ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-qvp5-mm7v-4f36
Cross-site Scripting in Strapi
Strapi before 3.2.5 has stored XSS in the wysiwyg editor's preview feature.
{'CVE-2020-27666'}
2020-10-29T19:38:18Z
2020-10-29T19:40:08Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27666', 'https://github.com/strapi/strapi/pull/8440', 'https://github.com/strapi/strapi/releases/tag/v3.2.5'}
null
npm
GHSA-qc22-qwm9-j8rx
Remote Code Execution in npm-groovy-lint
Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.
null
2021-12-20T16:57:06Z
2021-12-20T16:59:31Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/nvuillam/npm-groovy-lint', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/nvuillam/npm-groovy-lint/issues/194', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}
null
npm
GHSA-p6jh-p7q8-pcrg
Prototype Pollution in nodee-utils
All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.
{'CVE-2020-7722'}
2021-05-05T17:59:12Z
2021-05-06T18:26:21Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'}
null
npm
GHSA-566m-qj78-rww5
Regular Expression Denial of Service in postcss
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
{'CVE-2021-23382'}
2022-02-23T20:31:15Z
2022-01-07T00:21:36Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382', 'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641', 'https://github.com/postcss/postcss/releases/tag/7.0.36'}
null
npm
GHSA-cqqh-49mx-fq63
Prototype Pollution in merge
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3645'}
2021-09-13T19:14:06Z
2021-09-13T20:16:54Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://github.com/viking04/merge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'}
null
npm
GHSA-265q-28rp-chq5
Insecure Entropy Source - Math.random() in node-uuid
Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's. ## Recommendation Update to version 1.4.4 or later.
{'CVE-2015-8851'}
2021-08-23T15:25:55Z
2020-04-16T03:14:50Z
HIGH
null
{'CWE-331'}
{'https://github.com/broofa/node-uuid/issues/108', 'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://nodesecurity.io/advisories/93', 'https://www.npmjs.com/advisories/93', 'https://github.com/broofa/node-uuid/issues/122', 'http://www.openwall.com/lists/oss-security/2016/04/13/8', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851'}
null
npm
GHSA-m6rw-m2v9-7hx4
OS Command Injection in wifiscanner
wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.
{'CVE-2020-15362'}
2021-07-29T19:48:29Z
2021-05-17T21:00:59Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15362', 'https://github.com/thingsSDK/wifiscanner/issues/1'}
null
npm
GHSA-3xph-cp8f-2229
Prototype Pollution in @fabiocaccamo/utils.js
utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
{'CVE-2021-3815'}
2021-12-13T13:10:41Z
2021-12-10T20:31:32Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3815', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://github.com/fabiocaccamo/utils.js', 'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0'}
null
npm
GHSA-cff4-rrq6-h78w
Command Injection in command-exists
Versions of `command-exists` before 1.2.4 are vulnerable to command injection. This is exploitable if user input is provided to this module. ## Recommendation Update to version 1.2.4 or later.
null
2020-08-31T18:31:41Z
2019-06-03T17:31:26Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/659', 'https://github.com/mathisonian/command-exists/blob/v1.2.2/lib/command-exists.js#L49-L94', 'https://hackerone.com/reports/324453'}
null
npm
GHSA-9gqr-xp86-f87h
Code injection in npm git
All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released.
{'CVE-2021-23632'}
2022-03-25T16:13:13Z
2022-03-18T00:01:11Z
MODERATE
null
{'CWE-94', 'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-GIT-1568518', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23632'}
null
npm
GHSA-xrjf-phvv-r4vr
Command injection in strapi
When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user input.
{'CVE-2022-0764'}
2022-03-09T20:26:21Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-77', 'CWE-78'}
{'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://github.com/strapi/strapi', 'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764'}
null
npm
GHSA-pf8j-vhg8-xmc3
Injection in karma-mojo
karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument.
{'CVE-2020-7626'}
2021-07-28T22:02:01Z
2022-02-10T23:42:58Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/amireh/karma-mojo/blob/master/index.js#L100,', 'https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7626'}
null
npm
GHSA-wg85-p6j7-gp3w
Moderate severity vulnerability that affects simplemde
SimpleMDE 1.11.2 has XSS via an onerror attribute of a crafted IMG element, or via certain input with [ and ( characters, which is mishandled during construction of an A element.
{'CVE-2018-19057'}
2021-09-21T19:44:45Z
2018-11-21T22:21:25Z
MODERATE
null
{'CWE-79'}
{'https://github.com/sparksuite/simplemde-markdown-editor', 'https://github.com/sparksuite/simplemde-markdown-editor/issues/721', 'https://github.com/advisories/GHSA-wg85-p6j7-gp3w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19057'}
null
npm
GHSA-wx3q-6x7x-jjw4
Downloads Resources over HTTP in mystem
Affected versions of `mystem` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10664'}
2021-01-08T00:47:48Z
2019-02-18T23:44:39Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10664', 'https://nodesecurity.io/advisories/259', 'https://www.npmjs.com/advisories/259', 'https://github.com/advisories/GHSA-wx3q-6x7x-jjw4'}
null
npm
GHSA-vcjf-mgcg-jxjq
Cross-site Scripting in CKEditor 4.0
A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).
{'CVE-2020-9281'}
2022-02-08T22:06:54Z
2021-05-07T16:32:17Z
MODERATE
null
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9281', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OJ4BSS3VEAEXPNSOOUAXX6RDNECGZNO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4HHYQ6N452XTCIROFMJOTYEUWSB6FR4/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-wvh7-5p38-2qfc
Storing Password in Local Storage
The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users > Signing Up, it clearly states, "We never store passwords in plaintext, nor will we ever transmit passwords back to the client in plaintext." Example Code: ```js async () => { const user = Parse.User.current() if (user) { user.setPassword('newpass') await user.save() } } ``` After running the above code, the new password will be stored in localStorage as a property named "password". Proposed Solution: Before saving anything to localStorage, Parse should strip out any properties named "password" that are attempting to be stored with a Parse.User type object. Configuration: Parse SDK: 2.9.1 Parse Server: 3.9.0
null
2021-09-22T21:05:43Z
2020-07-23T18:20:10Z
MODERATE
null
{'CWE-256'}
{'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb', 'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS'}
null
npm
GHSA-762f-c2wg-m8c8
Denial of Service in protobufjs
Versions of `protobufjs` before 5.0.3 and 6.8.6 are vulnerable to denial of service when parsing crafted invalid *.proto files. ## Recommendation Update to version 5.0.3, 6.8.6 or later.
{'CVE-2018-3738'}
2020-08-31T18:29:36Z
2018-10-09T00:27:15Z
MODERATE
null
{'CWE-770'}
{'https://github.com/dcodeIO/protobuf.js/blob/6.8.5/src/parse.js#L27', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3738', 'https://www.npmjs.com/advisories/605', 'https://hackerone.com/reports/319576', 'https://github.com/advisories/GHSA-762f-c2wg-m8c8'}
null
npm
GHSA-85q4-v37c-wfpc
Malicious Package in bitcion-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:39:09Z
2020-09-04T15:39:28Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1359'}
null
npm
GHSA-cqr2-xhg6-p268
OS Command Injection in node-mpv
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
{'CVE-2020-7632'}
2021-07-28T22:40:26Z
2022-01-07T00:20:27Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/j-holub/Node-MPV/blob/master/lib/util.js#L34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7632', 'https://snyk.io/vuln/SNYK-JS-NODEMPV-564426'}
null
npm
GHSA-v464-rcx7-j875
Directory Traversal in infraserver
Affected versions of `infraserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16142'}
2020-08-31T18:24:23Z
2018-07-23T20:48:29Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/471', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/infraserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16142', 'https://github.com/advisories/GHSA-v464-rcx7-j875', 'https://nodesecurity.io/advisories/471'}
null
npm
GHSA-4rx9-58m7-gr8w
Malicious Package in css_transform_step
Version 1.0.6 of `css_transform_step` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.6 of this module is found installed you will want to replace it with a version before or after 1.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:17Z
2020-09-01T19:53:40Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/623'}
null
npm
GHSA-6m8p-4fxj-pgc2
OS Command Injection in mversion
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
{'CVE-2020-7688'}
2021-05-11T19:56:27Z
2021-05-17T21:01:08Z
MODERATE
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-MVERSION-573174', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688', 'https://github.com/418sec/huntr/pull/102', 'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}
null
npm
GHSA-435c-qcpm-wjw5
Malicious Package in fs-extar
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:02:01Z
2020-09-03T17:05:43Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1397'}
null
npm
GHSA-hxwc-5vw9-2w4w
NoSQL Injection in loopback-connector-mongodb
Versions of `loopback-connector-mongodb` prior to 3.6.0 are vulnerable to NoSQL Injection. Filters passed to the database query are not properly sanitized which leads to execution of code on the database driver and data leak. ## Recommendation Upgrade to version 3.6.0 or later.
null
2021-09-27T15:13:26Z
2020-09-02T15:52:39Z
HIGH
null
{'CWE-89'}
{'https://www.npmjs.com/advisories/767', 'https://github.com/loopbackio/loopback-connector-mongodb', 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html'}
null
npm
GHSA-45j8-pm75-5v8x
Path Traversal in simplehttpserver
Versions of `simplehttpserver` prior to 0.2.1 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to version 0.2.1 or later.
{'CVE-2018-16493'}
2020-08-31T18:42:22Z
2019-02-07T18:18:04Z
HIGH
null
{'CWE-548'}
{'https://www.npmjs.com/advisories/968', 'https://hackerone.com/reports/432600', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16493', 'https://hackerone.com/reports/357109', 'https://github.com/advisories/GHSA-45j8-pm75-5v8x', 'https://www.npmjs.com/advisories/967'}
null
npm
GHSA-68hw-vfh7-xvg8
Forced Logout in keycloak-connect
Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely. ## Recommendation Upgrade to version 4.4.0 or later.
{'CVE-2019-10157'}
2021-08-16T15:25:07Z
2019-06-13T20:38:09Z
MODERATE
null
{'CWE-287', 'CWE-345'}
{'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6', 'http://www.securityfocus.com/bid/108734', 'https://www.npmjs.com/advisories/978', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157'}
null
npm
GHSA-4v4g-726h-xvfv
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. Users should upgrade to `^3.11.4`. ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29445'}
2021-04-16T23:00:41Z
2021-04-19T14:59:06Z
MODERATE
null
{'CWE-696', 'CWE-203', 'CWE-208'}
{'https://www.npmjs.com/package/jose-node-esm-runtime', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445', 'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv'}
null
npm
GHSA-4j54-mxf6-wxx2
OS Command Injection in pomelo-monitor
pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params.
{'CVE-2020-7620'}
2021-07-28T21:52:51Z
2021-05-10T18:37:16Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/halfblood369/monitor/blob/900b5cadf59edcccac4754e5706a22719925ddb9/lib/processMonitor.js,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7620', 'https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695'}
null
npm
GHSA-p6rw-44q7-3fw4
Stored XSS in Jupyter nbdime
### Impact Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected. ### Patches Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package. #### Python - nbdime 1.x: Patched in v. 1.1.1 - nbdime 2.x: Patched in v. 2.1.1 - nbdime 3.x: Patched in v. 3.1.1 #### npm - nbdime 6.x version: Patched in 6.1.2 - nbdime 5.x version: Patched in 5.0.2 - nbdime-jupyterlab 1.x version: Patched in 1.0.1 - nbdime-jupyterlab 2.x version: Patched in 2.1.1 ### For more information If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
{'CVE-2021-41134'}
2022-03-03T05:14:20.151154Z
2021-11-08T18:09:27Z
HIGH
null
{'CWE-79'}
{'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134', 'https://github.com/jupyter/nbdime', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
null
npm
GHSA-5rwj-j5m3-3chj
Missing Release of Memory after Effective Lifetime in detect-character-encoding
### Impact In detect-character-encoding v0.3.0 and earlier, allocated memory is not released. ### Patches The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const detectCharacterEncoding = require("detect-character-encoding"); const app = express(); app.get("/", (req, res) => { detectCharacterEncoding(Buffer.from("foo")); res.end(); }); app.listen(3000); ``` `hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory. ### References - https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588 - https://github.com/sonicdoe/detect-character-encoding/pull/6
{'CVE-2021-39176'}
2021-10-21T14:28:07Z
2021-09-01T18:25:16Z
HIGH
null
{'CWE-401'}
{'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/sonicdoe/detect-character-encoding', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj'}
null
npm
GHSA-ggq8-j54v-54x8
Directory Traversal in sspa
Affected versions of `sspa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16145'}
2020-08-31T18:24:05Z
2018-07-23T20:47:02Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/463', 'https://github.com/advisories/GHSA-ggq8-j54v-54x8', 'https://nodesecurity.io/advisories/463', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16145', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa'}
null
npm
GHSA-h73g-8g27-xxcx
Command injection in corenlp-js-prefab
This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.'
{'CVE-2020-28439'}
2021-04-08T21:59:12Z
2021-04-13T15:22:58Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28439', 'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434'}
null
npm
GHSA-22gq-x6pg-752j
Hijacked Environment Variables in openssl.js
The `openssl.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16065'}
2021-09-16T20:45:40Z
2018-08-29T23:45:41Z
CRITICAL
null
{'CWE-506', 'CWE-433'}
{'https://github.com/DigitalArsenal/openssl.js', 'https://nodesecurity.io/advisories/504', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16065', 'https://www.npmjs.com/advisories/504'}
null
npm
GHSA-c2gp-86p4-5935
Use-After-Free in puppeteer
Versions of `puppeteer` prior to 1.13.0 are vulnerable to the Use-After-Free vulnerability in Chromium (CVE-2019-5786). The Chromium FileReader API is vulnerable to Use-After-Free which may lead to Remote Code Execution. ## Recommendation Upgrade to version 1.13.0 or later.
{'CVE-2019-5786'}
2021-09-27T16:20:33Z
2020-09-02T18:25:43Z
MODERATE
null
{'CWE-416'}
{'https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5786', 'https://crbug.com/936448', 'https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html', 'https://github.com/GoogleChrome/puppeteer', 'https://snyk.io/vuln/SNYK-JS-PUPPETEER-174321', 'https://www.npmjs.com/advisories/824', 'https://github.com/GoogleChrome/puppeteer/issues/4141'}
null
npm
GHSA-p7c9-jqhq-vr3v
Remote Code Execution in markdown-pdf
Versions of `markdown-pdf` prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to execute Remote Code. ## Recommendation Upgrade to version 9.0.0 or later.
{'CVE-2018-3770'}
2020-08-31T18:43:18Z
2018-07-27T17:03:46Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/360727', 'https://www.npmjs.com/advisories/991', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3770', 'https://github.com/advisories/GHSA-p7c9-jqhq-vr3v'}
null
npm
GHSA-rw4r-h883-8pf9
Malicious Package in reequest
All versions of `reequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:06:53Z
2020-09-02T20:30:02Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/861'}
null
npm
GHSA-gfjr-3jmm-4g9v
Symlink Arbitrary File Overwrite in tar
Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory. ## Recommendation Update to version 2.0.0 or later
{'CVE-2015-8860'}
2021-09-10T20:53:22Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-59'}
{'https://github.com/npm/npm/releases/tag/v2.7.5', 'https://nodesecurity.io/advisories/57', 'https://www.npmjs.com/advisories/57', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860', 'https://github.com/npm/npm', 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-899g-6q6w-7v94
Low severity vulnerability that affects m-server
Path Traversal vulnerability in module m-server <1.4.1 allows malicious user to access unauthorized content of any file in the directory tree e.g. /etc/passwd by appending slashes to the URL request.
{'CVE-2018-16485'}
2020-06-16T21:25:05Z
2019-02-18T23:58:00Z
LOW
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-899g-6q6w-7v94', 'https://hackerone.com/reports/319795', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16485'}
null
npm
GHSA-rw6j-rhw7-q94c
Directory Traversal in sly07
Affected versions of `sly07` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16189'}
2020-08-31T18:23:18Z
2018-07-23T20:40:34Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16189', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sly07', 'https://www.npmjs.com/advisories/442', 'https://github.com/advisories/GHSA-rw6j-rhw7-q94c', 'https://nodesecurity.io/advisories/442'}
null
npm
GHSA-q69p-5h74-w36f
Content Injection via TileJSON Name in mapbox.js
Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js. ## Recommendation Version 1.x: Update to version 1.6.6 or later. Version 2.x: Update to version 2.2.4 or later.
{'CVE-2017-1000043'}
2021-09-16T19:35:51Z
2018-11-09T17:48:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-q69p-5h74-w36f', 'https://hackerone.com/reports/99245', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000043', 'https://www.npmjs.com/advisories/74', 'https://nodesecurity.io/advisories/74'}
null
npm
GHSA-jf5r-8hm2-f872
Incorrect hostname / protocol due to unstripped leading control characters.
Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL. If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect. This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example: ````` const parse = require('url-parse') const express = require('express') const app = express() const port = 3000 url = parse(\"\\bjavascript:alert(1)\") console.log(url) app.get('/', (req, res) => { if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")} }) app.listen(port, () => { console.log(`Example app listening on port ${port}`) }) `````
{'CVE-2022-0691'}
2022-03-11T22:47:09Z
2022-02-22T00:00:30Z
MODERATE
null
{'CWE-639'}
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://github.com/unshiftio/url-parse', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4'}
null
npm
GHSA-x45v-pvpg-hcrh
Malicious Package in mysql-koa
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:05Z
2020-09-03T19:54:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1136'}
null
npm
GHSA-g3fq-3v3g-mh32
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs
### Impact The Nextcloud dialogs library before 3.1.2 did insufficiently escape text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. _Note_: Nextcloud Server employs a strict Content Security Policy that mitigates the risk of these XSS vulnerabilities. ### Patches The vulnerability has been patched in version 3.1.2. If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag. ### Workarounds Make sure no user-supplied input flows into toasts.
{'CVE-2021-29438'}
2021-04-13T18:40:52Z
2021-04-16T19:52:58Z
MODERATE
null
{'CWE-79', 'CWE-80'}
{'https://github.com/nextcloud/nextcloud-dialogs/security/advisories/GHSA-g3fq-3v3g-mh32', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29438', 'https://www.npmjs.com/package/@nextcloud/dialogs'}
null
npm
GHSA-9x9j-836w-8f55
Incorrect Calculation in the MSR JavaScript Cryptography Library
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library's Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server's private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka `MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability`.
{'CVE-2020-1026'}
2021-10-20T22:19:13Z
2022-01-06T19:44:01Z
HIGH
null
{'CWE-682'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1026', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1026'}
null
npm
GHSA-56r9-v65c-34jm
Malicious Package in radicjs
Version 0.2.1 of `radicjs` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:24Z
2020-09-03T02:33:37Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/943'}
null
npm
GHSA-8mmf-qp7j-2w24
Malicious Package in colour-string
Version 1.5.3 of `colour-string` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:53:41Z
2020-09-02T21:35:33Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/903'}
null
npm
GHSA-897m-rjf5-jp39
Prototype Pollution in copy-props
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
{'CVE-2020-28503'}
2021-03-24T23:59:08Z
2022-01-06T20:35:05Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://github.com/gulpjs/copy-props/pull/7', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047'}
null
npm
GHSA-9qmh-276g-x5pj
Prototype Pollution in immer
## Overview Affected versions of immer are vulnerable to Prototype Pollution. ## Proof of exploit ``` const {applyPatches, enablePatches} = require("immer"); enablePatches(); let obj = {}; console.log("Before : " + obj.polluted); applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]); // applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]); console.log("After : " + obj.polluted); ``` ## Remediation Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended.
{'CVE-2020-28477'}
2021-01-20T21:27:33Z
2021-01-20T21:27:56Z
HIGH
null
{'CWE-471'}
{'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://github.com/immerjs/immer/issues/738', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477', 'https://www.npmjs.com/package/immer', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213'}
null
npm
GHSA-35jh-r3h4-6jhm
Command Injection in lodash
`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
{'CVE-2021-23337'}
2022-02-08T21:35:09Z
2021-05-06T16:05:51Z
HIGH
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932', 'https://github.com/lodash/lodash', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851', 'https://snyk.io/vuln/SNYK-JS-LODASH-1040724', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23337'}
null
npm
GHSA-hc94-2wfr-4pwf
Downloads Resources over HTTP in appium-chromedriver
Affected versions of `appium-chromedriver` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read items send over HTTP at will. In this case, that includes the chromedriver binary, which may result in remote code execution if overwritten with a malicious binary. ## Recommendation Update to version 2.9.4 or later.
{'CVE-2016-10557'}
2021-01-08T18:42:02Z
2019-02-18T23:40:19Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10557', 'https://nodesecurity.io/advisories/162', 'https://www.npmjs.com/advisories/162', 'https://github.com/advisories/GHSA-hc94-2wfr-4pwf'}
null
npm
GHSA-x48m-gp6r-gp4v
Malicious Package in rate-map
Version 1.0.3 of `rate-map` contains malicious code. The malware breaks functionality of the `purescript-installer` package by rewriting code of the `dl-tar` dependency. ## Recommendation Upgrade to version 1.0.5 or later. There is no indication of further compromise.
null
2021-09-30T20:04:54Z
2020-09-03T18:21:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1083'}
null
npm
GHSA-wqgq-mfvj-6qxp
Malicious Package in koa-body-parse
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:19:47Z
2020-09-03T19:49:03Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1131'}
null
npm
GHSA-vrv8-v4w8-f95h
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.10 or lower and TinyMCE 5.4.0 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.11 and 5.4.1 by improved HTML parsing and sanitization logic. ### Workarounds The workarounds available are: - upgrade to either TinyMCE 4.9.11 or TinyMCE 5.4.1 or - enable the media plugin, which overrides the default parsing behaviour for iframes or - add the following workaround to update the parsing schema rules for iframes: #### Example: Change the default schema for iframes ```js setup: function(editor) { editor.on('PreInit', function() { editor.schema.getSpecialElements()['iframe'] = /</iframe[^>]*>/gi; }); } ``` ### Acknowledgements Tiny Technologies would like to thank George Steketee and Chris Davis at [Bishop Fox](https://www.bishopfox.com/) for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes54/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2020-08-11T16:24:30Z
2020-08-11T14:55:01Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-vrv8-v4w8-f95h'}
null
npm
GHSA-5p26-hw7f-3cpr
Cross-Site Scripting in html-pages
All versions of `html-pages` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize folder names, allowing attackers to execute arbitrary JavaScript in the victim's browser through folders with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2018-16481'}
2020-08-31T18:43:39Z
2019-02-07T18:14:44Z
HIGH
null
{'CWE-79', 'CWE-64'}
{'https://www.npmjs.com/advisories/1001', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16481', 'https://hackerone.com/reports/330356'}
null
npm
GHSA-h4mc-r4f4-hcf4
Downloads Resources over HTTP in selenium-binaries
Affected versions of `selenium-binaries` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`. ## Recommendation No fix is currently available for this vulnerability. The best mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js.
{'CVE-2016-10589'}
2021-01-08T18:44:01Z
2019-02-18T23:34:37Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-h4mc-r4f4-hcf4', 'https://nodesecurity.io/advisories/175', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10589', 'https://www.npmjs.com/advisories/175'}
null
npm
GHSA-9vxc-g2jx-qj3p
API Admin Auth Weakness in tomato
Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests. ## Details The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access. Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key. ## Proof of Concept This is the snippet of code that does the comparison to authorize requests. ``` if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) { ``` For an access_key that is set to anything that includes the letter 'a' the following request would be authorized. ``` $ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a" { "cmd": "ls", "path": ".", "stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n", "stderr": "" } ``` ## Recommendation Update to version 0.0.6 or later.
{'CVE-2013-7379'}
2021-09-23T21:00:28Z
2020-08-31T22:59:07Z
CRITICAL
null
{'CWE-287'}
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'https://github.com/leizongmin/tomato', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://www.npmjs.com/advisories/38'}
null
npm
GHSA-gmjp-776j-2394
Malicious Package in ripmed160
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:04:56Z
2020-09-03T17:04:24Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1405'}
null
npm
GHSA-3f95-r44v-8mrg
Command injection in simple-git
The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
{'CVE-2022-24433'}
2022-03-17T21:46:01Z
2022-03-12T00:00:33Z
HIGH
null
{'CWE-74', 'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199', 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0', 'https://github.com/steveukx/git-js/pull/767', 'https://github.com/steveukx/git-js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245'}
null
npm
GHSA-9fp7-4fjm-q3mf
Prototype Pollution in keyget
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048)
{'CVE-2021-23760'}
2022-01-31T19:46:10Z
2022-02-01T00:51:01Z
MODERATE
null
{'CWE-1321'}
{'https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048', 'https://snyk.io/vuln/SNYK-JS-KEYGET-2342624', 'https://github.com/rumkin/keyget', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23760'}
null
npm
GHSA-qmw8-3v4g-gwj4
Prefix escape
### Impact By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is. [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N) ### Patches A patch have been submitted by Corey Farrell git@cfware.com, the reporter. All releases after v4.0.2 include the fix. ### Workarounds There are no workaround available. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-21321'}
2021-03-02T03:32:13Z
2021-03-03T01:52:05Z
CRITICAL
null
{'CWE-20'}
{'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4'}
null
npm
GHSA-h9mj-fghc-664w
Denial of Service in mqtt
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. ## Proof of Concept The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead. ``` var mqttp = require('mqtt-packet'); var packets = []; for(var i=0; i<=1000;i++){ packets.push( mqttp.generate({ cmd:'publish', topic:Buffer.from('hello'), payload:Buffer.from('world'), retain: false, dup: false, messageId: ++i, qos: 1 }) ) } ``` ## Recommendation Update to version 2.15.0 or later.
{'CVE-2017-10910'}
2021-09-14T17:16:40Z
2017-12-28T22:51:58Z
MODERATE
null
{'CWE-674'}
{'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://jvn.jp/en/jp/JVN45494523/index.html', 'https://github.com/mqttjs/MQTT.js', 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json', 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0'}
null
npm
GHSA-5w9c-rv96-fr7g
Removal of functional code in faker.js
Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/GHSA-gh88-3pxp-6fm8). The functional code for this package was forked and can be found [here](https://github.com/faker-js/faker).
null
2022-03-22T20:33:40Z
2022-03-22T19:28:24Z
HIGH
null
null
{'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/Faker.js', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://www.npmjs.com/package/faker', 'https://www.npmjs.com/package/@faker-js/faker', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8'}
null
npm
GHSA-mmj4-777p-fpq9
Validation bypass in frourio-express
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。 ### さらなる情報 このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。 * [frourio](https://github.com/frouriojs/frourio)にIssueを開く。 ## English ### Impact Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives) ### Patches Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project. ### Workarounds Validate objects from request with class-transformer in controllers by yourself, or prevent using validators. ### For more information If you have any questions or comments about this advisory: * Open an issue in [frourio](https://github.com/frouriojs/frourio)
{'CVE-2022-23624'}
2022-02-14T22:32:36Z
2022-02-07T22:38:37Z
HIGH
null
{'CWE-20'}
{'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/frouriojs/frourio-express', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
null
npm
GHSA-mf6x-7mm4-x2g7
Out-of-bounds Read in stringstream
All versions of `stringstream` are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is being passed in to `stringstream`.
{'CVE-2018-21270'}
2021-03-19T20:59:51Z
2019-06-20T18:22:32Z
MODERATE
null
{'CWE-125'}
{'https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32', 'https://www.npmjs.com/advisories/664', 'https://hackerone.com/reports/321670'}
null
npm
GHSA-4vmm-mhcq-4x9j
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution. ## Recommendation Update to version 3.1.1 or later.
null
2021-08-16T16:06:38Z
2019-06-14T16:15:14Z
CRITICAL
null
null
{'https://snyk.io/vuln/npm:constantinople:20180421', 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703', 'https://www.npmjs.com/advisories/568', 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://nodesecurity.io/advisories/568'}
null
npm
GHSA-v66p-w7qx-wv98
Authentication Bypass in express-laravel-passport
All versions of `express-laravel-passport` are vulnerable to an Authentication Bypass. The package fails to properly validate JWTs, allowing attackers to send HTTP requests impersonating other users. ## Recommendation Upgrade to version 2.0.5 or later.
null
2020-08-31T18:59:44Z
2020-09-04T17:29:34Z
CRITICAL
null
{'CWE-287'}
{'https://www.npmjs.com/advisories/1450', 'https://hackerone.com/reports/748214'}
null
npm
GHSA-gpfj-4j6g-c4w9
Clipboard-based DOM-XSS
### Impact A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**. ```typescript function generateText(transfer: DataTransfer): string | undefined { if (Array.from(transfer.types).indexOf('text/html') === -1) return let html = transfer.getData('text/html') if (!/<table/i.test(html)) return html = html.replace(/<meta.*?>/, '') const el = document.createElement('div') el.innerHTML = html const tables = el.querySelectorAll('table') for (const table of tables) { if (table.closest('[data-paste-markdown-skip]')) { table.replaceWith(new Text(table.textContent || '')) } const formattedTable = tableMarkdown(table) table.replaceWith(new Text(formattedTable)) } return el.innerHTML } ``` ### Patches A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4). ### Workarounds A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers. <!-- ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) * -->
{'CVE-2021-37700'}
2021-08-30T23:16:08Z
2021-08-12T20:42:17Z
MODERATE
null
{'CWE-79'}
{'https://github.com/github/paste-markdown', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4', 'https://www.npmjs.com/package/@github/paste-markdown', 'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37700'}
null
npm
GHSA-38h8-x697-gh8q
Tmp files readable by other users in sync-exec
Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user. ## Recommendation There is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively. The best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.
{'CVE-2017-16024'}
2021-01-08T20:02:11Z
2018-11-09T17:45:30Z
MODERATE
null
{'CWE-377'}
{'https://github.com/advisories/GHSA-38h8-x697-gh8q', 'https://www.owasp.org/index.php/Insecure_Temporary_File', 'https://cwe.mitre.org/data/definitions/377.html', 'https://github.com/gvarsanyi/sync-exec/issues/17', 'https://nodesecurity.io/advisories/310', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16024', 'https://www.npmjs.com/advisories/310'}
null
npm
GHSA-6qc7-jgq7-34rf
Malicious Package in exprss
All versions of `exprss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:02:31Z
2020-09-02T20:18:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/851'}
null
npm
GHSA-pxcf-v868-m492
Injection and Cross-site Scripting in osm-static-maps
This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.
{'CVE-2020-7749'}
2021-08-02T15:31:49Z
2021-05-10T18:43:45Z
HIGH
null
{'CWE-74', 'CWE-79'}
{'https://github.com/jperelli/osm-static-maps/pull/24', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749', 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142'}
null
npm
GHSA-9prh-257w-9277
Cross-Site Scripting in handlebars
Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted. ## Proof of Concept Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 4.0.0 or later. Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes.
{'CVE-2015-8861'}
2021-09-08T20:16:46Z
2018-10-23T17:20:12Z
MODERATE
null
{'CWE-79'}
{'https://www.sourceclear.com/blog/handlebars_vulnerability_research_findings/', 'http://www.securityfocus.com/bid/96434', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861', 'https://www.npmjs.com/advisories/61', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/advisories/GHSA-9prh-257w-9277', 'https://github.com/wycats/handlebars.js/pull/1083', 'https://blog.srcclr.com/handlebars_vulnerability_research_findings/', 'https://github.com/wycats/handlebars.js', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-jgpq-g82g-6c39
confinit vulnerable to prototype pollution
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7638'}
2021-07-28T23:16:44Z
2020-04-07T15:52:05Z
MODERATE
null
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
null
npm
GHSA-fj58-h2fr-3pp2
SQL Injection and Cross-site Scripting in class-validator
In TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.
{'CVE-2019-18413'}
2021-10-15T15:15:24Z
2021-10-12T16:35:45Z
MODERATE
null
{'CWE-79', 'CWE-89'}
{'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471', 'https://github.com/typestack/class-validator/issues/438', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413', 'https://github.com/typestack/class-validator#passing-options', 'https://github.com/typestack/class-validator'}
null
npm
GHSA-4jg2-84c2-pj95
Improper Control of Generation of Code ('Code Injection') in @asyncapi/modelina
### Impact Anyone who is using the default presets and/or does not handle the functionality themself. ### Patches It has not been patched yet. ### Workarounds Fully custom presets that change the entire rendering process which can then escape the user input. ### For more information Even though that I changed all the presets here, the vulnerability is still present throughout. I am using a JSON Schema here for simplicity. ```ts const jsonSchemaDoc = { $id: 'CustomClass', type: 'object', properties: { 'property: any; \n constructor(){console.log("injected")} \n private _temp': { type: 'string' }, } }; generator = new TypeScriptGenerator( { presets: [ { class: { property({ propertyName, content }) { return `private ${propertyName}: any;`; }, ctor() { return ''; }, getter() { return ''; }, setter() { return ''; } } } ] } ); const inputModel = await generator.process(jsonSchemaDoc); ``` This would render ```ts export class CustomClass { private property: any; constructor(){console.log("injected")} private _temp: any; private additionalProperties: any; } ```
null
2021-09-21T16:14:04Z
2021-09-21T18:41:59Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/asyncapi/modelina', 'https://github.com/asyncapi/modelina/security/advisories/GHSA-4jg2-84c2-pj95'}
null
npm
GHSA-8w74-g84v-c5w8
Directory Traversal in chatbyvista
Affected versions of `chatbyvista` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16177'}
2020-08-31T18:24:03Z
2020-09-01T18:52:26Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/462', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/chatbyvista', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16177', 'https://www.npmjs.com/advisories/462'}
null
npm
GHSA-gvcj-pfq2-wxj7
High severity vulnerability that affects electron
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
{'CVE-2016-1202'}
2021-09-13T12:46:47Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-426'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1202', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7', 'https://github.com/electron/electron', 'http://jvn.jp/en/jp/JVN00324715/index.html', 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'https://github.com/electron/electron/pull/2976'}
null
npm
GHSA-w3pp-wp5v-fjvp
Malicious Package in mogodb
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:20:19Z
2020-09-03T19:51:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1133'}
null
npm
GHSA-qvjc-g5vr-mfgr
Regular Expression Denial of Service in papaparse
Versions of `papaparse` prior to 5.2.0 are vulnerable to Regular Expression Denial of Service (ReDos). The `parse` function contains a malformed regular expression that takes exponentially longer to process non-numerical inputs. This allows attackers to stall systems and lead to Denial of Service. ## Recommendation Upgrade to version 5.2.0 or later.
null
2021-10-04T21:11:37Z
2020-09-04T18:03:04Z
HIGH
null
{'CWE-185'}
{'https://github.com/mholt/PapaParse/issues/777', 'https://github.com/mholt/PapaParse', 'https://www.npmjs.com/advisories/1515', 'https://snyk.io/vuln/SNYK-JS-PAPAPARSE-564258'}
null
npm
GHSA-fpf2-pr3j-4cm3
Malicious Package in ecruve
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:01:31Z
2020-09-03T17:06:06Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1395'}
null
npm
GHSA-7w54-gp8x-f33m
Potential exposure of tokens to an Unauthorized Actor
### Impact When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account). ### Patches This was patched in 7.3.1, by updating the address of the fallback WebSocket polling proxy to the new one. ### Workarounds Specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`: ```typescript const connectOptions: ConnectArgs = { // ... pollingHost: 'gp-v2.replit.com', }; client.connect(connectOptions); ``` ### For more information Thanks to https://hackerone.com/orlserg for disclosing this. If you have any questions or comments about this advisory: * Open an issue in [replit/crosis](https://github.com/replit/crosis) * Email us at [security@replit.com](mailto:security@replit.com)
{'CVE-2022-21671'}
2022-01-10T23:18:10Z
2022-01-12T22:44:47Z
HIGH
null
{'CWE-200'}
{'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://github.com/replit/crosis', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671'}
null
npm
GHSA-4hjg-w3ww-38c6
Malicious Package in tiar
All versions of `tiar` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:01:59Z
2020-09-03T18:03:49Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1064'}
null
npm
GHSA-qw3g-35hc-fcrh
Cross-Site Scripting (XSS) in restify
Affected versions of `restify` are susceptible to a cross-site scripting vulnerability when using URL encoded script tags in a non-existent URL. ## Proof of Concept: Request ``` https://localhost:3000/no5_such3_file7.pl?%22%3E%3Cscript%3Ealert(73541);%3C/script%3E ``` Will be included in response: ```<script>alert(73541);</script>``` ## Recommendation Update to version 4.1.0 or later.
{'CVE-2017-16018'}
2020-08-31T18:18:56Z
2018-11-09T17:45:38Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16018', 'https://github.com/advisories/GHSA-qw3g-35hc-fcrh', 'https://github.com/restify/node-restify/issues/1018', 'https://www.npmjs.com/advisories/314', 'https://nodesecurity.io/advisories/314'}
null
npm
GHSA-6hwh-rqwf-cxxr
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util
vega-util prior to 1.13.1 allows manipulation of object prototype. The &#39;vega.mergeConfig&#39; method within vega-util could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10806'}
2021-07-28T18:36:56Z
2021-05-07T16:32:02Z
MODERATE
null
{'CWE-915', 'CWE-20'}
{'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10806'}
null
npm
GHSA-9m6j-fcg5-2442
Path traversal in url-parse
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
{'CVE-2021-27515'}
2021-05-06T16:31:23Z
2021-05-06T16:10:51Z
HIGH
null
{'CWE-23'}
{'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/unshiftio/url-parse/pull/197', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://advisory.checkmarx.net/advisory/CX-2021-4306'}
null
npm
GHSA-74f5-4m28-gq5c
Directory Traversal in peiserver
Affected versions of `peiserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16214'}
2020-08-31T18:22:27Z
2020-09-01T18:09:59Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/420', 'https://nodesecurity.io/advisories/420', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/peiserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16214'}
null
npm
GHSA-rr77-w4w8-w8wp
Directory Traversal in tencent-server
Affected versions of `tencent-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16216'}
2020-08-31T18:22:22Z
2020-09-01T17:37:46Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16216', 'https://www.npmjs.com/advisories/418', 'https://nodesecurity.io/advisories/418', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tencent-server'}
null
npm
GHSA-hwch-749c-rv63
Potential Command Injection in hubot-scripts
Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module. ### Mitigating Factors The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts. ## Recommendation Update hubot-scripts to version 2.4.4 or later.
{'CVE-2013-7378'}
2021-04-12T21:34:54Z
2020-08-31T22:46:38Z
CRITICAL
null
{'CWE-74'}
{'https://web.archive.org/web/20140731222413/https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://www.npmjs.com/advisories/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7378'}
null
npm
GHSA-8vv3-jxm8-f4vf
Prototype Pollution in connie-lang
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.
{'CVE-2020-7706'}
2021-05-05T21:19:56Z
2021-05-06T17:29:25Z
CRITICAL
null
{'CWE-915'}
{'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7706', 'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853'}
null
npm
GHSA-5w65-6875-rhq8
Undefined Behavior in sailsjs-cacheman
All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:34:32Z
2019-09-11T23:01:57Z
LOW
null
null
{'https://www.npmjs.com/advisories/752', 'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
null
npm
GHSA-h68q-55jf-x68w
Prototype pollution in chart.js
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
{'CVE-2020-7746'}
2021-04-20T17:46:27Z
2021-05-10T18:47:53Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019374', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7746', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1019375', 'https://github.com/chartjs/Chart.js/pull/7920', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCHARTJS-1019376', 'https://snyk.io/vuln/SNYK-JS-CHARTJS-1018716'}
null
npm
GHSA-34gh-3cwv-wvp2
Directory traversal in rollup-plugin-server
This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function.
{'CVE-2020-7683'}
2021-09-23T17:29:15Z
2020-07-29T18:07:11Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'}
null
npm
GHSA-xfmw-2vmm-579c
Hijacked Environment Variables in nodesass
The `nodesass` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16080'}
2020-08-31T18:26:13Z
2020-09-01T18:59:50Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/519', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16080', 'https://nodesecurity.io/advisories/519'}
null
npm
GHSA-p62r-jf56-h429
Malicious Package in evil-package
All versions of `evil-package` contain malicious code. The package uploads the contents of `process.env` to `example.com/log`. ## Recommendation Remove the package from your environment. Given the host where the information was uploaded to there is no further indication of compromise.
null
2020-08-31T18:49:31Z
2020-09-03T20:29:58Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1162'}
null
npm
GHSA-fm4j-4xhm-xpwx
Sandbox Breakout / Arbitrary Code Execution in sandbox
All versions of `sandbox` are vulnerable to Sandbox Escape leading to Remote Code Execution. Due to insufficient input sanitization it is possible to escape the sandbox using constructors. ## Proof of concept ``` var Sandbox = require("sandbox") s = new Sandbox() code = `new Function("return (this.constructor.constructor('return (this.process.mainModule.constructor._load)')())")()("util").inspect("hi")` s.run(code) ``` ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:34:58Z
2020-09-02T15:51:34Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/766', 'https://github.com/gf3/sandbox/issues/50'}
null
npm
GHSA-98pq-pmw9-4gpm
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2016-10550'}
2020-08-31T18:11:11Z
2019-02-18T23:54:34Z
HIGH
null
{'CWE-89'}
{'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://nodesecurity.io/advisories/112'}
null
npm
GHSA-w8h4-vw8f-rvvj
Improper Control of Dynamically-Managed Code Resources in config-shield
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.
{'CVE-2021-26276'}
2022-04-27T20:27:30Z
2021-04-13T15:30:09Z
MODERATE
null
{'CWE-913'}
{'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276', 'https://github.com/godaddy/node-config-shield', 'https://advisory.checkmarx.net/advisory/CX-2021-4773'}
null
npm
GHSA-w5p7-h5w8-2hfq
Regular Expression Denial of Service in trim
All versions of package trim lower than 0.0.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
{'CVE-2020-7753'}
2022-04-27T19:19:28Z
2021-05-10T18:44:22Z
HIGH
null
{'CWE-400'}
{'https://github.com/component/trim/blob/master/index.js', 'https://snyk.io/vuln/SNYK-JS-TRIM-1017038', 'https://lists.apache.org/thread.html/r75b8d0b88833d7d96afcdce3ead65e212572ead4e7a9f34d21040196@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r10faad1ef9166d37a1a5c9142b1af7099b8ecdc5ad05c51b8ea993d9@%3Ccommits.airflow.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1022132', 'https://github.com/component/trim/', 'https://github.com/component/trim/blob/master/index.js%23L6', 'https://github.com/component/trim/pull/8', 'https://lists.apache.org/thread.html/rcc7c2865a52b544a8e49386c6880e9b9ab29bfce1052b5569d09ee4a@%3Ccommits.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/rb8462df3b6484e778905c09cd49a8912e1a302659860017ebe36da03@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7753', 'https://lists.apache.org/thread.html/r51ff3c2a4c7b8402f321eae7e624672cc2295c7bc8c12c8b871f6b0b@%3Ccommits.airflow.apache.org%3E'}
null
npm
GHSA-2w8g-m5j8-7m87
Zalgo-like output that crashes the server
### Impact _What kind of vulnerability is it? Who is impacted?_ [`colors`](https://npmjs.com/package/colors) package caused zalgo-like output (see https://github.com/soketi/soketi/issues/276, https://github.com/Marak/colors.js/issues/289), breaking the servers. **Only NPM users that recently upgraded or installed the NPM package are affected.** Docker users seem to not be affected as the dependencies were bundled at the time of the build, which were tested. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Latest patch. `0.26.1` to be exact at the time of writing. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ You cannot get around this as it's related to dependencies. ### References _Are there any links users can visit to find out more?_ - https://github.com/Marak/colors.js/issues/289 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issues board](https://github.com/soketi/soketi/issues) * Email us at [alex@renoki.org](mailto:alex@renoki.org)
null
2022-01-10T21:37:04Z
2022-01-12T21:45:59Z
CRITICAL
null
null
{'https://github.com/soketi/soketi/security/advisories/GHSA-2w8g-m5j8-7m87'}
null
npm
GHSA-2mm9-c2fx-c7m4
XSS in docsify
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
{'CVE-2021-23342'}
2021-03-15T23:55:40Z
2021-03-01T19:44:27Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017', 'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://www.npmjs.com/package/docsify', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'http://seclists.org/fulldisclosure/2021/Feb/71'}
null
npm
GHSA-59m2-j944-839w
Downloads Resources over HTTP in clang-extra
Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`. ## Recommendation No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future. The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10655'}
2021-01-08T19:50:58Z
2019-02-18T23:45:13Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-59m2-j944-839w', 'https://www.npmjs.com/advisories/265', 'https://nodesecurity.io/advisories/265', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655'}
null