattermost.com/blog/securing-xml-implementations-across-the-web/', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}
| null |
npm
|
GHSA-f9cm-p3w6-xvr3
|
Denial-of-Service Extended Event Loop Blocking in qs
|
Versions prior to 1.0.0 of `qs` are affected by a denial of service vulnerability that results from excessive recursion in parsing a deeply nested JSON string.
## Recommendation
Update to version 1.0.0 or later
|
{'CVE-2014-10064'}
|
2020-08-31T18:08:25Z
|
2018-10-09T00:38:48Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-10064', 'https://github.com/advisories/GHSA-f9cm-p3w6-xvr3', 'https://www.npmjs.com/advisories/28', 'https://nodesecurity.io/advisories/28'}
| null |
npm
|
GHSA-fq6p-x6j3-cmmq
|
Denial of service in three
|
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms")
|
{'CVE-2020-28496'}
|
2021-02-24T07:40:52Z
|
2021-03-01T19:57:16Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}
| null |
npm
|
GHSA-8948-ffc6-jg52
|
Insecure Default Configuration in redbird
|
Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable.
## Recommendation
Upgrade to version 0.9.1 or later.
| null |
2021-08-04T20:58:53Z
|
2019-06-06T15:32:21Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516', 'https://github.com/OptimalBits/redbird/pull/207', 'https://www.npmjs.com/advisories/828', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'}
| null |
npm
|
GHSA-gc94-6w89-hpqr
|
Command Injection in fs-path
|
All versions of `fs-path` are vulnerable to command injection is unsanitized user input is passed in.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
| null |
2021-09-16T20:59:56Z
|
2019-06-12T16:37:07Z
|
HIGH
| null |
{'CWE-77', 'CWE-62'}
|
{'https://hackerone.com/reports/324491', 'https://nodesecurity.io/advisories/661', 'https://www.npmjs.com/advisories/661', 'https://github.com/pillys/fs-path'}
| null |
npm
|
GHSA-w7wg-24g3-2c78
|
Malicious Package in requset
|
All versions of `requset` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T20:29:47Z
|
2020-09-02T21:14:17Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/869'}
| null |
npm
|
GHSA-mpgr-2cx9-327h
|
Information disclosure in SSB-DB
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately.
**There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.**
The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway.
### For more information
If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/)
|
{'CVE-2020-4045'}
|
2021-01-08T20:12:11Z
|
2020-06-11T21:09:04Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h'}
| null |
npm
|
GHSA-vx5w-cxch-wwc9
|
Path Traversal in f-serv
|
All versions of `f-serv` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:46:58Z
|
2020-09-03T19:02:27Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/1092'}
| null |
npm
|
GHSA-mxhp-79qh-mcx6
|
taffy can allow access to any data items in the DB
|
taffy through 2.6.2 allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.
|
{'CVE-2019-10790'}
|
2021-07-28T18:32:27Z
|
2020-02-19T16:43:42Z
|
HIGH
| null |
{'CWE-668', 'CWE-20'}
|
{'https://snyk.io/vuln/SNYK-JS-TAFFY-546521', 'https://www.npmjs.com/package/taffy', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790'}
| null |
npm
|
GHSA-6m6m-j2hm-pxrg
|
Malicious Package in cicada-render
|
All versions of `cicada-render` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:33:36Z
|
2020-09-03T17:37:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1051'}
| null |
npm
|
GHSA-qm4q-f956-fg64
|
Malicious Package in luna-mock
|
All versions of `luna-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:00Z
|
2020-09-03T17:39:13Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1055'}
| null |
npm
|
GHSA-3rpr-mg43-xhq4
|
High severity vulnerability that affects auth0-js
|
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with auth0.popup.callback().
|
{'CVE-2017-17068'}
|
2021-08-31T21:24:03Z
|
2017-12-21T00:47:20Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-3rpr-mg43-xhq4', 'https://auth0.com/docs/security/bulletins/cve-2017-17068', 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}
| null |
npm
|
GHSA-87vv-r9j6-g5qv
|
Regular Expression Denial of Service in moment
|
Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`.
## Proof of concept
```
var moment = require('moment');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
for (i=20000;i<=10000000;i=i+10000) {
console.log("COUNT: " + i);
var str = '-' + genstr(i, '1')
console.log("LENGTH: " + str.length);
var start = process.hrtime();
moment.duration(str)
var end = process.hrtime(start);
console.log(end);
}
```
### Results
```
$ node moment.js
COUNT: 20000
LENGTH: 20002
[ 0, 618931029 ]
COUNT: 30001
LENGTH: 30003
[ 1, 401413894 ]
COUNT: 40002
LENGTH: 40004
[ 2, 437075303 ]
COUNT: 50003
LENGTH: 50005
[ 3, 824664804 ]
COUNT: 60004
LENGTH: 60006
[ 5, 651335262 ]
```
## Recommendation
Please update to version 2.11.2 or later.
|
{'CVE-2016-4055'}
|
2021-09-07T14:33:22Z
|
2017-10-24T18:33:35Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://www.npmjs.com/advisories/55', 'https://www.tenable.com/security/tns-2019-02', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055', 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv', 'http://www.securityfocus.com/bid/95849', 'https://nodesecurity.io/advisories/55', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-5rm3-qhxf-rh3r
|
Downloads Resources over HTTP in co-cli-installer
|
Affected versions of `co-cli-installer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `co-cli-installer`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10657'}
|
2021-01-08T19:48:25Z
|
2019-02-18T23:45:10Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10657', 'https://nodesecurity.io/advisories/268', 'https://www.npmjs.com/advisories/268', 'https://github.com/advisories/GHSA-5rm3-qhxf-rh3r'}
| null |
npm
|
GHSA-8c3f-x5f9-6h62
|
Command injection in @diez/generation
|
The `@diez/generation` npm package is a client for Diez. The locateFont method of @diez/generation has a command injection vulnerability. Clients of the @diez/generation library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. All versions of this package are vulnerable as of the writing of this CVE.
|
{'CVE-2021-32830'}
|
2021-08-26T14:39:22Z
|
2021-09-02T17:08:20Z
|
LOW
| null |
{'CWE-77', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32830', 'https://www.npmjs.com/package/@diez/generation', 'https://github.com/diez/diez', 'https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/'}
| null |
npm
|
GHSA-wxrm-2h86-v95f
|
Malicious Package in pizza-pasta
|
Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console.
## Recommendation
Remove the package from your environment. There are no evidences of further compromise.
| null |
2021-09-29T20:45:26Z
|
2020-09-03T21:04:20Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1196'}
| null |
npm
|
GHSA-vgjp-vh3c-32v3
|
Directory Traversal in mockserve
|
Affected versions of `mockserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16146'}
|
2020-08-31T18:23:25Z
|
2018-07-23T20:46:55Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-vgjp-vh3c-32v3', 'https://www.npmjs.com/advisories/445', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16146', 'https://nodesecurity.io/advisories/445', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve'}
| null |
npm
|
GHSA-cvfm-xjc8-f2vm
|
Denial of Service in @commercial/subtext
|
Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 5.1.2 or later.
| null |
2020-08-31T19:00:44Z
|
2020-09-03T15:46:36Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1477'}
| null |
npm
|
GHSA-2598-2f59-rmhq
|
SQL Injection in sequelize
|
Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 3.35.1 or later.
|
{'CVE-2019-10749'}
|
2021-08-18T22:10:20Z
|
2019-11-08T17:05:17Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222', 'https://www.npmjs.com/advisories/1017', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
| null |
npm
|
GHSA-wh33-4p32-g7vh
|
Directory Traversal in serverxxx
|
Affected versions of `serverxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16182'}
|
2020-08-31T18:23:48Z
|
2018-07-23T20:43:56Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-wh33-4p32-g7vh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16182', 'https://nodesecurity.io/advisories/455', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx', 'https://www.npmjs.com/advisories/455'}
| null |
npm
|
GHSA-cf4h-3jhx-xvhq
|
Arbitrary Code Execution in underscore
|
The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
|
{'CVE-2021-23358'}
|
2021-08-25T17:37:24Z
|
2021-05-06T16:09:43Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505', 'https://www.tenable.com/security/tns-2021-14', 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/', 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/releases/tag/1.12.1', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504', 'https://www.debian.org/security/2021/dsa-4883', 'https://www.npmjs.com/package/underscore', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html', 'https://github.com/jashkenas/underscore', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984', 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/', 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66', 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503', 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/pull/2917', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23358'}
| null |
npm
|
GHSA-4g77-cvgw-grvw
|
Prototype Pollution in putil-merge
|
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
|
{'CVE-2021-23470'}
|
2022-02-11T16:15:46Z
|
2022-02-05T00:00:31Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/panates/putil-merge/', 'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487', 'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470'}
| null |
npm
|
GHSA-cq8r-fc3q-6hg2
|
Denial of Service (DoS) via the unsetByPath function in jsjoints
|
The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.
|
{'CVE-2020-28479'}
|
2021-04-06T20:51:59Z
|
2021-04-13T15:29:40Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039', 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479'}
| null |
npm
|
GHSA-p4mf-4qvh-w8g5
|
Malicious Package in bitcionjslib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:39:41Z
|
2020-09-04T15:41:42Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1361'}
| null |
npm
|
GHSA-6495-8jvh-f28x
|
File restriction bypass in socket.io-file
|
All versions of `socket.io-file`are vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter the `name` value to upload any file types.
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T21:23:14Z
|
2020-10-02T15:39:54Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://github.com/rico345100/socket.io-file', 'https://www.npmjs.com/advisories/1564'}
| null |
npm
|
GHSA-rwcq-qpm6-7867
|
Malicious Package in riped160
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:04:25Z
|
2020-09-03T17:04:32Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1403'}
| null |
npm
|
GHSA-72q2-5rxx-xfff
|
Downloads Resources over HTTP in gfe-sass
|
Affected versions of `gfe-sass` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `gfe-sass`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2017-16040'}
|
2021-01-14T15:56:52Z
|
2020-09-01T16:12:12Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16040', 'https://www.npmjs.com/advisories/291', 'https://nodesecurity.io/advisories/291'}
| null |
npm
|
GHSA-8qpm-5c82-rf96
|
Prototype Pollution in backbone-query-parameters
|
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in backbone-query-parameters 0.4.0 allows a malicious user to inject properties into Object.prototype.
|
{'CVE-2021-20085'}
|
2021-04-26T19:07:16Z
|
2021-05-06T15:52:02Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20085', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.