ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-qvp5-mm7v-4f36
|
Cross-site Scripting in Strapi
|
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
|
{'CVE-2020-27666'}
|
2020-10-29T19:38:18Z
|
2020-10-29T19:40:08Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27666', 'https://github.com/strapi/strapi/pull/8440', 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}
| null |
npm
|
GHSA-qc22-qwm9-j8rx
|
Remote Code Execution in npm-groovy-lint
|
Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.
| null |
2021-12-20T16:57:06Z
|
2021-12-20T16:59:31Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/nvuillam/npm-groovy-lint', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/nvuillam/npm-groovy-lint/issues/194', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}
| null |
npm
|
GHSA-p6jh-p7q8-pcrg
|
Prototype Pollution in nodee-utils
|
All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.
|
{'CVE-2020-7722'}
|
2021-05-05T17:59:12Z
|
2021-05-06T18:26:21Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'}
| null |
npm
|
GHSA-566m-qj78-rww5
|
Regular Expression Denial of Service in postcss
|
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
|
{'CVE-2021-23382'}
|
2022-02-23T20:31:15Z
|
2022-01-07T00:21:36Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382', 'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641', 'https://github.com/postcss/postcss/releases/tag/7.0.36'}
| null |
npm
|
GHSA-cqqh-49mx-fq63
|
Prototype Pollution in merge
|
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3645'}
|
2021-09-13T19:14:06Z
|
2021-09-13T20:16:54Z
|
MODERATE
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://github.com/viking04/merge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'}
| null |
npm
|
GHSA-265q-28rp-chq5
|
Insecure Entropy Source - Math.random() in node-uuid
|
Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's.
## Recommendation
Update to version 1.4.4 or later.
|
{'CVE-2015-8851'}
|
2021-08-23T15:25:55Z
|
2020-04-16T03:14:50Z
|
HIGH
| null |
{'CWE-331'}
|
{'https://github.com/broofa/node-uuid/issues/108', 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://nodesecurity.io/advisories/93', 'https://www.npmjs.com/advisories/93', 'https://github.com/broofa/node-uuid/issues/122', 'http://www.openwall.com/lists/oss-security/2016/04/13/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851'}
| null |
npm
|
GHSA-m6rw-m2v9-7hx4
|
OS Command Injection in wifiscanner
|
wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.
|
{'CVE-2020-15362'}
|
2021-07-29T19:48:29Z
|
2021-05-17T21:00:59Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15362', 'https://github.com/thingsSDK/wifiscanner/issues/1'}
| null |
npm
|
GHSA-3xph-cp8f-2229
|
Prototype Pollution in @fabiocaccamo/utils.js
|
utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
|
{'CVE-2021-3815'}
|
2021-12-13T13:10:41Z
|
2021-12-10T20:31:32Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3815', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://github.com/fabiocaccamo/utils.js', 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'}
| null |
npm
|
GHSA-cff4-rrq6-h78w
|
Command Injection in command-exists
|
Versions of `command-exists` before 1.2.4 are vulnerable to command injection. This is exploitable if user input is provided to this module.
## Recommendation
Update to version 1.2.4 or later.
| null |
2020-08-31T18:31:41Z
|
2019-06-03T17:31:26Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/659', 'https://github.com/mathisonian/command-exists/blob/v1.2.2/lib/command-exists.js#L49-L94', 'https://hackerone.com/reports/324453'}
| null |
npm
|
GHSA-9gqr-xp86-f87h
|
Code injection in npm git
|
All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released.
|
{'CVE-2021-23632'}
|
2022-03-25T16:13:13Z
|
2022-03-18T00:01:11Z
|
MODERATE
| null |
{'CWE-94', 'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-GIT-1568518', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23632'}
| null |
npm
|
GHSA-xrjf-phvv-r4vr
|
Command injection in strapi
|
When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user input.
|
{'CVE-2022-0764'}
|
2022-03-09T20:26:21Z
|
2022-02-27T00:00:15Z
|
MODERATE
| null |
{'CWE-77', 'CWE-78'}
|
{'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://github.com/strapi/strapi', 'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764'}
| null |
npm
|
GHSA-pf8j-vhg8-xmc3
|
Injection in karma-mojo
|
karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument.
|
{'CVE-2020-7626'}
|
2021-07-28T22:02:01Z
|
2022-02-10T23:42:58Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/amireh/karma-mojo/blob/master/index.js#L100,', 'https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7626'}
| null |
npm
|
GHSA-wg85-p6j7-gp3w
|
Moderate severity vulnerability that affects simplemde
|
SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with [ and ( characters, which is mishandled during construction of an A element.
|
{'CVE-2018-19057'}
|
2021-09-21T19:44:45Z
|
2018-11-21T22:21:25Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/sparksuite/simplemde-markdown-editor', 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721', 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19057'}
| null |
npm
|
GHSA-wx3q-6x7x-jjw4
|
Downloads Resources over HTTP in mystem
|
Affected versions of `mystem` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10664'}
|
2021-01-08T00:47:48Z
|
2019-02-18T23:44:39Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10664', 'https://nodesecurity.io/advisories/259', 'https://www.npmjs.com/advisories/259', 'https://github.com/advisories/GHSA-wx3q-6x7x-jjw4'}
| null |
npm
|
GHSA-vcjf-mgcg-jxjq
|
Cross-site Scripting in CKEditor 4.0
|
A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).
|
{'CVE-2020-9281'}
|
2022-02-08T22:06:54Z
|
2021-05-07T16:32:17Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9281', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-wvh7-5p38-2qfc
|
Storing Password in Local Storage
|
The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext."
Example Code:
```js
async () => {
const user = Parse.User.current()
if (user) {
user.setPassword('newpass')
await user.save()
}
}
```
After running the above code, the new password will be stored in localStorage as a property named "password".
Proposed Solution:
Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object.
Configuration:
Parse SDK: 2.9.1
Parse Server: 3.9.0
| null |
2021-09-22T21:05:43Z
|
2020-07-23T18:20:10Z
|
MODERATE
| null |
{'CWE-256'}
|
{'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb', 'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS'}
| null |
npm
|
GHSA-762f-c2wg-m8c8
|
Denial of Service in protobufjs
|
Versions of `protobufjs` before 5.0.3 and 6.8.6 are vulnerable to denial of service when parsing crafted invalid *.proto files.
## Recommendation
Update to version 5.0.3, 6.8.6 or later.
|
{'CVE-2018-3738'}
|
2020-08-31T18:29:36Z
|
2018-10-09T00:27:15Z
|
MODERATE
| null |
{'CWE-770'}
|
{'https://github.com/dcodeIO/protobuf.js/blob/6.8.5/src/parse.js#L27', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3738', 'https://www.npmjs.com/advisories/605', 'https://hackerone.com/reports/319576', 'https://github.com/advisories/GHSA-762f-c2wg-m8c8'}
| null |
npm
|
GHSA-85q4-v37c-wfpc
|
Malicious Package in bitcion-ops
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:39:09Z
|
2020-09-04T15:39:28Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1359'}
| null |
npm
|
GHSA-cqr2-xhg6-p268
|
OS Command Injection in node-mpv
|
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
|
{'CVE-2020-7632'}
|
2021-07-28T22:40:26Z
|
2022-01-07T00:20:27Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/j-holub/Node-MPV/blob/master/lib/util.js#L34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7632', 'https://snyk.io/vuln/SNYK-JS-NODEMPV-564426'}
| null |
npm
|
GHSA-v464-rcx7-j875
|
Directory Traversal in infraserver
|
Affected versions of `infraserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16142'}
|
2020-08-31T18:24:23Z
|
2018-07-23T20:48:29Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/471', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16142', 'https://github.com/advisories/GHSA-v464-rcx7-j875', 'https://nodesecurity.io/advisories/471'}
| null |
npm
|
GHSA-4rx9-58m7-gr8w
|
Malicious Package in css_transform_step
|
Version 1.0.6 of `css_transform_step` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.6 of this module is found installed you will want to replace it with a version before or after 1.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:17Z
|
2020-09-01T19:53:40Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/623'}
| null |
npm
|
GHSA-6m8p-4fxj-pgc2
|
OS Command Injection in mversion
|
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
|
{'CVE-2020-7688'}
|
2021-05-11T19:56:27Z
|
2021-05-17T21:01:08Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-MVERSION-573174', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688', 'https://github.com/418sec/huntr/pull/102', 'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}
| null |
npm
|
GHSA-435c-qcpm-wjw5
|
Malicious Package in fs-extar
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:02:01Z
|
2020-09-03T17:05:43Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1397'}
| null |
npm
|
GHSA-hxwc-5vw9-2w4w
|
NoSQL Injection in loopback-connector-mongodb
|
Versions of `loopback-connector-mongodb` prior to 3.6.0 are vulnerable to NoSQL Injection. Filters passed to the database query are not properly sanitized which leads to execution of code on the database driver and data leak.
## Recommendation
Upgrade to version 3.6.0 or later.
| null |
2021-09-27T15:13:26Z
|
2020-09-02T15:52:39Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/767', 'https://github.com/loopbackio/loopback-connector-mongodb', 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html'}
| null |
npm
|
GHSA-45j8-pm75-5v8x
|
Path Traversal in simplehttpserver
|
Versions of `simplehttpserver` prior to 0.2.1 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 0.2.1 or later.
|
{'CVE-2018-16493'}
|
2020-08-31T18:42:22Z
|
2019-02-07T18:18:04Z
|
HIGH
| null |
{'CWE-548'}
|
{'https://www.npmjs.com/advisories/968', 'https://hackerone.com/reports/432600', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16493', 'https://hackerone.com/reports/357109', 'https://github.com/advisories/GHSA-45j8-pm75-5v8x', 'https://www.npmjs.com/advisories/967'}
| null |
npm
|
GHSA-68hw-vfh7-xvg8
|
Forced Logout in keycloak-connect
|
Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely.
## Recommendation
Upgrade to version 4.4.0 or later.
|
{'CVE-2019-10157'}
|
2021-08-16T15:25:07Z
|
2019-06-13T20:38:09Z
|
MODERATE
| null |
{'CWE-287', 'CWE-345'}
|
{'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6', 'http://www.securityfocus.com/bid/108734', 'https://www.npmjs.com/advisories/978', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157'}
| null |
npm
|
GHSA-4v4g-726h-xvfv
|
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime
|
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
|
{'CVE-2021-29445'}
|
2021-04-16T23:00:41Z
|
2021-04-19T14:59:06Z
|
MODERATE
| null |
{'CWE-696', 'CWE-203', 'CWE-208'}
|
{'https://www.npmjs.com/package/jose-node-esm-runtime', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445', 'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv'}
| null |
npm
|
GHSA-4j54-mxf6-wxx2
|
OS Command Injection in pomelo-monitor
|
pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params.
|
{'CVE-2020-7620'}
|
2021-07-28T21:52:51Z
|
2021-05-10T18:37:16Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/halfblood369/monitor/blob/900b5cadf59edcccac4754e5706a22719925ddb9/lib/processMonitor.js,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7620', 'https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695'}
| null |
npm
|
GHSA-p6rw-44q7-3fw4
|
Stored XSS in Jupyter nbdime
|
### Impact
Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected.
### Patches
Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package.
#### Python
- nbdime 1.x: Patched in v. 1.1.1
- nbdime 2.x: Patched in v. 2.1.1
- nbdime 3.x: Patched in v. 3.1.1
#### npm
- nbdime 6.x version: Patched in 6.1.2
- nbdime 5.x version: Patched in 5.0.2
- nbdime-jupyterlab 1.x version: Patched in 1.0.1
- nbdime-jupyterlab 2.x version: Patched in 2.1.1
### For more information
If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
|
{'CVE-2021-41134'}
|
2022-03-03T05:14:20.151154Z
|
2021-11-08T18:09:27Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134', 'https://github.com/jupyter/nbdime', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
| null |
npm
|
GHSA-5rwj-j5m3-3chj
|
Missing Release of Memory after Effective Lifetime in detect-character-encoding
|
### Impact
In detect-character-encoding v0.3.0 and earlier, allocated memory is not released.
### Patches
The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const detectCharacterEncoding = require("detect-character-encoding");
const app = express();
app.get("/", (req, res) => {
detectCharacterEncoding(Buffer.from("foo"));
res.end();
});
app.listen(3000);
```
`hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory.
### References
- https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588
- https://github.com/sonicdoe/detect-character-encoding/pull/6
|
{'CVE-2021-39176'}
|
2021-10-21T14:28:07Z
|
2021-09-01T18:25:16Z
|
HIGH
| null |
{'CWE-401'}
|
{'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/sonicdoe/detect-character-encoding', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj'}
| null |
npm
|
GHSA-ggq8-j54v-54x8
|
Directory Traversal in sspa
|
Affected versions of `sspa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16145'}
|
2020-08-31T18:24:05Z
|
2018-07-23T20:47:02Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/463', 'https://github.com/advisories/GHSA-ggq8-j54v-54x8', 'https://nodesecurity.io/advisories/463', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16145', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa'}
| null |
npm
|
GHSA-h73g-8g27-xxcx
|
Command injection in corenlp-js-prefab
|
This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.'
|
{'CVE-2020-28439'}
|
2021-04-08T21:59:12Z
|
2021-04-13T15:22:58Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28439', 'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434'}
| null |
npm
|
GHSA-22gq-x6pg-752j
|
Hijacked Environment Variables in openssl.js
|
The `openssl.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16065'}
|
2021-09-16T20:45:40Z
|
2018-08-29T23:45:41Z
|
CRITICAL
| null |
{'CWE-506', 'CWE-433'}
|
{'https://github.com/DigitalArsenal/openssl.js', 'https://nodesecurity.io/advisories/504', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16065', 'https://www.npmjs.com/advisories/504'}
| null |
npm
|
GHSA-c2gp-86p4-5935
|
Use-After-Free in puppeteer
|
Versions of `puppeteer` prior to 1.13.0 are vulnerable to the Use-After-Free vulnerability in Chromium (CVE-2019-5786). The Chromium FileReader API is vulnerable to Use-After-Free which may lead to Remote Code Execution.
## Recommendation
Upgrade to version 1.13.0 or later.
|
{'CVE-2019-5786'}
|
2021-09-27T16:20:33Z
|
2020-09-02T18:25:43Z
|
MODERATE
| null |
{'CWE-416'}
|
{'https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5786', 'https://crbug.com/936448', 'https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html', 'https://github.com/GoogleChrome/puppeteer', 'https://snyk.io/vuln/SNYK-JS-PUPPETEER-174321', 'https://www.npmjs.com/advisories/824', 'https://github.com/GoogleChrome/puppeteer/issues/4141'}
| null |
npm
|
GHSA-p7c9-jqhq-vr3v
|
Remote Code Execution in markdown-pdf
|
Versions of `markdown-pdf` prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to execute Remote Code.
## Recommendation
Upgrade to version 9.0.0 or later.
|
{'CVE-2018-3770'}
|
2020-08-31T18:43:18Z
|
2018-07-27T17:03:46Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/360727', 'https://www.npmjs.com/advisories/991', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3770', 'https://github.com/advisories/GHSA-p7c9-jqhq-vr3v'}
| null |
npm
|
GHSA-rw4r-h883-8pf9
|
Malicious Package in reequest
|
All versions of `reequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:06:53Z
|
2020-09-02T20:30:02Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/861'}
| null |
npm
|
GHSA-gfjr-3jmm-4g9v
|
Symlink Arbitrary File Overwrite in tar
|
Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory.
## Recommendation
Update to version 2.0.0 or later
|
{'CVE-2015-8860'}
|
2021-09-10T20:53:22Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-59'}
|
{'https://github.com/npm/npm/releases/tag/v2.7.5', 'https://nodesecurity.io/advisories/57', 'https://www.npmjs.com/advisories/57', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860', 'https://github.com/npm/npm', 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-899g-6q6w-7v94
|
Low severity vulnerability that affects m-server
|
Path Traversal vulnerability in module m-server <1.4.1 allows malicious user to access unauthorized content of any file in the directory tree e.g. /etc/passwd by appending slashes to the URL request.
|
{'CVE-2018-16485'}
|
2020-06-16T21:25:05Z
|
2019-02-18T23:58:00Z
|
LOW
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-899g-6q6w-7v94', 'https://hackerone.com/reports/319795', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16485'}
| null |
npm
|
GHSA-rw6j-rhw7-q94c
|
Directory Traversal in sly07
|
Affected versions of `sly07` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16189'}
|
2020-08-31T18:23:18Z
|
2018-07-23T20:40:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16189', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sly07', 'https://www.npmjs.com/advisories/442', 'https://github.com/advisories/GHSA-rw6j-rhw7-q94c', 'https://nodesecurity.io/advisories/442'}
| null |
npm
|
GHSA-q69p-5h74-w36f
|
Content Injection via TileJSON Name in mapbox.js
|
Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js.
## Recommendation
Version 1.x: Update to version 1.6.6 or later.
Version 2.x: Update to version 2.2.4 or later.
|
{'CVE-2017-1000043'}
|
2021-09-16T19:35:51Z
|
2018-11-09T17:48:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-q69p-5h74-w36f', 'https://hackerone.com/reports/99245', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000043', 'https://www.npmjs.com/advisories/74', 'https://nodesecurity.io/advisories/74'}
| null |
npm
|
GHSA-jf5r-8hm2-f872
|
Incorrect hostname / protocol due to unstripped leading control characters.
|
Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.
If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.
This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:
`````
const parse = require('url-parse')
const express = require('express')
const app = express()
const port = 3000
url = parse(\"\\bjavascript:alert(1)\")
console.log(url)
app.get('/', (req, res) => {
if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")}
})
app.listen(port, () => {
console.log(`Example app listening on port ${port}`)
})
`````
|
{'CVE-2022-0691'}
|
2022-03-11T22:47:09Z
|
2022-02-22T00:00:30Z
|
MODERATE
| null |
{'CWE-639'}
|
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://github.com/unshiftio/url-parse', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4'}
| null |
npm
|
GHSA-x45v-pvpg-hcrh
|
Malicious Package in mysql-koa
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:27:05Z
|
2020-09-03T19:54:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1136'}
| null |
npm
|
GHSA-g3fq-3v3g-mh32
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs
|
### Impact
The Nextcloud dialogs library before 3.1.2 did insufficiently escape text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability.
_Note_: Nextcloud Server employs a strict Content Security Policy that mitigates the risk of these XSS vulnerabilities.
### Patches
The vulnerability has been patched in version 3.1.2. If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.
### Workarounds
Make sure no user-supplied input flows into toasts.
|
{'CVE-2021-29438'}
|
2021-04-13T18:40:52Z
|
2021-04-16T19:52:58Z
|
MODERATE
| null |
{'CWE-79', 'CWE-80'}
|
{'https://github.com/nextcloud/nextcloud-dialogs/security/advisories/GHSA-g3fq-3v3g-mh32', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29438', 'https://www.npmjs.com/package/@nextcloud/dialogs'}
| null |
npm
|
GHSA-9x9j-836w-8f55
|
Incorrect Calculation in the MSR JavaScript Cryptography Library
|
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library's Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server's private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka `MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability`.
|
{'CVE-2020-1026'}
|
2021-10-20T22:19:13Z
|
2022-01-06T19:44:01Z
|
HIGH
| null |
{'CWE-682'}
|
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1026', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1026'}
| null |
npm
|
GHSA-56r9-v65c-34jm
|
Malicious Package in radicjs
|
Version 0.2.1 of `radicjs` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:24Z
|
2020-09-03T02:33:37Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/943'}
| null |
npm
|
GHSA-8mmf-qp7j-2w24
|
Malicious Package in colour-string
|
Version 1.5.3 of `colour-string` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:53:41Z
|
2020-09-02T21:35:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/903'}
| null |
npm
|
GHSA-897m-rjf5-jp39
|
Prototype Pollution in copy-props
|
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
|
{'CVE-2020-28503'}
|
2021-03-24T23:59:08Z
|
2022-01-06T20:35:05Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://github.com/gulpjs/copy-props/pull/7', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047'}
| null |
npm
|
GHSA-9qmh-276g-x5pj
|
Prototype Pollution in immer
|
## Overview
Affected versions of immer are vulnerable to Prototype Pollution.
## Proof of exploit
```
const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
// applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]);
console.log("After : " + obj.polluted);
```
## Remediation
Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended.
|
{'CVE-2020-28477'}
|
2021-01-20T21:27:33Z
|
2021-01-20T21:27:56Z
|
HIGH
| null |
{'CWE-471'}
|
{'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://github.com/immerjs/immer/issues/738', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477', 'https://www.npmjs.com/package/immer', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213'}
| null |
npm
|
GHSA-35jh-r3h4-6jhm
|
Command Injection in lodash
|
`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
|
{'CVE-2021-23337'}
|
2022-02-08T21:35:09Z
|
2021-05-06T16:05:51Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932', 'https://github.com/lodash/lodash', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851', 'https://snyk.io/vuln/SNYK-JS-LODASH-1040724', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23337'}
| null |
npm
|
GHSA-hc94-2wfr-4pwf
|
Downloads Resources over HTTP in appium-chromedriver
|
Affected versions of `appium-chromedriver` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read items send over HTTP at will. In this case, that includes the chromedriver binary, which may result in remote code execution if overwritten with a malicious binary.
## Recommendation
Update to version 2.9.4 or later.
|
{'CVE-2016-10557'}
|
2021-01-08T18:42:02Z
|
2019-02-18T23:40:19Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10557', 'https://nodesecurity.io/advisories/162', 'https://www.npmjs.com/advisories/162', 'https://github.com/advisories/GHSA-hc94-2wfr-4pwf'}
| null |
npm
|
GHSA-x48m-gp6r-gp4v
|
Malicious Package in rate-map
|
Version 1.0.3 of `rate-map` contains malicious code. The malware breaks functionality of the `purescript-installer` package by rewriting code of the `dl-tar` dependency.
## Recommendation
Upgrade to version 1.0.5 or later. There is no indication of further compromise.
| null |
2021-09-30T20:04:54Z
|
2020-09-03T18:21:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1083'}
| null |
npm
|
GHSA-wqgq-mfvj-6qxp
|
Malicious Package in koa-body-parse
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:19:47Z
|
2020-09-03T19:49:03Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1131'}
| null |
npm
|
GHSA-vrv8-v4w8-f95h
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic.
### Workarounds
The workarounds available are:
- upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1
or
- enable the media plugin, which overrides the default parsing behaviour for iframes
or
- add the following workaround to update the parsing schema rules for iframes:
#### Example: Change the default schema for iframes
```js
setup: function(editor) {
editor.on('PreInit', function() {
editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi;
});
}
```
### Acknowledgements
Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2020-08-11T16:24:30Z
|
2020-08-11T14:55:01Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'}
| null |
npm
|
GHSA-5p26-hw7f-3cpr
|
Cross-Site Scripting in html-pages
|
All versions of `html-pages` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize folder names, allowing attackers to execute arbitrary JavaScript in the victim's browser through folders with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2018-16481'}
|
2020-08-31T18:43:39Z
|
2019-02-07T18:14:44Z
|
HIGH
| null |
{'CWE-79', 'CWE-64'}
|
{'https://www.npmjs.com/advisories/1001', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16481', 'https://hackerone.com/reports/330356'}
| null |
npm
|
GHSA-h4mc-r4f4-hcf4
|
Downloads Resources over HTTP in selenium-binaries
|
Affected versions of `selenium-binaries` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`.
## Recommendation
No fix is currently available for this vulnerability.
The best mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js.
|
{'CVE-2016-10589'}
|
2021-01-08T18:44:01Z
|
2019-02-18T23:34:37Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-h4mc-r4f4-hcf4', 'https://nodesecurity.io/advisories/175', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10589', 'https://www.npmjs.com/advisories/175'}
| null |
npm
|
GHSA-9vxc-g2jx-qj3p
|
API Admin Auth Weakness in tomato
|
Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests.
## Details
The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access.
Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key.
## Proof of Concept
This is the snippet of code that does the comparison to authorize requests.
```
if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) {
```
For an access_key that is set to anything that includes the letter 'a' the following request would be authorized.
```
$ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a"
{
"cmd": "ls",
"path": ".",
"stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n",
"stderr": ""
}
```
## Recommendation
Update to version 0.0.6 or later.
|
{'CVE-2013-7379'}
|
2021-09-23T21:00:28Z
|
2020-08-31T22:59:07Z
|
CRITICAL
| null |
{'CWE-287'}
|
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'https://github.com/leizongmin/tomato', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://www.npmjs.com/advisories/38'}
| null |
npm
|
GHSA-gmjp-776j-2394
|
Malicious Package in ripmed160
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:04:56Z
|
2020-09-03T17:04:24Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1405'}
| null |
npm
|
GHSA-3f95-r44v-8mrg
|
Command injection in simple-git
|
The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
|
{'CVE-2022-24433'}
|
2022-03-17T21:46:01Z
|
2022-03-12T00:00:33Z
|
HIGH
| null |
{'CWE-74', 'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199', 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0', 'https://github.com/steveukx/git-js/pull/767', 'https://github.com/steveukx/git-js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245'}
| null |
npm
|
GHSA-9fp7-4fjm-q3mf
|
Prototype Pollution in keyget
|
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048)
|
{'CVE-2021-23760'}
|
2022-01-31T19:46:10Z
|
2022-02-01T00:51:01Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048', 'https://snyk.io/vuln/SNYK-JS-KEYGET-2342624', 'https://github.com/rumkin/keyget', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23760'}
| null |
npm
|
GHSA-qmw8-3v4g-gwj4
|
Prefix escape
|
### Impact
By crafting a specific URL, it is possible to escape the prefix of the proxied backend service.
If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is.
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N)
### Patches
A patch have been submitted by Corey Farrell git@cfware.com, the reporter.
All releases after v4.0.2 include the fix.
### Workarounds
There are no workaround available.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
|
{'CVE-2021-21321'}
|
2021-03-02T03:32:13Z
|
2021-03-03T01:52:05Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4'}
| null |
npm
|
GHSA-h9mj-fghc-664w
|
Denial of Service in mqtt
|
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
## Proof of Concept
The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead.
```
var mqttp = require('mqtt-packet');
var packets = [];
for(var i=0; i<=1000;i++){
packets.push(
mqttp.generate({
cmd:'publish',
topic:Buffer.from('hello'),
payload:Buffer.from('world'),
retain: false,
dup: false,
messageId: ++i,
qos: 1
})
)
}
```
## Recommendation
Update to version 2.15.0 or later.
|
{'CVE-2017-10910'}
|
2021-09-14T17:16:40Z
|
2017-12-28T22:51:58Z
|
MODERATE
| null |
{'CWE-674'}
|
{'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://jvn.jp/en/jp/JVN45494523/index.html', 'https://github.com/mqttjs/MQTT.js', 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json', 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0'}
| null |
npm
|
GHSA-5w9c-rv96-fr7g
|
Removal of functional code in faker.js
|
Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/GHSA-gh88-3pxp-6fm8).
The functional code for this package was forked and can be found [here](https://github.com/faker-js/faker).
| null |
2022-03-22T20:33:40Z
|
2022-03-22T19:28:24Z
|
HIGH
| null | null |
{'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/Faker.js', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://www.npmjs.com/package/faker', 'https://www.npmjs.com/package/@faker-js/faker', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8'}
| null |
npm
|
GHSA-mmj4-777p-fpq9
|
Validation bypass in frourio-express
|
## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。
### さらなる情報
このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。
* [frourio](https://github.com/frouriojs/frourio)にIssueを開く。
## English
### Impact
Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives)
### Patches
Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project.
### Workarounds
Validate objects from request with class-transformer in controllers by yourself, or prevent using validators.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [frourio](https://github.com/frouriojs/frourio)
|
{'CVE-2022-23624'}
|
2022-02-14T22:32:36Z
|
2022-02-07T22:38:37Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/frouriojs/frourio-express', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
| null |
npm
|
GHSA-mf6x-7mm4-x2g7
|
Out-of-bounds Read in stringstream
|
All versions of `stringstream` are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is being passed in to `stringstream`.
|
{'CVE-2018-21270'}
|
2021-03-19T20:59:51Z
|
2019-06-20T18:22:32Z
|
MODERATE
| null |
{'CWE-125'}
|
{'https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32', 'https://www.npmjs.com/advisories/664', 'https://hackerone.com/reports/321670'}
| null |
npm
|
GHSA-4vmm-mhcq-4x9j
|
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
|
Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution.
## Recommendation
Update to version 3.1.1 or later.
| null |
2021-08-16T16:06:38Z
|
2019-06-14T16:15:14Z
|
CRITICAL
| null | null |
{'https://snyk.io/vuln/npm:constantinople:20180421', 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703', 'https://www.npmjs.com/advisories/568', 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://nodesecurity.io/advisories/568'}
| null |
npm
|
GHSA-v66p-w7qx-wv98
|
Authentication Bypass in express-laravel-passport
|
All versions of `express-laravel-passport` are vulnerable to an Authentication Bypass. The package fails to properly validate JWTs, allowing attackers to send HTTP requests impersonating other users.
## Recommendation
Upgrade to version 2.0.5 or later.
| null |
2020-08-31T18:59:44Z
|
2020-09-04T17:29:34Z
|
CRITICAL
| null |
{'CWE-287'}
|
{'https://www.npmjs.com/advisories/1450', 'https://hackerone.com/reports/748214'}
| null |
npm
|
GHSA-gpfj-4j6g-c4w9
|
Clipboard-based DOM-XSS
|
### Impact
A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected.
The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**.
```typescript
function generateText(transfer: DataTransfer): string | undefined {
if (Array.from(transfer.types).indexOf('text/html') === -1) return
let html = transfer.getData('text/html')
if (!/<table/i.test(html)) return
html = html.replace(/<meta.*?>/, '')
const el = document.createElement('div')
el.innerHTML = html
const tables = el.querySelectorAll('table')
for (const table of tables) {
if (table.closest('[data-paste-markdown-skip]')) {
table.replaceWith(new Text(table.textContent || ''))
}
const formattedTable = tableMarkdown(table)
table.replaceWith(new Text(formattedTable))
}
return el.innerHTML
}
```
### Patches
A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4).
### Workarounds
A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers.
<!--
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
*
-->
|
{'CVE-2021-37700'}
|
2021-08-30T23:16:08Z
|
2021-08-12T20:42:17Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/github/paste-markdown', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4', 'https://www.npmjs.com/package/@github/paste-markdown', 'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37700'}
| null |
npm
|
GHSA-38h8-x697-gh8q
|
Tmp files readable by other users in sync-exec
|
Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.
## Recommendation
There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively.
The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.
|
{'CVE-2017-16024'}
|
2021-01-08T20:02:11Z
|
2018-11-09T17:45:30Z
|
MODERATE
| null |
{'CWE-377'}
|
{'https://github.com/advisories/GHSA-38h8-x697-gh8q', 'https://www.owasp.org/index.php/Insecure_Temporary_File', 'https://cwe.mitre.org/data/definitions/377.html', 'https://github.com/gvarsanyi/sync-exec/issues/17', 'https://nodesecurity.io/advisories/310', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024', 'https://www.npmjs.com/advisories/310'}
| null |
npm
|
GHSA-6qc7-jgq7-34rf
|
Malicious Package in exprss
|
All versions of `exprss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:02:31Z
|
2020-09-02T20:18:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/851'}
| null |
npm
|
GHSA-pxcf-v868-m492
|
Injection and Cross-site Scripting in osm-static-maps
|
This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.
|
{'CVE-2020-7749'}
|
2021-08-02T15:31:49Z
|
2021-05-10T18:43:45Z
|
HIGH
| null |
{'CWE-74', 'CWE-79'}
|
{'https://github.com/jperelli/osm-static-maps/pull/24', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749', 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142'}
| null |
npm
|
GHSA-9prh-257w-9277
|
Cross-Site Scripting in handlebars
|
Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted.
## Proof of Concept
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 4.0.0 or later.
Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes.
|
{'CVE-2015-8861'}
|
2021-09-08T20:16:46Z
|
2018-10-23T17:20:12Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/', 'http://www.securityfocus.com/bid/96434', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861', 'https://www.npmjs.com/advisories/61', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/advisories/GHSA-9prh-257w-9277', 'https://github.com/wycats/handlebars.js/pull/1083', 'https://blog.srcclr.com/handlebars_vulnerability_research_findings/', 'https://github.com/wycats/handlebars.js', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-jgpq-g82g-6c39
|
confinit vulnerable to prototype pollution
|
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
|
{'CVE-2020-7638'}
|
2021-07-28T23:16:44Z
|
2020-04-07T15:52:05Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
| null |
npm
|
GHSA-fj58-h2fr-3pp2
|
SQL Injection and Cross-site Scripting in class-validator
|
In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
|
{'CVE-2019-18413'}
|
2021-10-15T15:15:24Z
|
2021-10-12T16:35:45Z
|
MODERATE
| null |
{'CWE-79', 'CWE-89'}
|
{'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471', 'https://github.com/typestack/class-validator/issues/438', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413', 'https://github.com/typestack/class-validator#passing-options', 'https://github.com/typestack/class-validator'}
| null |
npm
|
GHSA-4jg2-84c2-pj95
|
Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina
|
### Impact
Anyone who is using the default presets and/or does not handle the functionality themself.
### Patches
It has not been patched yet.
### Workarounds
Fully custom presets that change the entire rendering process which can then escape the user input.
### For more information
Even though that I changed all the presets here, the vulnerability is still present throughout. I am using a JSON Schema here for simplicity.
```ts
const jsonSchemaDoc = {
$id: 'CustomClass',
type: 'object',
properties: {
'property: any; \n constructor(){console.log("injected")} \n private _temp': { type: 'string' },
}
};
generator = new TypeScriptGenerator(
{
presets: [
{
class: {
property({ propertyName, content }) {
return `private ${propertyName}: any;`;
},
ctor() {
return '';
},
getter() {
return '';
},
setter() {
return '';
}
}
}
]
}
);
const inputModel = await generator.process(jsonSchemaDoc);
```
This would render
```ts
export class CustomClass {
private property: any;
constructor(){console.log("injected")}
private _temp: any;
private additionalProperties: any;
}
```
| null |
2021-09-21T16:14:04Z
|
2021-09-21T18:41:59Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/asyncapi/modelina', 'https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95'}
| null |
npm
|
GHSA-8w74-g84v-c5w8
|
Directory Traversal in chatbyvista
|
Affected versions of `chatbyvista` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16177'}
|
2020-08-31T18:24:03Z
|
2020-09-01T18:52:26Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/462', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16177', 'https://www.npmjs.com/advisories/462'}
| null |
npm
|
GHSA-gvcj-pfq2-wxj7
|
High severity vulnerability that affects electron
|
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
|
{'CVE-2016-1202'}
|
2021-09-13T12:46:47Z
|
2017-10-24T18:33:35Z
|
HIGH
| null |
{'CWE-426'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1202', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7', 'https://github.com/electron/electron', 'http://jvn.jp/en/jp/JVN00324715/index.html', 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'https://github.com/electron/electron/pull/2976'}
| null |
npm
|
GHSA-w3pp-wp5v-fjvp
|
Malicious Package in mogodb
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:20:19Z
|
2020-09-03T19:51:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1133'}
| null |
npm
|
GHSA-qvjc-g5vr-mfgr
|
Regular Expression Denial of Service in papaparse
|
Versions of `papaparse` prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The `parse` function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service.
## Recommendation
Upgrade to version 5.2.0 or later.
| null |
2021-10-04T21:11:37Z
|
2020-09-04T18:03:04Z
|
HIGH
| null |
{'CWE-185'}
|
{'https://github.com/mholt/PapaParse/issues/777', 'https://github.com/mholt/PapaParse', 'https://www.npmjs.com/advisories/1515', 'https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258'}
| null |
npm
|
GHSA-fpf2-pr3j-4cm3
|
Malicious Package in ecruve
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:01:31Z
|
2020-09-03T17:06:06Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1395'}
| null |
npm
|
GHSA-7w54-gp8x-f33m
|
Potential exposure of tokens to an Unauthorized Actor
|
### Impact
When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account).
### Patches
This was patched in 7.3.1, by updating the address of the fallback WebSocket polling proxy to the new one.
### Workarounds
Specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`:
```typescript
const connectOptions: ConnectArgs = {
// ...
pollingHost: 'gp-v2.replit.com',
};
client.connect(connectOptions);
```
### For more information
Thanks to https://hackerone.com/orlserg for disclosing this.
If you have any questions or comments about this advisory:
* Open an issue in [replit/crosis](https://github.com/replit/crosis)
* Email us at [security@replit.com](mailto:security@replit.com)
|
{'CVE-2022-21671'}
|
2022-01-10T23:18:10Z
|
2022-01-12T22:44:47Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://github.com/replit/crosis', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671'}
| null |
npm
|
GHSA-4hjg-w3ww-38c6
|
Malicious Package in tiar
|
All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:01:59Z
|
2020-09-03T18:03:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1064'}
| null |
npm
|
GHSA-qw3g-35hc-fcrh
|
Cross-Site Scripting (XSS) in restify
|
Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL.
## Proof of Concept:
Request
```
https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E
```
Will be included in response:
```<script>alert(73541);</script>```
## Recommendation
Update to version 4.1.0 or later.
|
{'CVE-2017-16018'}
|
2020-08-31T18:18:56Z
|
2018-11-09T17:45:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16018', 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh', 'https://github.com/restify/node-restify/issues/1018', 'https://www.npmjs.com/advisories/314', 'https://nodesecurity.io/advisories/314'}
| null |
npm
|
GHSA-6hwh-rqwf-cxxr
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util
|
vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype.
|
{'CVE-2019-10806'}
|
2021-07-28T18:36:56Z
|
2021-05-07T16:32:02Z
|
MODERATE
| null |
{'CWE-915', 'CWE-20'}
|
{'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10806'}
| null |
npm
|
GHSA-9m6j-fcg5-2442
|
Path traversal in url-parse
|
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
|
{'CVE-2021-27515'}
|
2021-05-06T16:31:23Z
|
2021-05-06T16:10:51Z
|
HIGH
| null |
{'CWE-23'}
|
{'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/unshiftio/url-parse/pull/197', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://advisory.checkmarx.net/advisory/CX-2021-4306'}
| null |
npm
|
GHSA-74f5-4m28-gq5c
|
Directory Traversal in peiserver
|
Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16214'}
|
2020-08-31T18:22:27Z
|
2020-09-01T18:09:59Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/420', 'https://nodesecurity.io/advisories/420', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214'}
| null |
npm
|
GHSA-rr77-w4w8-w8wp
|
Directory Traversal in tencent-server
|
Affected versions of `tencent-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16216'}
|
2020-08-31T18:22:22Z
|
2020-09-01T17:37:46Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16216', 'https://www.npmjs.com/advisories/418', 'https://nodesecurity.io/advisories/418', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server'}
| null |
npm
|
GHSA-hwch-749c-rv63
|
Potential Command Injection in hubot-scripts
|
Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module.
### Mitigating Factors
The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts.
## Recommendation
Update hubot-scripts to version 2.4.4 or later.
|
{'CVE-2013-7378'}
|
2021-04-12T21:34:54Z
|
2020-08-31T22:46:38Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'https://web.archive.org/web/20140731222413/https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://www.npmjs.com/advisories/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7378'}
| null |
npm
|
GHSA-8vv3-jxm8-f4vf
|
Prototype Pollution in connie-lang
|
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.
|
{'CVE-2020-7706'}
|
2021-05-05T21:19:56Z
|
2021-05-06T17:29:25Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7706', 'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853'}
| null |
npm
|
GHSA-5w65-6875-rhq8
|
Undefined Behavior in sailsjs-cacheman
|
All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:34:32Z
|
2019-09-11T23:01:57Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/752', 'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
| null |
npm
|
GHSA-h68q-55jf-x68w
|
Prototype pollution in chart.js
|
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
|
{'CVE-2020-7746'}
|
2021-04-20T17:46:27Z
|
2021-05-10T18:47:53Z
|
HIGH
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7746', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375', 'https://github.com/chartjs/Chart.js/pull/7920', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376', 'https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716'}
| null |
npm
|
GHSA-34gh-3cwv-wvp2
|
Directory traversal in rollup-plugin-server
|
This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function.
|
{'CVE-2020-7683'}
|
2021-09-23T17:29:15Z
|
2020-07-29T18:07:11Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'}
| null |
npm
|
GHSA-xfmw-2vmm-579c
|
Hijacked Environment Variables in nodesass
|
The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16080'}
|
2020-08-31T18:26:13Z
|
2020-09-01T18:59:50Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/519', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080', 'https://nodesecurity.io/advisories/519'}
| null |
npm
|
GHSA-p62r-jf56-h429
|
Malicious Package in evil-package
|
All versions of `evil-package` contain malicious code. The package uploads the contents of `process.env` to `example.com/log`.
## Recommendation
Remove the package from your environment. Given the host where the information was uploaded to there is no further indication of compromise.
| null |
2020-08-31T18:49:31Z
|
2020-09-03T20:29:58Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1162'}
| null |
npm
|
GHSA-fm4j-4xhm-xpwx
|
Sandbox Breakout / Arbitrary Code Execution in sandbox
|
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors.
## Proof of concept
```
var Sandbox = require("sandbox")
s = new Sandbox()
code = `new Function("return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())")()("util").inspect("hi")`
s.run(code)
```
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:34:58Z
|
2020-09-02T15:51:34Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/766', 'https://github.com/gf3/sandbox/issues/50'}
| null |
npm
|
GHSA-98pq-pmw9-4gpm
|
SQL Injection in sequelize
|
Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`.
## Recommendation
Update to version 3.17.0 or later.
|
{'CVE-2016-10550'}
|
2020-08-31T18:11:11Z
|
2019-02-18T23:54:34Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://nodesecurity.io/advisories/112'}
| null |
npm
|
GHSA-w8h4-vw8f-rvvj
|
Improper Control of Dynamically-Managed Code Resources in config-shield
|
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.
|
{'CVE-2021-26276'}
|
2022-04-27T20:27:30Z
|
2021-04-13T15:30:09Z
|
MODERATE
| null |
{'CWE-913'}
|
{'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276', 'https://github.com/godaddy/node-config-shield', 'https://advisory.checkmarx.net/advisory/CX-2021-4773'}
| null |
npm
|
GHSA-w5p7-h5w8-2hfq
|
Regular Expression Denial of Service in trim
|
All versions of package trim lower than 0.0.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
|
{'CVE-2020-7753'}
|
2022-04-27T19:19:28Z
|
2021-05-10T18:44:22Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/component/trim/blob/master/index.js', 'https://snyk.io/vuln/SNYK-JS-TRIM-1017038', 'https://lists.apache.org/thread.html/r75b8d0b88833d7d96afcdce3ead65e212572ead4e7a9f34d21040196@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r10faad1ef9166d37a1a5c9142b1af7099b8ecdc5ad05c51b8ea993d9@%3Ccommits.airflow.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132', 'https://github.com/component/trim/', 'https://github.com/component/trim/blob/master/index.js%23L6', 'https://github.com/component/trim/pull/8', 'https://lists.apache.org/thread.html/rcc7c2865a52b544a8e49386c6880e9b9ab29bfce1052b5569d09ee4a@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/rb8462df3b6484e778905c09cd49a8912e1a302659860017ebe36da03@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7753', 'https://lists.apache.org/thread.html/r51ff3c2a4c7b8402f321eae7e624672cc2295c7bc8c12c8b871f6b0b@%3Ccommits.airflow.apache.org%3E'}
| null |
npm
|
GHSA-2w8g-m5j8-7m87
|
Zalgo-like output that crashes the server
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
[`colors`](https://npmjs.com/package/colors) package caused zalgo-like output (see https://github.com/soketi/soketi/issues/276, https://github.com/Marak/colors.js/issues/289), breaking the servers.
**Only NPM users that recently upgraded or installed the NPM package are affected.**
Docker users seem to not be affected as the dependencies were bundled at the time of the build, which were tested.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Latest patch. `0.26.1` to be exact at the time of writing.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
You cannot get around this as it's related to dependencies.
### References
_Are there any links users can visit to find out more?_
- https://github.com/Marak/colors.js/issues/289
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issues board](https://github.com/soketi/soketi/issues)
* Email us at [alex@renoki.org](mailto:alex@renoki.org)
| null |
2022-01-10T21:37:04Z
|
2022-01-12T21:45:59Z
|
CRITICAL
| null | null |
{'https://github.com/soketi/soketi/security/advisories/GHSA-2w8g-m5j8-7m87'}
| null |
npm
|
GHSA-2mm9-c2fx-c7m4
|
XSS in docsify
|
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
|
{'CVE-2021-23342'}
|
2021-03-15T23:55:40Z
|
2021-03-01T19:44:27Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017', 'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://www.npmjs.com/package/docsify', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'http://seclists.org/fulldisclosure/2021/Feb/71'}
| null |
npm
|
GHSA-59m2-j944-839w
|
Downloads Resources over HTTP in clang-extra
|
Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`.
## Recommendation
No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future.
The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10655'}
|
2021-01-08T19:50:58Z
|
2019-02-18T23:45:13Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-59m2-j944-839w', 'https://www.npmjs.com/advisories/265', 'https://nodesecurity.io/advisories/265', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.