ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-3hvm-hgpw-rx4j
Path Traversal in knightjs
All versions of `knightjs` are vulnerable to Path Traversal. This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation. ## Recommendation As there is currently no fix for this module we recommend not using this module in production environments.
{'CVE-2018-16475'}
2020-08-31T18:34:11Z
2018-11-06T23:11:10Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16475', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://hackerone.com/reports/403707', 'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j', 'https://www.npmjs.com/advisories/743'}
null
npm
GHSA-prv2-xwr7-hr57
Uncontrolled Resource Consumption in rdf-graph-array
rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype.
{'CVE-2019-10798'}
2021-04-08T20:19:06Z
2021-04-13T15:23:21Z
MODERATE
null
{'CWE-400'}
{'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211', 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}
null
npm
GHSA-56pc-6jqp-xqj8
Context isolation bypass in Electron
### Impact Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nativeWindowOpen: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron version to be protected. ### Fixed Versions * `11.0.0-beta.6` * `10.1.2` * `9.3.1` * `8.5.2` ### For more information If you have any questions or comments about this advisory: * Email us at [security@electronjs.org](mailto:security@electronjs.org)
{'CVE-2020-15215'}
2021-01-07T22:51:36Z
2020-10-06T17:46:40Z
LOW
null
{'CWE-668', 'CWE-693'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15215', 'https://github.com/electron/electron/security/advisories/GHSA-56pc-6jqp-xqj8'}
null
npm
GHSA-5v9h-q3gj-c32x
SQL Injection via GeoJSON in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documents using `GeomFromText`. ## Recommendation Update to version 3.23.6 or later.
{'CVE-2016-1000225'}
2021-09-23T21:29:13Z
2020-09-01T15:27:40Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000225', 'https://snyk.io/vuln/npm:sequelize:20160718', 'https://github.com/sequelize/sequelize', 'https://github.com/sequelize/sequelize/issues/6194', 'https://www.npmjs.com/advisories/122'}
null
npm
GHSA-cxjc-r2fp-7mq6
XSS in dijit editor's LinkDialog plugin
### Impact XSS possible for users of the Dijit Editor's LinkDialog plugin ### Patches Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3 ### Workarounds Users may apply the patch made in these releases. ### For more information If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/)
{'CVE-2020-4051'}
2021-01-08T20:11:17Z
2020-06-15T21:53:12Z
LOW
null
{'CWE-79'}
{'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051', 'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6'}
null
npm
GHSA-7375-vjr2-3g7w
Cross-Site Scripting in glance
Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package.
{'CVE-2018-3748'}
2021-09-02T19:13:45Z
2018-09-27T11:37:19Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3748', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://github.com/jarofghosts/glance', 'https://hackerone.com/reports/310133'}
null
npm
GHSA-x2fc-mxcx-w4mf
Prototype Pollution in mathjs
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.
{'CVE-2020-7743'}
2021-04-21T19:47:53Z
2021-05-10T18:39:04Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://www.npmjs.com/package/mathjs', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743', 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113'}
null
npm
GHSA-gcv8-gh4r-25x6
Authorization Bypass Through User-Controlled Key in urijs
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
{'CVE-2022-0613'}
2022-04-01T18:06:53Z
2022-02-17T00:00:35Z
MODERATE
null
{'CWE-639'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613', 'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://github.com/medialize/uri.js'}
null
npm
GHSA-4r97-78gf-q24v
Prototype Pollution in klona
Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 1.1.1 or later.
null
2020-08-31T19:00:12Z
2020-09-04T17:53:27Z
HIGH
null
{'CWE-1321'}
{'https://hackerone.com/reports/778414', 'https://www.npmjs.com/advisories/1463'}
null
npm
GHSA-cgjx-mwpx-47jv
Private Data Disclosure in express-restify-mongoose
Affected versions of `express-restify-mongoose` are susceptible to an information leakage vulnerability which may allow an attacker to access fields on a model even if those fields are marked as private. ## Proof of Concept If you have a user model that you want to protect, such as the following User model: ``` const User = mongoose.model('User', new mongoose.Schema({ name: String, password: String, })); ``` You would normally do something such as: ``` restify.serve(router, User, { private: ['password'], // Set the password part of User as private, so outside people can't read it }) ``` This would hide the password field from people that send your application a `GET /User` and `GET /User/some-user-id` request. A malicious user can go to your application and send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This could be used for other private data, if the malicious user knew what was set as private for specific routes. ## Recommendation Version 2.x: Update to version 2.5.0 or later. Version 3.x: Update to version 3.1.0 or later.
{'CVE-2016-10533'}
2020-08-31T18:10:32Z
2018-10-23T17:14:57Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10533', 'https://github.com/advisories/GHSA-cgjx-mwpx-47jv', 'https://github.com/florianholzapfel/express-restify-mongoose/issues/252', 'https://www.npmjs.com/advisories/92', 'https://nodesecurity.io/advisories/92'}
null
npm
GHSA-m6wh-m8m8-6xx5
Exfiltrates data on installation in cofeescript
The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofeescript` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16202'}
2021-01-08T18:30:23Z
2018-08-06T20:05:28Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5', 'https://www.npmjs.com/advisories/541', 'https://nodesecurity.io/advisories/541', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202'}
null
npm
GHSA-4g54-95xv-f353
Hijacked Environment Variables in http-proxy.js
The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16075'}
2020-08-31T18:26:01Z
2018-08-29T23:16:56Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/514', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075', 'https://github.com/advisories/GHSA-4g54-95xv-f353', 'https://nodesecurity.io/advisories/514'}
null
npm
GHSA-pw2r-vq6v-hr8c
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
{'CVE-2022-0536'}
2022-02-14T22:27:56Z
2022-02-10T00:00:31Z
MODERATE
null
{'CWE-200'}
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536', 'https://github.com/follow-redirects/follow-redirects'}
null
npm
GHSA-388g-jwpg-x6j4
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 3.0.13 or later.
null
2021-09-28T17:00:22Z
2020-09-11T21:20:14Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941', 'https://www.npmjs.com/advisories/985', 'https://github.com/swagger-api/swagger-ui/issues/3163', 'https://github.com/swagger-api/swagger-ui'}
null
npm
GHSA-8qm2-24qc-c4qg
Malicious Package in freshdom
Version 0.0.6 of `freshdom` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.6 of this module is found installed you will want to replace it with a version before or after 0.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T17:32:50Z
2020-09-01T19:57:56Z
CRITICAL
null
{'CWE-506'}
{'https://snyk.io/vuln/SNYK-JS-FRESHDOM-450987', 'https://www.npmjs.com/advisories/627', 'https://github.com/jamiller619/freshdom'}
null
npm
GHSA-9g9w-hmvj-5h57
Prototype Pollution in merge-deep
Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 3.0.1 or later.
{'CVE-2018-3722'}
2020-08-31T18:28:36Z
2018-07-26T15:17:15Z
LOW
null
{'CWE-471'}
{'https://hackerone.com/reports/310708', 'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57', 'https://www.npmjs.com/advisories/580'}
null
npm
GHSA-9j5m-873f-xh76
Directory Traversal in static-html-server
Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16152'}
2020-08-31T18:20:55Z
2018-07-23T20:46:32Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16152', 'https://nodesecurity.io/advisories/376', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server', 'https://www.npmjs.com/advisories/376', 'https://github.com/advisories/GHSA-9j5m-873f-xh76'}
null
npm
GHSA-xqh8-5j36-4556
SQL Injection in connect-pg-simple
Versions of `connect-pg-simple` are vulnerable to SQL Injection. The `PGStore.prototype.quotedTable` function allows for the query to be manipulated if the input has double quotes through the `schemaName` or `tableName` variables. These variables are passed to the constructor and are unlikely to be controlled by user-input. If they are controlled by user-input it could allow attackers to execute arbitrary SQL queries. ## Recommendation Upgrade to version 6.0.1 or later.
{'CVE-2019-15658'}
2021-09-22T15:15:40Z
2019-08-26T16:59:45Z
HIGH
null
{'CWE-89'}
{'https://www.npmjs.com/advisories/1153', 'https://github.com/advisories/GHSA-xqh8-5j36-4556', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15658', 'https://github.com/voxpelli/node-connect-pg-simple', 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556', 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'}
null
npm
GHSA-f5cv-xrv9-r8w7
NoSQL injection in express-cart
Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection. The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators. These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start. ## Recommendation Update to version 1.1.8 or later.
null
2021-09-24T20:58:36Z
2020-09-01T21:17:16Z
HIGH
null
{'CWE-89'}
{'https://www.npmjs.com/advisories/724', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/472.json', 'https://hackerone.com/reports/397445', 'https://github.com/nodejs/security-wg'}
null
npm
GHSA-9fhw-r42p-5c7r
Regular expression Denial of Service in @progfay/scrapbox-parser
### Impact A [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) flaw was found in the @progfay/scrapbox-parser package before 6.0.3, 7.0.2 for Node.js. The attacker that is able to be parsed a specially crafted text may cause the application to consume an excessive amount of CPU. ### Patches Upgrade to version 6.0.3, 7.0.2 or later. ### Workarounds Avoid to parse text with a lot of `[` chars. ### References * https://github.com/progfay/scrapbox-parser/pull/519 * https://github.com/progfay/scrapbox-parser/pull/539 * https://github.com/progfay/scrapbox-parser/pull/540 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27405 * https://snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803 ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/progfay/scrapbox-parser](https://github.com/progfay/scrapbox-parser/issues)
{'CVE-2021-27405'}
2021-02-26T19:49:07Z
2021-03-01T20:44:44Z
MODERATE
null
{'CWE-400'}
{'https://github.com/progfay/scrapbox-parser/security/advisories/GHSA-9fhw-r42p-5c7r', 'https://security.netapp.com/advisory/ntap-20210326-0002/', 'https://github.com/progfay/scrapbox-parser/pull/540', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27405', 'https://github.com/progfay/scrapbox-parser/pull/539', 'https://github.com/progfay/scrapbox-parser/pull/519'}
null
npm
GHSA-mmph-wp49-r48h
Malicious Package in experss
All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:02:46Z
2020-09-02T20:20:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/852'}
null
npm
GHSA-fw76-p9p2-6pvf
Malicious Package in serilize
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:28:12Z
2020-09-03T19:58:58Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1140'}
null
npm
GHSA-5mjw-6jrh-hvfq
Sandbox Breakout / Arbitrary Code Execution in static-eval
Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package. ## Proof of concept ``` var evaluate = require('static-eval'); var parse = require('esprima').parse; var src = '(function(){console.log(process.pid)})()'; var ast = parse(src).body[0].expression; var res = evaluate(ast, {}); // Will print the process id ``` ## Recommendation Update to version 2.0.0 or later.
{'CVE-2017-16226'}
2020-08-31T18:27:19Z
2018-08-06T21:37:06Z
MODERATE
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/548', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16226', 'https://nodesecurity.io/advisories/548', 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq', 'https://github.com/substack/static-eval/pull/18', 'https://maustin.net/articles/2017-10/static_eval'}
null
npm
GHSA-7cg8-pq9v-x98q
Sandbox Breakout in realms-shim
Versions of `realms-shim` prior to 1.2.1 are vulnerable to a Sandbox Breakout. The Realms evaluation function has an option to apply Babel-like transformations to the source code before it reaches the evaluator. One portion of this transform pipeline exposed a primal-Realm object to the rewriting function. Confined code which used the evaluator itself could provide a malicious rewriter function that captured this object, and use it to breach the sandbox. ## Recommendation Upgrade to version 1.2.1 or later.
null
2021-09-02T21:14:19Z
2019-10-21T21:58:55Z
CRITICAL
null
null
{'https://github.com/advisories/GHSA-7cg8-pq9v-x98q', 'https://github.com/Agoric/realms-shim', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-536069', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-7cg8-pq9v-x98q', 'https://www.npmjs.com/advisories/1218'}
null
npm
GHSA-3q32-j57w-q4w7
Path Traversal in total.js
Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths. The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`. ## Recommendation - If you are using version 2.1.x, upgrade to 2.1.1 or later. - If you are using version 2.2.x, upgrade to 2.2.1 or later. - If you are using version 2.3.x, upgrade to 2.3.1 or later. - If you are using version 2.4.x, upgrade to 2.4.1 or later. - If you are using version 2.5.x, upgrade to 2.5.1 or later. - If you are using version 2.6.x, upgrade to 2.6.3 or later. - If you are using version 2.7.x, upgrade to 2.7.1 or later. - If you are using version 2.8.x, upgrade to 2.8.1 or later. - If you are using version 2.9.x, upgrade to 2.9.5 or later. - If you are using version 3.0.x, upgrade to 3.0.1 or later. - If you are using version 3.1.x, upgrade to 3.1.1 or later. - If you are using version 3.2.x, upgrade to 3.2.4 or later.
{'CVE-2019-8903'}
2021-08-31T21:22:06Z
2019-02-20T15:40:13Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903', 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8903', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework'}
null
npm
GHSA-q257-vv4p-fg92
Header Forgery in http-signature
Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature. This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names. ## Proof of Concept Consider this to be the initial, untampered request: ``` POST /pay HTTP/1.1 Host: example.com Date: Thu, 05 Jan 2012 21:31:40 GMT X-Payment-Source: src@money.com X-Payment-Destination: dst@money.com Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-source x-payment-destination" MDyO5tSvin5... ``` And the request is intercepted and tampered as follows: ``` X-Payment-Source: dst@money.com // Emails switched X-Payment-Destination: src@money.com Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-destination x-payment-source" MDyO5tSvin5... ``` In the resulting responses, both requests would pass signature verification without issue. ``` src@money.com\n dst@money.com\n ``` ## Recommendation Update to version 0.10.0 or higher.
{'CVE-2017-16005'}
2020-08-31T18:19:06Z
2018-11-09T17:49:34Z
LOW
null
{'CWE-20'}
{'https://github.com/joyent/node-http-signature/issues/10', 'https://nodesecurity.io/advisories/318', 'https://github.com/advisories/GHSA-q257-vv4p-fg92', 'https://www.npmjs.com/advisories/318', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005'}
null
npm
GHSA-v3wr-67px-44xg
Execution with Unnecessary Privileges in arc-electron
### Impact When the end-user click on the response header that contains a link the target will be opened in ARC new window. This window will have the default preload script loaded which allows the scripts embedded in the link target to execute any logic that ARC has access to from the renderer process, which includes file system access, data store access (which may contain sensitive information), and some additional processes that only ARC should have access to. ### Patches This is patched in version 17.0.9. ### Workarounds Do not click onto any link in the response headers view. ### For more information If you have any questions or comments about this advisory: * Open an issue in [advanced-rest-client/arc-electron](https://github.com/advanced-rest-client/arc-electron) * Email us at [Salesforce Security](mailto:security@salesforce.com)
null
2022-03-03T19:11:14Z
2022-03-03T19:11:14Z
HIGH
null
null
{'https://github.com/advanced-rest-client/arc-electron/security/advisories/GHSA-v3wr-67px-44xg', 'https://github.com/advanced-rest-client/arc-electron'}
null
npm
GHSA-3j9m-hcv9-rpj8
XSS vulnerability allowing arbitrary JavaScript execution
Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ## CVE-2021-41174 XSS vulnerability on unauthenticated pages ### Summary CVSS Score: 6.9 Medium CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L) We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability. It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability. ### Impact If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. There are two ways an unauthenticated user can open a page in Grafana that contains the login button: - Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack. - The link is to an unauthenticated page. The following pages are vulnerable: - `/dashboard-solo/snapshot/*` - `/dashboard/snapshot/*` - `/invite/:code` The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this: https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1 When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. ### Attack audit We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment. #### Through reverse proxy/load balancer logs To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks. #### Through the Grafana Enterprise audit feature If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code. ### Patched versions Release 8.2.3: - [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/) ### Solutions and mitigations Download and install the appropriate patch for your version of Grafana. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ### Workaround If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path. Example of an Nginx rule to block the literal string `{{`: ``` location ~ \{\{ { deny all; } ``` ### Timeline and postmortem Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. * 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability. * 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2. * 2021-10-22 02:02 MEDIUM severity declared. * 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ . * 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure. * 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests. * 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud. * 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected. * 2021-10-22 14:05 Grafana Cloud instances updated with a fix. * 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified. * 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation. * 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo. * 2021-11-03 12:00: Public release. ## Reporting security issues If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index). ## Security announcements There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml).
{'CVE-2021-41174'}
2021-11-29T15:05:31Z
2021-11-08T18:13:19Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41174', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana', 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8'}
null
npm
GHSA-h726-x36v-rx45
Prototype Pollution in lodash.merge
Versions of `lodash.merge` before 4.6.2 are vulnerable to prototype pollution. The function `merge` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.2 or later.
null
2020-08-31T18:46:04Z
2020-09-03T18:04:54Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1066'}
null
npm
GHSA-rrqv-vjrw-hrcr
Arbitrary Code Execution in json-ptr
There is a security vulnerability in `json-ptr` versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.
null
2021-05-26T19:57:10Z
2021-05-26T19:59:19Z
HIGH
null
{'CWE-74'}
{'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174', 'https://github.com/flitbit/json-ptr/blob/456a1728b45c8663bb1ac20a249c5fb17495ec6b/README.md#security-vulnerability-prior-to-v210', 'https://github.com/418sec/json-ptr/pull/3', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396', 'https://www.npmjs.com/advisories/1706', 'https://www.huntr.dev/bounties/2-npm-json-ptr/', 'https://www.npmjs.com/package/json-ptr'}
null
npm
GHSA-v73m-fjxv-w4rh
Hijacked Environment Variables in fabric-js
The `fabric-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16053'}
2020-08-31T18:25:01Z
2018-07-23T20:50:18Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/487', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16053', 'https://www.npmjs.com/advisories/487', 'https://github.com/advisories/GHSA-v73m-fjxv-w4rh'}
null
npm
GHSA-3crj-w4f5-gwh4
Processing untrusted theming resources might execute arbitrary code (ACE)
### Impact When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process. While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development. Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat: An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files. This is an example of inline JavaScript in a Less file: ```less .rule { @var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`; color: @var; } ``` Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3. Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it: ```less .rule { @var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`"; color: @var; } ``` ### Patches We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork. This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0) ### Workarounds Only process trusted theming resources. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/SAP/less-openui5 * Email us at secure@sap.com
{'CVE-2021-21316'}
2021-02-16T17:35:25Z
2021-01-29T20:51:37Z
HIGH
null
{'CWE-74'}
{'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8', 'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://www.npmjs.com/package/less-openui5', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'}
null
npm
GHSA-q5c4-39f5-m68j
Regular Expression Denial of Service in decamelize
Affected versions of `decamelize` are susceptible to a denial of service vulnerability when user input is passed directly into `decamelize`. ## Recommendation Update to version 1.1.2 or later.
{'CVE-2017-16023'}
2020-08-31T18:18:42Z
2018-07-24T20:00:17Z
HIGH
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-q5c4-39f5-m68j', 'https://github.com/sindresorhus/decamelize/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16023', 'https://www.npmjs.com/advisories/308', 'https://nodesecurity.io/advisories/308'}
null
npm
GHSA-p6mc-m468-83gw
Prototype Pollution in lodash
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays. This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
{'CVE-2020-8203'}
2022-02-08T22:04:28Z
2020-07-15T19:15:48Z
HIGH
null
{'CWE-1321', 'CWE-770'}
{'https://github.com/lodash/lodash/issues/4744', 'https://github.com/lodash/lodash', 'https://www.npmjs.com/advisories/1523', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/lodash/lodash/issues/4874', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://hackerone.com/reports/712065'}
null
npm
GHSA-cwx2-736x-mf6w
Prototype pollution in object-path
### Impact A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. ### Patches Upgrade to version >= 0.11.5 ### Workarounds Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0. ### References [Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638) ### For more information If you have any questions or comments about this advisory: * Open an issue in [object-path](https://github.com/mariocasciaro/object-path)
{'CVE-2020-15256'}
2021-11-19T14:05:56Z
2020-10-19T20:55:55Z
HIGH
null
{'CWE-471', 'CWE-20'}
{'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256', 'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://github.com/mariocasciaro/object-path'}
null
npm
GHSA-p9pm-55vp-2jqw
Downloads Resources over HTTP in soci
Affected versions of `soci` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `soci`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10669'}
2021-01-08T18:21:55Z
2019-02-18T23:44:32Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/270', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10669', 'https://github.com/advisories/GHSA-p9pm-55vp-2jqw', 'https://nodesecurity.io/advisories/270'}
null
npm
GHSA-x949-7cm6-fm6p
Code Injection in md-to-pdf.
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
{'CVE-2021-23639'}
2021-12-15T15:22:46Z
2021-12-16T14:34:40Z
CRITICAL
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a', 'https://github.com/simonhaenisch/md-to-pdf/issues/99'}
null
npm
GHSA-x26f-26qw-hhhx
Path Traversal in hekto
Versions of `hekto` before 0.2.3 are vulnerable to path traversal. This allows a remote attacker to read content of arbitrary files. ## Recommendation Update to version 0.2.3 or later.
{'CVE-2018-3725'}
2020-08-31T18:28:51Z
2018-07-26T15:22:00Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-x26f-26qw-hhhx', 'https://www.npmjs.com/advisories/586', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3725', 'https://hackerone.com/reports/311218'}
null
npm
GHSA-p59g-6cqr-m73w
Malicious Package in bmap
Version 1.0.3 of `bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-29T20:33:18Z
2020-09-03T20:45:27Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1192'}
null
npm
GHSA-pg97-ww7h-5mjr
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
### Impact _What kind of vulnerability is it? Who is impacted?_ Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo: * 1.16.1 * 1.15.2 * 1.14.5 * 1.13.6 * 1.12.7 * 1.11.9 Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch. ### For more information If you have any questions or comments about this advisory: * Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)
{'CVE-2019-10785'}
2021-08-19T17:21:06Z
2020-02-13T22:21:06Z
MODERATE
null
{'CWE-79'}
{'https://github.com/dojo/dojox/pull/315', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}
null
npm
GHSA-3949-f494-cm99
Cross-site Scripting in Prism
### Impact Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. ### Patches This bug has been fixed in v1.27.0. ### Workarounds Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin. ### References - https://github.com/PrismJS/prism/pull/3341
{'CVE-2022-23647'}
2022-02-22T19:32:18Z
2022-02-22T19:32:18Z
HIGH
null
{'CWE-79'}
{'https://github.com/PrismJS/prism/pull/3341', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism', 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99'}
null
npm
GHSA-rph7-j9qr-h8q8
Potential Command Injection in codem-transcode
When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution. ### Mitigating Factors: The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default. ## Recommendation An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade..
{'CVE-2013-7377'}
2021-09-17T19:23:32Z
2017-11-28T22:20:17Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/2', 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://nodesecurity.io/advisories/codem-transcode_command_injection'}
null
npm
GHSA-xx4c-jj58-r7x6
Inefficient Regular Expression Complexity in Validator.js
### Impact Versions of `validator` prior to 13.7.0 are affected by an inefficient Regular Expression complexity when using the `rtrim` and `trim` sanitizers. ### Patches The problem has been patched in validator 13.7.0
null
2021-11-08T21:27:48Z
2021-11-19T20:14:23Z
MODERATE
null
{'CWE-1333'}
{'https://github.com/validatorjs/validator.js', 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/', 'https://github.com/validatorjs/validator.js/issues/1599', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js/pull/1738', 'https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6'}
null
npm
GHSA-8w9j-6wg6-qv4f
Malicious Package in axioss
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:13:23Z
2020-09-03T19:41:17Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1124'}
null
npm
GHSA-m273-wwfv-h6jp
Directory Traversal in fancy-server
Versions 0.1.4 and earlier of fancy-server are vulnerable to a directory traversal attack. Standard attack vectors such as `../` will allow an attacker to read files outside of the served directory. ## Recommendation Upgrade to version 0.1.4 or greater.
{'CVE-2014-10066'}
2020-08-31T18:07:38Z
2020-08-31T22:44:33Z
HIGH
null
{'CWE-22'}
{'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10066', 'https://nodesecurity.io/advisories/9', 'https://www.npmjs.com/advisories/9'}
null
npm
GHSA-7r28-3m3f-r2pr
Regular Expression Denial of Service (ReDoS)
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
{'CVE-2021-28092'}
2021-03-25T00:18:05Z
2021-03-19T21:25:50Z
HIGH
null
{'CWE-400'}
{'https://github.com/sindresorhus/is-svg/releases', 'https://www.npmjs.com/package/is-svg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}
null
npm
GHSA-563h-49v8-g7x4
Malicious Package in ks-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T16:10:30Z
2020-09-03T23:17:01Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1297'}
null
npm
GHSA-9hqj-38j2-5jgm
Command Injection in ascii-art
Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command. Example Proof of concept: `ascii-art preview 'doom"; touch /tmp/malicious; echo "'` Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`. ## Recommendation Update to version 1.4.4 or later.
null
2020-08-31T18:33:35Z
2020-09-01T21:19:23Z
LOW
null
{'CWE-77'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json', 'https://hackerone.com/reports/390631', 'https://www.npmjs.com/advisories/727'}
null
npm
GHSA-4x6x-782q-jfc4
Command Injection in node-wifi
Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:41:45Z
2020-09-03T02:38:47Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/952'}
null
npm
GHSA-pp7m-6j83-m7r6
Cross-site Scripting in video.js
This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
{'CVE-2021-23414'}
2021-08-31T21:01:29Z
2021-08-10T16:09:36Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588', 'https://github.com/videojs/video.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429'}
null
npm
GHSA-q9q6-f556-gpm7
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43571'}
2021-11-15T14:44:13Z
2021-11-10T20:58:42Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43571', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-node'}
null
npm
GHSA-cfhg-9x44-78h2
Command Injection in ps
Versions of `ps` before 1.0.0 are vulnerable to command injection. Proof of concept: ``` var ps = require('ps'); ps.lookup({ pid: "$(touch success.txt)" }, function(err, proc) { // this method is vulnerable to command injection if (err) {throw err;} if (proc) { console.log(proc); // Process name, something like "node" or "bash" } else { console.log('No such process'); } }); // Result: The file success.txt will exist on the filesystem if the touch command was executed ``` ## Recommendation Update to version 1.0.0 or later.
{'CVE-2018-16460'}
2020-08-31T18:33:37Z
2018-09-17T20:43:59Z
MODERATE
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16460', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json', 'https://hackerone.com/reports/390848', 'https://github.com/advisories/GHSA-cfhg-9x44-78h2', 'https://www.npmjs.com/advisories/728'}
null
npm
GHSA-m744-2jj8-vpfv
Command injection in git-parse
The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
{'CVE-2021-26543'}
2022-02-10T23:51:16Z
2022-02-10T23:51:16Z
HIGH
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26543', 'https://github.com/wayfair/git-parse', 'https://www.npmjs.com/package/git-parse'}
null
npm
GHSA-6xvq-2gj8-4276
Cross site scripting in valine
valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15.
{'CVE-2020-28847'}
2022-04-15T03:05:55Z
2022-04-06T00:01:29Z
MODERATE
null
{'CWE-79'}
{'https://github.com/xCss/Valine/releases/tag/v1.4.15', 'https://github.com/xCss/Valine', 'https://github.com/xCss/Valine/issues/348', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28847'}
null
npm
GHSA-rf54-44jr-q5vf
Improper Input Validation in url-js
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
{'CVE-2022-25839'}
2022-03-28T22:33:07Z
2022-03-12T00:00:26Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030', 'https://github.com/duzun/URL.js'}
null
npm
GHSA-4x37-5rh2-hp8c
Hijacked Environment Variables in node-opencv
The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16067'}
2020-08-31T18:25:43Z
2018-08-29T23:50:59Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/506', 'https://nodesecurity.io/advisories/506', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16067', 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c'}
null
npm
GHSA-j7j5-752x-wr4v
Downloads Resources over HTTP in xd-testing
Affected versions of `xd-testing` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `xd-testing`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10653'}
2021-01-08T18:36:50Z
2019-02-18T23:45:21Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10653', 'https://www.npmjs.com/advisories/257', 'https://nodesecurity.io/advisories/257', 'https://github.com/advisories/GHSA-j7j5-752x-wr4v'}
null
npm
GHSA-f246-xrrj-g8j6
Cross-site Scripting in markdown-it-highlightjs
This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = md() .use(markdownItHighlightjs, { inline: true }) .render('console.log(42){.">js}'); console.log(reuslt_xss);
{'CVE-2020-7773'}
2022-02-10T20:19:47Z
2022-02-10T20:19:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7773', 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461', 'https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14'}
null
npm
GHSA-x9p2-fxq6-2m5f
Reverse Tabnapping in swagger-ui
Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks. ## Recommendation Upgrade to version 3.18.0 or later.
null
2021-08-16T23:44:47Z
2019-06-20T14:33:07Z
MODERATE
null
{'CWE-1022'}
{'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://www.npmjs.com/advisories/975', 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}
null
npm
GHSA-934x-72xh-5hrg
OS command injection in aws-lambda
In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName".
{'CVE-2019-10777'}
2021-08-19T17:15:08Z
2020-02-14T23:09:45Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10777', 'https://github.com/awspilot/cli-lambda-deploy', 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839'}
null
npm
GHSA-jcpv-g9rr-qxrc
Regular Expression Denial of Service in hawk
Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's. ## Recommendation Update to hawk version 4.1.1 or later.
{'CVE-2016-2515'}
2021-09-14T19:39:20Z
2018-07-31T22:52:00Z
HIGH
null
null
{'http://www.openwall.com/lists/oss-security/2016/02/20/1', 'https://github.com/hueniverse/hawk/issues/168', 'https://github.com/hueniverse/hawk', 'https://nodesecurity.io/advisories/77', 'http://www.openwall.com/lists/oss-security/2016/02/20/2', 'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://www.npmjs.com/advisories/77', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'}
null
npm
GHSA-p6vg-p826-qp3v
URL Redirection to Untrusted Site ('Open Redirect') in fastify-static
### Impact A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`. The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`. ### Patches The issue has been patched in `fastify-static@4.2.4` ### Workarounds If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option. ### References + Bug founder: drstrnegth + [hackerone Report](https://hackerone.com/reports/1354255) ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-static](https://github.com/fastify/fastify-static) * Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
{'CVE-2021-22963'}
2021-10-21T15:01:19Z
2021-10-05T20:24:49Z
MODERATE
null
{'CWE-601'}
{'https://hackerone.com/reports/1354255', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963', 'https://github.com/fastify/fastify-static'}
null
npm
GHSA-3fx5-fwvr-xrjg
Regular Expression Denial of Service in ms
Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Proof of Concept ```javascript var ms = require('ms'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } ms(genstr(process.argv[2], "5") + " minutea"); ``` ### Results Showing increase in execution time based on the input string. ``` $ time node ms.js 10000 real 0m0.758s user 0m0.724s sys 0m0.031s $ time node ms.js 20000 real 0m2.580s user 0m2.494s sys 0m0.047s $ time node ms.js 30000 real 0m5.747s user 0m5.483s sys 0m0.080s $ time node ms.js 80000 real 0m41.022s user 0m38.894s sys 0m0.529s ```
{'CVE-2015-8315'}
2021-09-22T20:19:52Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-400'}
{'http://www.securityfocus.com/bid/96389', 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&amp;utm_medium=RSS', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315', 'https://www.npmjs.com/advisories/46', 'https://github.com/unshiftio/millisecond/', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-6rv4-4qv6-88g2
Prototype Pollution in set-or-get
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25913'}
2021-04-12T17:39:01Z
2021-04-12T17:39:19Z
CRITICAL
null
{'CWE-1321'}
{'https://www.npmjs.com/package/set-or-get', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913'}
null
npm
GHSA-cqv6-7fwc-8m3c
Directory Traversal in xtalk
Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL. ## Proof of Concept ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:localhost ``` ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.
{'CVE-2017-16091'}
2021-01-07T23:32:04Z
2020-09-01T16:44:59Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/339', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091', 'https://nodesecurity.io/advisories/339'}
null
npm
GHSA-84g3-cv89-m9gm
Prototype pollution vulnerability in 'patchmerge'
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25916'}
2021-10-06T22:34:42Z
2021-10-13T15:33:20Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916', 'https://github.com/pjshumphreys/patchmerge', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916'}
null
npm
GHSA-25pr-6pr6-68v7
Path traversal in atlasboard
The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.
{'CVE-2021-39109'}
2021-09-02T16:35:00Z
2021-09-02T17:17:25Z
HIGH
null
{'CWE-22'}
{'https://bitbucket.org/atlassian/atlasboard/pull-requests/91/buildeng-19379-apply-only-the-path', 'https://bitbucket.org/atlassian/atlasboard/src/master/', 'https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39109'}
null
npm
GHSA-jh5w-6964-x5cf
Downloads Resources over HTTP in chromedriver
Affected versions of `chromedriver` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one. ## Recommendation Update to version 2.26.1 or later.
{'CVE-2016-10579'}
2020-08-31T18:12:58Z
2019-02-18T23:58:05Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10579', 'https://nodesecurity.io/advisories/160', 'https://www.npmjs.com/advisories/160', 'https://github.com/advisories/GHSA-jh5w-6964-x5cf'}
null
npm
GHSA-pgcr-7wm4-mcv6
Sensitive Data Exposure in pem
Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system. ## Recommendation Update to version 1.13.2 or later.
null
2021-08-04T21:28:00Z
2019-06-04T15:42:45Z
CRITICAL
null
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://www.npmjs.com/advisories/723', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb', 'https://github.com/Dexus/pem/pull/217'}
null
npm
GHSA-37vc-gwvp-6cgv
Malicious Package in bitcoijns-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:39:59Z
2020-09-04T15:42:49Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1362'}
null
npm
GHSA-76p6-gpvf-6wmv
Directory Traversal in hftp
Affected versions of `hftp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16039'}
2020-08-31T18:21:15Z
2018-07-24T15:50:28Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/384', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16039', 'https://github.com/advisories/GHSA-76p6-gpvf-6wmv', 'https://www.npmjs.com/advisories/384'}
null
npm
GHSA-pr8j-3v7m-j4vv
Directory Traversal in myprolyz
Affected versions of `myprolyz` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16156'}
2020-08-31T18:21:19Z
2020-09-01T17:21:45Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/386', 'https://www.npmjs.com/advisories/386', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16156', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz'}
null
npm
GHSA-5pxj-mhwj-x5gv
Prototype Pollution in asciitable.js
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
{'CVE-2020-7771'}
2021-04-06T23:32:45Z
2021-04-13T15:24:59Z
CRITICAL
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771', 'https://github.com/victornpb/asciitable.js/pull/1'}
null
npm
GHSA-2q6w-rxf3-4wc9
Malicious Package in codify
Version 0.3.1 of `codify` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.3.1 of this module is found installed you will want to replace it with a version before or after 0.3.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T16:54:22Z
2020-09-01T19:49:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/620', 'https://snyk.io/vuln/SNYK-JS-CODIFY-451005', 'https://github.com/bozuko/codify'}
null
npm
GHSA-cxm3-v4mv-6mh8
Cross-site Scripting in vditor
vditor does not filter user input
{'CVE-2021-4103'}
2022-01-28T21:55:58Z
2022-01-28T22:04:11Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Vanessa219/vditor/issues/1133', 'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d', 'https://github.com/vanessa219/vditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103'}
null
npm
GHSA-g9wg-wq4f-2x5w
Cross-Site Scripting in console-feed
Versions of `console-feed` prior to 2.8.10 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape the rendered output. If an application uses `console-feed` and a malicious JavaScript payload was passed to a `console.log('%_', payload)` call, the package would render HTML containing the malicious payload. ## Recommendation Upgrade to version 2.8.10 or later.
null
2020-08-31T18:46:53Z
2020-09-03T19:00:10Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1088'}
null
npm
GHSA-vwr2-wj63-86gr
Path Traversal in simplehttpserver
All versions of `simplehttpserver` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL. ## Recommendation No fix is currently available. Do not use `simplehttpserver` in production or consider using an alternative module until a fix is made available.
{'CVE-2018-16478'}
2021-09-16T21:00:54Z
2018-12-06T15:49:10Z
MODERATE
null
{'CWE-22', 'CWE-12'}
{'https://github.com/advisories/GHSA-vwr2-wj63-86gr', 'https://github.com/tikonen/blog/tree/master/simplehttpserver', 'https://hackerone.com/reports/403703', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16478', 'https://www.npmjs.com/advisories/744'}
null
npm
GHSA-8mrf-64fw-2x75
Command injection in fs-path
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
{'CVE-2020-8298'}
2021-03-25T21:05:18Z
2021-03-25T21:06:41Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7', 'https://github.com/pillys/fs-path/pull/6', 'https://hackerone.com/reports/324491', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298'}
null
npm
GHSA-fpgg-r39h-3x5x
Malicious Package in cxt
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:00:43Z
2020-09-03T17:06:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1392'}
null
npm
GHSA-2958-5r4r-wvv6
Directory Traversal in caolilinode
Affected versions of `caolilinode` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16159'}
2020-08-31T18:21:39Z
2020-09-01T17:27:05Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16159', 'https://nodesecurity.io/advisories/394', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode', 'https://www.npmjs.com/advisories/394'}
null
npm
GHSA-xfhh-g9f5-x4m4
Resource exhaustion in socket.io-parser
The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
{'CVE-2020-36049'}
2021-06-30T16:53:56Z
2021-06-30T16:51:31Z
HIGH
null
{'CWE-400'}
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/socket.io-parser/releases/tag/3.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36049', 'https://www.npmjs.com/package/socket.io-parser', 'https://blog.caller.xyz/socketio-engineio-dos/'}
null
npm
GHSA-36m4-6v6m-4vpr
Cross-site Scripting in remarkable
In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL.
{'CVE-2019-12043'}
2021-08-04T14:53:46Z
2019-05-29T18:04:55Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12043', 'https://github.com/jonschlinkert/remarkable/issues/332'}
null
npm
GHSA-wgw3-gf4p-62xc
Command Injection in wizard-syncronizer
All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:42:46Z
2020-09-11T21:16:59Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/977'}
null
npm
GHSA-qw9c-8p76-3q2x
Directory Traversal in serve46
Affected versions of `serve46` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16148'}
2020-08-31T18:23:51Z
2020-09-01T18:49:11Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16148', 'https://nodesecurity.io/advisories/456', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46', 'https://www.npmjs.com/advisories/456'}
null
npm
GHSA-8g7p-74h8-hg48
Denial of Service in https-proxy-agent
Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`. ## Recommendation Update to version 2.2.0 or later.
{'CVE-2018-3739'}
2021-09-07T19:45:18Z
2018-07-27T17:04:52Z
CRITICAL
null
{'CWE-400', 'CWE-125'}
{'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://github.com/TooTallNate/node-https-proxy-agent', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://www.npmjs.com/advisories/593', 'https://hackerone.com/reports/319532', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}
null
npm
GHSA-h8mc-42c3-r72p
Downloads resources over HTTP in hubl-server
Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`. ## Recommendation No patch is currently available for this vulnerability, and it has not seen any updates since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
{'CVE-2017-16035'}
2021-01-08T18:42:16Z
2018-07-24T15:40:47Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-h8mc-42c3-r72p', 'https://nodesecurity.io/advisories/334', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035', 'https://www.npmjs.com/advisories/334'}
null
npm
GHSA-qxg5-2qff-p49r
Passing in a non-string 'html' argument can lead to unsanitized output
A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. ### Impact XSS ### Patches `3.2.0` ### Workarounds Ensure that the `html` parameter is a string before calling the function.
{'CVE-2021-32696'}
2021-06-18T19:31:21Z
2021-06-18T19:31:35Z
MODERATE
null
{'CWE-241', 'CWE-79', 'CWE-843'}
{'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r', 'https://www.npmjs.com/package/striptags', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0'}
null
npm
GHSA-8864-rhmw-5m6f
Cross-Site Scripting in status-board
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderDashboard()` function concatenates the `safeDashboard` variable to the printed error message with insufficient sanitization. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15479'}
2021-08-17T22:31:16Z
2019-09-23T18:32:42Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15479', 'https://github.com/jameswlane/status-board/pull/948', 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460295', 'https://www.npmjs.com/advisories/1150'}
null
npm
GHSA-38hx-3542-8fh3
Malicious code in `electorn`
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information: - IP and IP-based geolocation - home directory name - local username The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
null
2020-10-01T17:09:44Z
2020-10-01T17:09:56Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1562'}
null
npm
GHSA-fq77-7p7r-83rj
Directory Traversal in Next.js
### Impact - **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected - **Not affected**: Deployments using the `serverless` target - **Not affected**: Deployments using `next export` - **Affected**: Users of Next.js below 9.3.2 We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. ### Patches https://github.com/zeit/next.js/releases/tag/v9.3.2 ### References https://github.com/zeit/next.js/releases/tag/v9.3.2
{'CVE-2020-5284'}
2021-01-08T20:24:23Z
2020-03-30T20:40:50Z
MODERATE
null
{'CWE-23'}
{'https://github.com/zeit/next.js/releases/tag/v9.3.2', 'https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj', 'https://www.npmjs.com/advisories/1503', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5284'}
null
npm
GHSA-8v63-cqqc-6r2c
Prototype Pollution in object-path
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3805'}
2021-09-20T20:13:12Z
2021-09-20T20:46:43Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://github.com/mariocasciaro/object-path', 'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
null
npm
GHSA-w7q9-p3jq-fmhm
Uncontrolled resource consumption in jpeg-js
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
{'CVE-2020-8175'}
2020-07-27T15:48:40Z
2020-07-27T15:46:57Z
MODERATE
null
{'CWE-400'}
{'https://hackerone.com/reports/842462', 'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'}
null
npm
GHSA-h5vm-jhq7-w647
Malicious Package in momen
All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:01:26Z
2020-09-02T20:17:13Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/849'}
null
npm
GHSA-h47j-hc6x-h3qq
Remote Code Execution Vulnerability in NPM mongo-express
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') ``` ### Patches Users should upgrade to version `0.54.0` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References [Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215) [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758) ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) #### Thanks @JLLeitschuh for finding and reporting this vulnerability
{'CVE-2019-10758'}
2019-12-30T19:29:02Z
2019-12-30T19:30:31Z
HIGH
null
null
{'https://github.com/mongo-express/mongo-express/pull/522', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}
null
npm
GHSA-4g88-fppr-53pp
Prototype Pollution in set-value
Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation If you are using `set-value` 3.x, upgrade to version 3.0.1 or later. If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.
{'CVE-2019-10747'}
2021-08-17T22:17:11Z
2019-08-27T17:43:33Z
CRITICAL
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1012', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/', 'https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-450213', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10747'}
null
npm
GHSA-4xc9-xhrj-v574
Prototype Pollution in lodash
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.17.11 or later.
{'CVE-2018-16487'}
2020-08-31T18:35:33Z
2019-02-07T18:16:48Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/782', 'https://github.com/advisories/GHSA-4xc9-xhrj-v574', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16487', 'https://hackerone.com/reports/380873', 'https://security.netapp.com/advisory/ntap-20190919-0004/'}
null
npm
GHSA-pjh3-jv7w-9jpr
Command Injection in gm
Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary. ## Recommendation Update to version 1.21.1 or later.
{'CVE-2015-7982'}
2021-09-23T21:23:47Z
2020-09-01T15:18:55Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://github.com/aheckmann/gm', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982', 'https://www.npmjs.com/advisories/54'}
null
npm
GHSA-86gv-xpwv-jprc
Malicious Package in diamond-clien
All versions of `diamond-clien` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:33:54Z
2020-09-03T17:36:00Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1052'}
null
npm
GHSA-fp82-2h99-3fpp
Prototype Pollution in async merge-object
The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.
{'CVE-2018-3753'}
2022-04-26T20:44:24Z
2018-09-18T13:47:24Z
CRITICAL
null
{'CWE-20', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3753', 'https://hackerone.com/reports/310706'}
null
npm
GHSA-3p22-ghq8-v749
Renderers can obtain access to random bluetooth device without permission in Electron
### Impact This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the attacker would have no way of selecting a specific device. All current stable versions of Electron are affected. ### Patches This has been patched and the following Electron versions contain the fix: * `17.0.0-alpha.6` * `16.0.6` * `15.3.5` * `14.2.4` * `13.6.6` ### Workarounds Adding this code to your app can workaround the issue. ```js app.on('web-contents-created', (event, webContents) => { webContents.on('select-bluetooth-device', (event, devices, callback) => { // Prevent default behavior event.preventDefault(); // Cancel the request callback(''); }); }); ``` For more information If you have any questions or comments about this advisory, email us at security@electronjs.org.
{'CVE-2022-21718'}
2022-03-22T18:49:36Z
2022-03-22T18:49:36Z
LOW
null
{'CWE-668'}
{'https://github.com/electron/electron', 'https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21718', 'https://github.com/electron/electron/pull/32178', 'https://github.com/electron/electron/pull/32240'}
null