ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-3hvm-hgpw-rx4j
|
Path Traversal in knightjs
|
All versions of `knightjs` are vulnerable to Path Traversal.
This vulnerability allows an attacker to read content of arbitrary files on the server due to lack of input validation.
## Recommendation
As there is currently no fix for this module we recommend not using this module in production environments.
|
{'CVE-2018-16475'}
|
2020-08-31T18:34:11Z
|
2018-11-06T23:11:10Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16475', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://hackerone.com/reports/403707', 'https://github.com/advisories/GHSA-3hvm-hgpw-rx4j', 'https://www.npmjs.com/advisories/743'}
| null |
npm
|
GHSA-prv2-xwr7-hr57
|
Uncontrolled Resource Consumption in rdf-graph-array
|
rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype.
|
{'CVE-2019-10798'}
|
2021-04-08T20:19:06Z
|
2021-04-13T15:23:21Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211', 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}
| null |
npm
|
GHSA-56pc-6jqp-xqj8
|
Context isolation bypass in Electron
|
### Impact
Apps using both `contextIsolation` and `sandbox: true` are affected.
Apps using both `contextIsolation` and `nativeWindowOpen: true` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `11.0.0-beta.6`
* `10.1.2`
* `9.3.1`
* `8.5.2`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org)
|
{'CVE-2020-15215'}
|
2021-01-07T22:51:36Z
|
2020-10-06T17:46:40Z
|
LOW
| null |
{'CWE-668', 'CWE-693'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15215', 'https://github.com/electron/electron/security/advisories/GHSA-56pc-6jqp-xqj8'}
| null |
npm
|
GHSA-5v9h-q3gj-c32x
|
SQL Injection via GeoJSON in sequelize
|
Affected versions of `sequelize` are vulnerable to SQL Injection in Models that have fields with the `GEOMETRY` DataType. This vulnerability occurs because single quotes in document values are not escaped for GeoJSON documents using `ST_GeomFromGeoJSON`, and MySQL GeoJSON documents using `GeomFromText`.
## Recommendation
Update to version 3.23.6 or later.
|
{'CVE-2016-1000225'}
|
2021-09-23T21:29:13Z
|
2020-09-01T15:27:40Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000225', 'https://snyk.io/vuln/npm:sequelize:20160718', 'https://github.com/sequelize/sequelize', 'https://github.com/sequelize/sequelize/issues/6194', 'https://www.npmjs.com/advisories/122'}
| null |
npm
|
GHSA-cxjc-r2fp-7mq6
|
XSS in dijit editor's LinkDialog plugin
|
### Impact
XSS possible for users of the Dijit Editor's LinkDialog plugin
### Patches
Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3
### Workarounds
Users may apply the patch made in these releases.
### For more information
If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/)
|
{'CVE-2020-4051'}
|
2021-01-08T20:11:17Z
|
2020-06-15T21:53:12Z
|
LOW
| null |
{'CWE-79'}
|
{'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051', 'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6'}
| null |
npm
|
GHSA-7375-vjr2-3g7w
|
Cross-Site Scripting in glance
|
Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package.
|
{'CVE-2018-3748'}
|
2021-09-02T19:13:45Z
|
2018-09-27T11:37:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3748', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://github.com/jarofghosts/glance', 'https://hackerone.com/reports/310133'}
| null |
npm
|
GHSA-x2fc-mxcx-w4mf
|
Prototype Pollution in mathjs
|
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.
|
{'CVE-2020-7743'}
|
2021-04-21T19:47:53Z
|
2021-05-10T18:39:04Z
|
HIGH
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://www.npmjs.com/package/mathjs', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743', 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113'}
| null |
npm
|
GHSA-gcv8-gh4r-25x6
|
Authorization Bypass Through User-Controlled Key in urijs
|
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
|
{'CVE-2022-0613'}
|
2022-04-01T18:06:53Z
|
2022-02-17T00:00:35Z
|
MODERATE
| null |
{'CWE-639'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613', 'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://github.com/medialize/uri.js'}
| null |
npm
|
GHSA-4r97-78gf-q24v
|
Prototype Pollution in klona
|
Versions of `klona` prior to 1.1.1 are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype when cloning objects, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 1.1.1 or later.
| null |
2020-08-31T19:00:12Z
|
2020-09-04T17:53:27Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://hackerone.com/reports/778414', 'https://www.npmjs.com/advisories/1463'}
| null |
npm
|
GHSA-cgjx-mwpx-47jv
|
Private Data Disclosure in express-restify-mongoose
|
Affected versions of `express-restify-mongoose` are susceptible to an information leakage vulnerability which may allow an attacker to access fields on a model even if those fields are marked as private.
## Proof of Concept
If you have a user model that you want to protect, such as the following User model:
```
const User = mongoose.model('User', new mongoose.Schema({
name: String,
password: String,
}));
```
You would normally do something such as:
```
restify.serve(router, User, {
private: ['password'], // Set the password part of User as private, so outside people can't read it
})
```
This would hide the password field from people that send your application a `GET /User` and `GET /User/some-user-id` request.
A malicious user can go to your application and send a request for `GET /User?distinct=password` and get all the passwords for all the users in the database, despite the field being set to private. This could be used for other private data, if the malicious user knew what was set as private for specific routes.
## Recommendation
Version 2.x: Update to version 2.5.0 or later.
Version 3.x: Update to version 3.1.0 or later.
|
{'CVE-2016-10533'}
|
2020-08-31T18:10:32Z
|
2018-10-23T17:14:57Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10533', 'https://github.com/advisories/GHSA-cgjx-mwpx-47jv', 'https://github.com/florianholzapfel/express-restify-mongoose/issues/252', 'https://www.npmjs.com/advisories/92', 'https://nodesecurity.io/advisories/92'}
| null |
npm
|
GHSA-m6wh-m8m8-6xx5
|
Exfiltrates data on installation in cofeescript
|
The `cofeescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofeescript` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16202'}
|
2021-01-08T18:30:23Z
|
2018-08-06T20:05:28Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-m6wh-m8m8-6xx5', 'https://www.npmjs.com/advisories/541', 'https://nodesecurity.io/advisories/541', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16202'}
| null |
npm
|
GHSA-4g54-95xv-f353
|
Hijacked Environment Variables in http-proxy.js
|
The `http-proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16075'}
|
2020-08-31T18:26:01Z
|
2018-08-29T23:16:56Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/514', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16075', 'https://github.com/advisories/GHSA-4g54-95xv-f353', 'https://nodesecurity.io/advisories/514'}
| null |
npm
|
GHSA-pw2r-vq6v-hr8c
|
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
|
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
|
{'CVE-2022-0536'}
|
2022-02-14T22:27:56Z
|
2022-02-10T00:00:31Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536', 'https://github.com/follow-redirects/follow-redirects'}
| null |
npm
|
GHSA-388g-jwpg-x6j4
|
Cross-Site Scripting in swagger-ui
|
Versions of `swagger-ui` prior to 3.0.13 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize YAML files imported from URLs or copied-pasted. This may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 3.0.13 or later.
| null |
2021-09-28T17:00:22Z
|
2020-09-11T21:20:14Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449941', 'https://www.npmjs.com/advisories/985', 'https://github.com/swagger-api/swagger-ui/issues/3163', 'https://github.com/swagger-api/swagger-ui'}
| null |
npm
|
GHSA-8qm2-24qc-c4qg
|
Malicious Package in freshdom
|
Version 0.0.6 of `freshdom` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.6 of this module is found installed you will want to replace it with a version before or after 0.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T17:32:50Z
|
2020-09-01T19:57:56Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://snyk.io/vuln/SNYK-JS-FRESHDOM-450987', 'https://www.npmjs.com/advisories/627', 'https://github.com/jamiller619/freshdom'}
| null |
npm
|
GHSA-9g9w-hmvj-5h57
|
Prototype Pollution in merge-deep
|
Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 3.0.1 or later.
|
{'CVE-2018-3722'}
|
2020-08-31T18:28:36Z
|
2018-07-26T15:17:15Z
|
LOW
| null |
{'CWE-471'}
|
{'https://hackerone.com/reports/310708', 'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57', 'https://www.npmjs.com/advisories/580'}
| null |
npm
|
GHSA-9j5m-873f-xh76
|
Directory Traversal in static-html-server
|
Affected versions of `static-html-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16152'}
|
2020-08-31T18:20:55Z
|
2018-07-23T20:46:32Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16152', 'https://nodesecurity.io/advisories/376', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server', 'https://www.npmjs.com/advisories/376', 'https://github.com/advisories/GHSA-9j5m-873f-xh76'}
| null |
npm
|
GHSA-xqh8-5j36-4556
|
SQL Injection in connect-pg-simple
|
Versions of `connect-pg-simple` are vulnerable to SQL Injection. The `PGStore.prototype.quotedTable` function allows for the query to be manipulated if the input has double quotes through the `schemaName` or `tableName` variables. These variables are passed to the constructor and are unlikely to be controlled by user-input. If they are controlled by user-input it could allow attackers to execute arbitrary SQL queries.
## Recommendation
Upgrade to version 6.0.1 or later.
|
{'CVE-2019-15658'}
|
2021-09-22T15:15:40Z
|
2019-08-26T16:59:45Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/1153', 'https://github.com/advisories/GHSA-xqh8-5j36-4556', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15658', 'https://github.com/voxpelli/node-connect-pg-simple', 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556', 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'}
| null |
npm
|
GHSA-f5cv-xrv9-r8w7
|
NoSQL injection in express-cart
|
Versions of `express-cart` before 1.1.8 are vulnerable to NoSQL injection.
The vulnerability is caused by the lack of user input sanitization in the login handlers. In both cases, the customer login and the admin login, parameters from the JSON body are sent directly into the MongoDB query which allows to insert operators.
These operators can be used to extract the value of the field blindly in the same manner of a blind SQL injection. In this case, the `$regex` operator is used to guess each character of the token from the start.
## Recommendation
Update to version 1.1.8 or later.
| null |
2021-09-24T20:58:36Z
|
2020-09-01T21:17:16Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/724', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/472.json', 'https://hackerone.com/reports/397445', 'https://github.com/nodejs/security-wg'}
| null |
npm
|
GHSA-9fhw-r42p-5c7r
|
Regular expression Denial of Service in @progfay/scrapbox-parser
|
### Impact
A [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) flaw was found in the @progfay/scrapbox-parser package before 6.0.3, 7.0.2 for Node.js.
The attacker that is able to be parsed a specially crafted text may cause the application to consume an excessive amount of CPU.
### Patches
Upgrade to version 6.0.3, 7.0.2 or later.
### Workarounds
Avoid to parse text with a lot of `[` chars.
### References
* https://github.com/progfay/scrapbox-parser/pull/519
* https://github.com/progfay/scrapbox-parser/pull/539
* https://github.com/progfay/scrapbox-parser/pull/540
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27405
* https://snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/progfay/scrapbox-parser](https://github.com/progfay/scrapbox-parser/issues)
|
{'CVE-2021-27405'}
|
2021-02-26T19:49:07Z
|
2021-03-01T20:44:44Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/progfay/scrapbox-parser/security/advisories/GHSA-9fhw-r42p-5c7r', 'https://security.netapp.com/advisory/ntap-20210326-0002/', 'https://github.com/progfay/scrapbox-parser/pull/540', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27405', 'https://github.com/progfay/scrapbox-parser/pull/539', 'https://github.com/progfay/scrapbox-parser/pull/519'}
| null |
npm
|
GHSA-mmph-wp49-r48h
|
Malicious Package in experss
|
All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:02:46Z
|
2020-09-02T20:20:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/852'}
| null |
npm
|
GHSA-fw76-p9p2-6pvf
|
Malicious Package in serilize
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:28:12Z
|
2020-09-03T19:58:58Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1140'}
| null |
npm
|
GHSA-5mjw-6jrh-hvfq
|
Sandbox Breakout / Arbitrary Code Execution in static-eval
|
Affected versions of `static-eval` pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.
## Proof of concept
```
var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = '(function(){console.log(process.pid)})()';
var ast = parse(src).body[0].expression;
var res = evaluate(ast, {});
// Will print the process id
```
## Recommendation
Update to version 2.0.0 or later.
|
{'CVE-2017-16226'}
|
2020-08-31T18:27:19Z
|
2018-08-06T21:37:06Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/548', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16226', 'https://nodesecurity.io/advisories/548', 'https://github.com/advisories/GHSA-5mjw-6jrh-hvfq', 'https://github.com/substack/static-eval/pull/18', 'https://maustin.net/articles/2017-10/static_eval'}
| null |
npm
|
GHSA-7cg8-pq9v-x98q
|
Sandbox Breakout in realms-shim
|
Versions of `realms-shim` prior to 1.2.1 are vulnerable to a Sandbox Breakout. The Realms evaluation function has an option to apply Babel-like transformations to the source code before it reaches the evaluator. One portion of this transform pipeline exposed a primal-Realm object to the rewriting function. Confined code which used the evaluator itself could provide a malicious rewriter function that captured this object, and use it to breach the sandbox.
## Recommendation
Upgrade to version 1.2.1 or later.
| null |
2021-09-02T21:14:19Z
|
2019-10-21T21:58:55Z
|
CRITICAL
| null | null |
{'https://github.com/advisories/GHSA-7cg8-pq9v-x98q', 'https://github.com/Agoric/realms-shim', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-536069', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-7cg8-pq9v-x98q', 'https://www.npmjs.com/advisories/1218'}
| null |
npm
|
GHSA-3q32-j57w-q4w7
|
Path Traversal in total.js
|
Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths.
The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`.
## Recommendation
- If you are using version 2.1.x, upgrade to 2.1.1 or later.
- If you are using version 2.2.x, upgrade to 2.2.1 or later.
- If you are using version 2.3.x, upgrade to 2.3.1 or later.
- If you are using version 2.4.x, upgrade to 2.4.1 or later.
- If you are using version 2.5.x, upgrade to 2.5.1 or later.
- If you are using version 2.6.x, upgrade to 2.6.3 or later.
- If you are using version 2.7.x, upgrade to 2.7.1 or later.
- If you are using version 2.8.x, upgrade to 2.8.1 or later.
- If you are using version 2.9.x, upgrade to 2.9.5 or later.
- If you are using version 3.0.x, upgrade to 3.0.1 or later.
- If you are using version 3.1.x, upgrade to 3.1.1 or later.
- If you are using version 3.2.x, upgrade to 3.2.4 or later.
|
{'CVE-2019-8903'}
|
2021-08-31T21:22:06Z
|
2019-02-20T15:40:13Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903', 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8903', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework'}
| null |
npm
|
GHSA-q257-vv4p-fg92
|
Header Forgery in http-signature
|
Affected versions of `http-signature` contain a vulnerability which can allow an attacker in a privileged network position to modify header names and change the meaning of the request, without requiring an updated signature.
This problem occurs because vulnerable versions of `http-signature` sign the contents of headers, but not the header names.
## Proof of Concept
Consider this to be the initial, untampered request:
```
POST /pay HTTP/1.1
Host: example.com
Date: Thu, 05 Jan 2012 21:31:40 GMT
X-Payment-Source: src@money.com
X-Payment-Destination: dst@money.com
Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-source x-payment-destination" MDyO5tSvin5...
```
And the request is intercepted and tampered as follows:
```
X-Payment-Source: dst@money.com // Emails switched
X-Payment-Destination: src@money.com
Authorization: Signature keyId="Test",algorithm="rsa-sha256",headers="x-payment-destination x-payment-source" MDyO5tSvin5...
```
In the resulting responses, both requests would pass signature verification without issue.
```
src@money.com\n
dst@money.com\n
```
## Recommendation
Update to version 0.10.0 or higher.
|
{'CVE-2017-16005'}
|
2020-08-31T18:19:06Z
|
2018-11-09T17:49:34Z
|
LOW
| null |
{'CWE-20'}
|
{'https://github.com/joyent/node-http-signature/issues/10', 'https://nodesecurity.io/advisories/318', 'https://github.com/advisories/GHSA-q257-vv4p-fg92', 'https://www.npmjs.com/advisories/318', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16005'}
| null |
npm
|
GHSA-v3wr-67px-44xg
|
Execution with Unnecessary Privileges in arc-electron
|
### Impact
When the end-user click on the response header that contains a link the target will be opened in ARC new window. This window will have the default preload script loaded which allows the scripts embedded in the link target to execute any logic that ARC has access to from the renderer process, which includes file system access, data store access (which may contain sensitive information), and some additional processes that only ARC should have access to.
### Patches
This is patched in version 17.0.9.
### Workarounds
Do not click onto any link in the response headers view.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [advanced-rest-client/arc-electron](https://github.com/advanced-rest-client/arc-electron)
* Email us at [Salesforce Security](mailto:security@salesforce.com)
| null |
2022-03-03T19:11:14Z
|
2022-03-03T19:11:14Z
|
HIGH
| null | null |
{'https://github.com/advanced-rest-client/arc-electron/security/advisories/GHSA-v3wr-67px-44xg', 'https://github.com/advanced-rest-client/arc-electron'}
| null |
npm
|
GHSA-3j9m-hcv9-rpj8
|
XSS vulnerability allowing arbitrary JavaScript execution
|
Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
## CVE-2021-41174 XSS vulnerability on unauthenticated pages
### Summary
CVSS Score: 6.9 Medium
CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L)
We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability.
It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability.
### Impact
If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser.
The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar.
There are two ways an unauthenticated user can open a page in Grafana that contains the login button:
- Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack.
- The link is to an unauthenticated page. The following pages are vulnerable:
- `/dashboard-solo/snapshot/*`
- `/dashboard/snapshot/*`
- `/invite/:code`
The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }}
An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this:
https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1
When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL.
### Attack audit
We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment.
#### Through reverse proxy/load balancer logs
To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks.
#### Through the Grafana Enterprise audit feature
If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code.
### Patched versions
Release 8.2.3:
- [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3)
- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/)
### Solutions and mitigations
Download and install the appropriate patch for your version of Grafana.
[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
### Workaround
If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path.
Example of an Nginx rule to block the literal string `{{`:
```
location ~ \{\{ {
deny all;
}
```
### Timeline and postmortem
Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
* 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability.
* 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2.
* 2021-10-22 02:02 MEDIUM severity declared.
* 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ .
* 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure.
* 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests.
* 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud.
* 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected.
* 2021-10-22 14:05 Grafana Cloud instances updated with a fix.
* 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified.
* 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation.
* 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo.
* 2021-11-03 12:00: Public release.
## Reporting security issues
If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index).
## Security announcements
There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml).
|
{'CVE-2021-41174'}
|
2021-11-29T15:05:31Z
|
2021-11-08T18:13:19Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41174', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana', 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8'}
| null |
npm
|
GHSA-h726-x36v-rx45
|
Prototype Pollution in lodash.merge
|
Versions of `lodash.merge` before 4.6.2 are vulnerable to prototype pollution. The function `merge` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.2 or later.
| null |
2020-08-31T18:46:04Z
|
2020-09-03T18:04:54Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1066'}
| null |
npm
|
GHSA-rrqv-vjrw-hrcr
|
Arbitrary Code Execution in json-ptr
|
There is a security vulnerability in `json-ptr` versions prior to v2.1.0 in which an unscrupulous actor may execute arbitrary code. If your code sends un-sanitized user input to json-ptr's .get() method, your project is vulnerable to this injection-style vulnerability.
| null |
2021-05-26T19:57:10Z
|
2021-05-26T19:59:19Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/flitbit/json-ptr/blob/master/src/util.ts%23L174', 'https://github.com/flitbit/json-ptr/blob/456a1728b45c8663bb1ac20a249c5fb17495ec6b/README.md#security-vulnerability-prior-to-v210', 'https://github.com/418sec/json-ptr/pull/3', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1016939', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038396', 'https://www.npmjs.com/advisories/1706', 'https://www.huntr.dev/bounties/2-npm-json-ptr/', 'https://www.npmjs.com/package/json-ptr'}
| null |
npm
|
GHSA-v73m-fjxv-w4rh
|
Hijacked Environment Variables in fabric-js
|
The `fabric-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16053'}
|
2020-08-31T18:25:01Z
|
2018-07-23T20:50:18Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/487', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16053', 'https://www.npmjs.com/advisories/487', 'https://github.com/advisories/GHSA-v73m-fjxv-w4rh'}
| null |
npm
|
GHSA-3crj-w4f5-gwh4
|
Processing untrusted theming resources might execute arbitrary code (ACE)
|
### Impact
When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process.
While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development.
Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat:
An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files.
This is an example of inline JavaScript in a Less file:
```less
.rule {
@var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`;
color: @var;
}
```
Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3.
Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it:
```less
.rule {
@var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`";
color: @var;
}
```
### Patches
We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork.
This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0)
### Workarounds
Only process trusted theming resources.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/SAP/less-openui5
* Email us at secure@sap.com
|
{'CVE-2021-21316'}
|
2021-02-16T17:35:25Z
|
2021-01-29T20:51:37Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8', 'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://www.npmjs.com/package/less-openui5', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'}
| null |
npm
|
GHSA-q5c4-39f5-m68j
|
Regular Expression Denial of Service in decamelize
|
Affected versions of `decamelize` are susceptible to a denial of service vulnerability when user input is passed directly into `decamelize`.
## Recommendation
Update to version 1.1.2 or later.
|
{'CVE-2017-16023'}
|
2020-08-31T18:18:42Z
|
2018-07-24T20:00:17Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-q5c4-39f5-m68j', 'https://github.com/sindresorhus/decamelize/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16023', 'https://www.npmjs.com/advisories/308', 'https://nodesecurity.io/advisories/308'}
| null |
npm
|
GHSA-p6mc-m468-83gw
|
Prototype Pollution in lodash
|
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays.
This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
|
{'CVE-2020-8203'}
|
2022-02-08T22:04:28Z
|
2020-07-15T19:15:48Z
|
HIGH
| null |
{'CWE-1321', 'CWE-770'}
|
{'https://github.com/lodash/lodash/issues/4744', 'https://github.com/lodash/lodash', 'https://www.npmjs.com/advisories/1523', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/lodash/lodash/issues/4874', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://hackerone.com/reports/712065'}
| null |
npm
|
GHSA-cwx2-736x-mf6w
|
Prototype pollution in object-path
|
### Impact
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable.
### Patches
Upgrade to version >= 0.11.5
### Workarounds
Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
### References
[Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [object-path](https://github.com/mariocasciaro/object-path)
|
{'CVE-2020-15256'}
|
2021-11-19T14:05:56Z
|
2020-10-19T20:55:55Z
|
HIGH
| null |
{'CWE-471', 'CWE-20'}
|
{'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256', 'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://github.com/mariocasciaro/object-path'}
| null |
npm
|
GHSA-p9pm-55vp-2jqw
|
Downloads Resources over HTTP in soci
|
Affected versions of `soci` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `soci`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10669'}
|
2021-01-08T18:21:55Z
|
2019-02-18T23:44:32Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/270', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10669', 'https://github.com/advisories/GHSA-p9pm-55vp-2jqw', 'https://nodesecurity.io/advisories/270'}
| null |
npm
|
GHSA-x949-7cm6-fm6p
|
Code Injection in md-to-pdf.
|
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
|
{'CVE-2021-23639'}
|
2021-12-15T15:22:46Z
|
2021-12-16T14:34:40Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a', 'https://github.com/simonhaenisch/md-to-pdf/issues/99'}
| null |
npm
|
GHSA-x26f-26qw-hhhx
|
Path Traversal in hekto
|
Versions of `hekto` before 0.2.3 are vulnerable to path traversal. This allows a remote attacker to read content of arbitrary files.
## Recommendation
Update to version 0.2.3 or later.
|
{'CVE-2018-3725'}
|
2020-08-31T18:28:51Z
|
2018-07-26T15:22:00Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-x26f-26qw-hhhx', 'https://www.npmjs.com/advisories/586', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3725', 'https://hackerone.com/reports/311218'}
| null |
npm
|
GHSA-p59g-6cqr-m73w
|
Malicious Package in bmap
|
Version 1.0.3 of `bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.3 of this module is found installed you will want to replace it with a version before or after 1.0.3. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-29T20:33:18Z
|
2020-09-03T20:45:27Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1192'}
| null |
npm
|
GHSA-pg97-ww7h-5mjr
|
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo:
* 1.16.1
* 1.15.2
* 1.14.5
* 1.13.6
* 1.12.7
* 1.11.9
Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)
|
{'CVE-2019-10785'}
|
2021-08-19T17:21:06Z
|
2020-02-13T22:21:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/dojo/dojox/pull/315', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}
| null |
npm
|
GHSA-3949-f494-cm99
|
Cross-site Scripting in Prism
|
### Impact
Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code.
Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted.
### Patches
This bug has been fixed in v1.27.0.
### Workarounds
Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin.
### References
- https://github.com/PrismJS/prism/pull/3341
|
{'CVE-2022-23647'}
|
2022-02-22T19:32:18Z
|
2022-02-22T19:32:18Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/PrismJS/prism/pull/3341', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism', 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99'}
| null |
npm
|
GHSA-rph7-j9qr-h8q8
|
Potential Command Injection in codem-transcode
|
When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution.
### Mitigating Factors:
The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default.
## Recommendation
An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade..
|
{'CVE-2013-7377'}
|
2021-09-17T19:23:32Z
|
2017-11-28T22:20:17Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/2', 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://nodesecurity.io/advisories/codem-transcode_command_injection'}
| null |
npm
|
GHSA-xx4c-jj58-r7x6
|
Inefficient Regular Expression Complexity in Validator.js
|
### Impact
Versions of `validator` prior to 13.7.0 are affected by an inefficient Regular Expression complexity when using the `rtrim` and `trim` sanitizers.
### Patches
The problem has been patched in validator 13.7.0
| null |
2021-11-08T21:27:48Z
|
2021-11-19T20:14:23Z
|
MODERATE
| null |
{'CWE-1333'}
|
{'https://github.com/validatorjs/validator.js', 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/', 'https://github.com/validatorjs/validator.js/issues/1599', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js/pull/1738', 'https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6'}
| null |
npm
|
GHSA-8w9j-6wg6-qv4f
|
Malicious Package in axioss
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:13:23Z
|
2020-09-03T19:41:17Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1124'}
| null |
npm
|
GHSA-m273-wwfv-h6jp
|
Directory Traversal in fancy-server
|
Versions 0.1.4 and earlier of fancy-server are vulnerable to a directory traversal attack.
Standard attack vectors such as `../` will allow an attacker to read files outside of the served directory.
## Recommendation
Upgrade to version 0.1.4 or greater.
|
{'CVE-2014-10066'}
|
2020-08-31T18:07:38Z
|
2020-08-31T22:44:33Z
|
HIGH
| null |
{'CWE-22'}
|
{'http://en.wikipedia.org/wiki/Directory_traversal_attack', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10066', 'https://nodesecurity.io/advisories/9', 'https://www.npmjs.com/advisories/9'}
| null |
npm
|
GHSA-7r28-3m3f-r2pr
|
Regular Expression Denial of Service (ReDoS)
|
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
|
{'CVE-2021-28092'}
|
2021-03-25T00:18:05Z
|
2021-03-19T21:25:50Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/sindresorhus/is-svg/releases', 'https://www.npmjs.com/package/is-svg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}
| null |
npm
|
GHSA-563h-49v8-g7x4
|
Malicious Package in ks-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T16:10:30Z
|
2020-09-03T23:17:01Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1297'}
| null |
npm
|
GHSA-9hqj-38j2-5jgm
|
Command Injection in ascii-art
|
Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command.
Example Proof of concept:
`ascii-art preview 'doom"; touch /tmp/malicious; echo "'`
Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`.
## Recommendation
Update to version 1.4.4 or later.
| null |
2020-08-31T18:33:35Z
|
2020-09-01T21:19:23Z
|
LOW
| null |
{'CWE-77'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json', 'https://hackerone.com/reports/390631', 'https://www.npmjs.com/advisories/727'}
| null |
npm
|
GHSA-4x6x-782q-jfc4
|
Command Injection in node-wifi
|
Versions of `node-wifi` prior to 2.0.12 are vulnerable to Command Injection. The package fails to sanitize user input, allowing attackers to inject commands through the `ssid` variable and possibly achieving Remote Code Execution on the system.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:41:45Z
|
2020-09-03T02:38:47Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/952'}
| null |
npm
|
GHSA-pp7m-6j83-m7r6
|
Cross-site Scripting in video.js
|
This affects the package video.js before 7.14.3.
The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
|
{'CVE-2021-23414'}
|
2021-08-31T21:01:29Z
|
2021-08-10T16:09:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588', 'https://github.com/videojs/video.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429'}
| null |
npm
|
GHSA-q9q6-f556-gpm7
|
Improper Verification of Cryptographic Signature in starkbank-ecdsa
|
The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
|
{'CVE-2021-43571'}
|
2021-11-15T14:44:13Z
|
2021-11-10T20:58:42Z
|
CRITICAL
| null |
{'CWE-347'}
|
{'https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43571', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-node'}
| null |
npm
|
GHSA-cfhg-9x44-78h2
|
Command Injection in ps
|
Versions of `ps` before 1.0.0 are vulnerable to command injection.
Proof of concept:
```
var ps = require('ps');
ps.lookup({ pid: "$(touch success.txt)" }, function(err, proc) { // this method is vulnerable to command injection
if (err) {throw err;}
if (proc) {
console.log(proc); // Process name, something like "node" or "bash"
} else {
console.log('No such process');
}
});
// Result: The file success.txt will exist on the filesystem if the touch command was executed
```
## Recommendation
Update to version 1.0.0 or later.
|
{'CVE-2018-16460'}
|
2020-08-31T18:33:37Z
|
2018-09-17T20:43:59Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16460', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json', 'https://hackerone.com/reports/390848', 'https://github.com/advisories/GHSA-cfhg-9x44-78h2', 'https://www.npmjs.com/advisories/728'}
| null |
npm
|
GHSA-m744-2jj8-vpfv
|
Command injection in git-parse
|
The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
|
{'CVE-2021-26543'}
|
2022-02-10T23:51:16Z
|
2022-02-10T23:51:16Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26543', 'https://github.com/wayfair/git-parse', 'https://www.npmjs.com/package/git-parse'}
| null |
npm
|
GHSA-6xvq-2gj8-4276
|
Cross site scripting in valine
|
valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15.
|
{'CVE-2020-28847'}
|
2022-04-15T03:05:55Z
|
2022-04-06T00:01:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/xCss/Valine/releases/tag/v1.4.15', 'https://github.com/xCss/Valine', 'https://github.com/xCss/Valine/issues/348', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28847'}
| null |
npm
|
GHSA-rf54-44jr-q5vf
|
Improper Input Validation in url-js
|
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
|
{'CVE-2022-25839'}
|
2022-03-28T22:33:07Z
|
2022-03-12T00:00:26Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030', 'https://github.com/duzun/URL.js'}
| null |
npm
|
GHSA-4x37-5rh2-hp8c
|
Hijacked Environment Variables in node-opencv
|
The `node-opencv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16067'}
|
2020-08-31T18:25:43Z
|
2018-08-29T23:50:59Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/506', 'https://nodesecurity.io/advisories/506', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16067', 'https://github.com/advisories/GHSA-4x37-5rh2-hp8c'}
| null |
npm
|
GHSA-j7j5-752x-wr4v
|
Downloads Resources over HTTP in xd-testing
|
Affected versions of `xd-testing` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `xd-testing`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10653'}
|
2021-01-08T18:36:50Z
|
2019-02-18T23:45:21Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10653', 'https://www.npmjs.com/advisories/257', 'https://nodesecurity.io/advisories/257', 'https://github.com/advisories/GHSA-j7j5-752x-wr4v'}
| null |
npm
|
GHSA-f246-xrrj-g8j6
|
Cross-site Scripting in markdown-it-highlightjs
|
This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = md() .use(markdownItHighlightjs, { inline: true }) .render('console.log(42){.">js}'); console.log(reuslt_xss);
|
{'CVE-2020-7773'}
|
2022-02-10T20:19:47Z
|
2022-02-10T20:19:47Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7773', 'https://snyk.io/vuln/SNYK-JS-MARKDOWNITHIGHLIGHTJS-1040461', 'https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14'}
| null |
npm
|
GHSA-x9p2-fxq6-2m5f
|
Reverse Tabnapping in swagger-ui
|
Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks.
## Recommendation
Upgrade to version 3.18.0 or later.
| null |
2021-08-16T23:44:47Z
|
2019-06-20T14:33:07Z
|
MODERATE
| null |
{'CWE-1022'}
|
{'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://www.npmjs.com/advisories/975', 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}
| null |
npm
|
GHSA-934x-72xh-5hrg
|
OS command injection in aws-lambda
|
In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName".
|
{'CVE-2019-10777'}
|
2021-08-19T17:15:08Z
|
2020-02-14T23:09:45Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10777', 'https://github.com/awspilot/cli-lambda-deploy', 'https://snyk.io/vuln/SNYK-JS-AWSLAMBDA-540839'}
| null |
npm
|
GHSA-jcpv-g9rr-qxrc
|
Regular Expression Denial of Service in hawk
|
Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's.
## Recommendation
Update to hawk version 4.1.1 or later.
|
{'CVE-2016-2515'}
|
2021-09-14T19:39:20Z
|
2018-07-31T22:52:00Z
|
HIGH
| null | null |
{'http://www.openwall.com/lists/oss-security/2016/02/20/1', 'https://github.com/hueniverse/hawk/issues/168', 'https://github.com/hueniverse/hawk', 'https://nodesecurity.io/advisories/77', 'http://www.openwall.com/lists/oss-security/2016/02/20/2', 'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://www.npmjs.com/advisories/77', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'}
| null |
npm
|
GHSA-p6vg-p826-qp3v
|
URL Redirection to Untrusted Site ('Open Redirect') in fastify-static
|
### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`.
The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
### Patches
The issue has been patched in `fastify-static@4.2.4`
### Workarounds
If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
### References
+ Bug founder: drstrnegth
+ [hackerone Report](https://hackerone.com/reports/1354255)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
|
{'CVE-2021-22963'}
|
2021-10-21T15:01:19Z
|
2021-10-05T20:24:49Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://hackerone.com/reports/1354255', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963', 'https://github.com/fastify/fastify-static'}
| null |
npm
|
GHSA-3fx5-fwvr-xrjg
|
Regular Expression Denial of Service in ms
|
Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Proof of Concept
```javascript
var ms = require('ms');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
ms(genstr(process.argv[2], "5") + " minutea");
```
### Results
Showing increase in execution time based on the input string.
```
$ time node ms.js 10000
real 0m0.758s
user 0m0.724s
sys 0m0.031s
$ time node ms.js 20000
real 0m2.580s
user 0m2.494s
sys 0m0.047s
$ time node ms.js 30000
real 0m5.747s
user 0m5.483s
sys 0m0.080s
$ time node ms.js 80000
real 0m41.022s
user 0m38.894s
sys 0m0.529s
```
|
{'CVE-2015-8315'}
|
2021-09-22T20:19:52Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-400'}
|
{'http://www.securityfocus.com/bid/96389', 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315', 'https://www.npmjs.com/advisories/46', 'https://github.com/unshiftio/millisecond/', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-6rv4-4qv6-88g2
|
Prototype Pollution in set-or-get
|
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25913'}
|
2021-04-12T17:39:01Z
|
2021-04-12T17:39:19Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/package/set-or-get', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913'}
| null |
npm
|
GHSA-cqv6-7fwc-8m3c
|
Directory Traversal in xtalk
|
Affected versions of `xtalk` are vulnerable to directory traversal, allowing access to the filesystem by placing "../" in the URL.
## Proof of Concept
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:localhost
```
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, and using a different, functionally equivalent package.
|
{'CVE-2017-16091'}
|
2021-01-07T23:32:04Z
|
2020-09-01T16:44:59Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/339', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16091', 'https://nodesecurity.io/advisories/339'}
| null |
npm
|
GHSA-84g3-cv89-m9gm
|
Prototype pollution vulnerability in 'patchmerge'
|
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25916'}
|
2021-10-06T22:34:42Z
|
2021-10-13T15:33:20Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916', 'https://github.com/pjshumphreys/patchmerge', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916'}
| null |
npm
|
GHSA-25pr-6pr6-68v7
|
Path traversal in atlasboard
|
The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.
|
{'CVE-2021-39109'}
|
2021-09-02T16:35:00Z
|
2021-09-02T17:17:25Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://bitbucket.org/atlassian/atlasboard/pull-requests/91/buildeng-19379-apply-only-the-path', 'https://bitbucket.org/atlassian/atlasboard/src/master/', 'https://bitbucket.org/atlassian/atlasboard/commits/9c03df09f09399e2601010466e8ba3a28236eb9c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39109'}
| null |
npm
|
GHSA-jh5w-6964-x5cf
|
Downloads Resources over HTTP in chromedriver
|
Affected versions of `chromedriver` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one.
## Recommendation
Update to version 2.26.1 or later.
|
{'CVE-2016-10579'}
|
2020-08-31T18:12:58Z
|
2019-02-18T23:58:05Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10579', 'https://nodesecurity.io/advisories/160', 'https://www.npmjs.com/advisories/160', 'https://github.com/advisories/GHSA-jh5w-6964-x5cf'}
| null |
npm
|
GHSA-pgcr-7wm4-mcv6
|
Sensitive Data Exposure in pem
|
Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used.
The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system.
## Recommendation
Update to version 1.13.2 or later.
| null |
2021-08-04T21:28:00Z
|
2019-06-04T15:42:45Z
|
CRITICAL
| null |
{'CWE-200'}
|
{'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://www.npmjs.com/advisories/723', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb', 'https://github.com/Dexus/pem/pull/217'}
| null |
npm
|
GHSA-37vc-gwvp-6cgv
|
Malicious Package in bitcoijns-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:39:59Z
|
2020-09-04T15:42:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1362'}
| null |
npm
|
GHSA-76p6-gpvf-6wmv
|
Directory Traversal in hftp
|
Affected versions of `hftp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16039'}
|
2020-08-31T18:21:15Z
|
2018-07-24T15:50:28Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/384', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/hftp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16039', 'https://github.com/advisories/GHSA-76p6-gpvf-6wmv', 'https://www.npmjs.com/advisories/384'}
| null |
npm
|
GHSA-pr8j-3v7m-j4vv
|
Directory Traversal in myprolyz
|
Affected versions of `myprolyz` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16156'}
|
2020-08-31T18:21:19Z
|
2020-09-01T17:21:45Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/386', 'https://www.npmjs.com/advisories/386', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16156', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/myprolyz'}
| null |
npm
|
GHSA-5pxj-mhwj-x5gv
|
Prototype Pollution in asciitable.js
|
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
|
{'CVE-2020-7771'}
|
2021-04-06T23:32:45Z
|
2021-04-13T15:24:59Z
|
CRITICAL
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771', 'https://github.com/victornpb/asciitable.js/pull/1'}
| null |
npm
|
GHSA-2q6w-rxf3-4wc9
|
Malicious Package in codify
|
Version 0.3.1 of `codify` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.3.1 of this module is found installed you will want to replace it with a version before or after 0.3.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T16:54:22Z
|
2020-09-01T19:49:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/620', 'https://snyk.io/vuln/SNYK-JS-CODIFY-451005', 'https://github.com/bozuko/codify'}
| null |
npm
|
GHSA-cxm3-v4mv-6mh8
|
Cross-site Scripting in vditor
|
vditor does not filter user input
|
{'CVE-2021-4103'}
|
2022-01-28T21:55:58Z
|
2022-01-28T22:04:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/Vanessa219/vditor/issues/1133', 'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d', 'https://github.com/vanessa219/vditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103'}
| null |
npm
|
GHSA-g9wg-wq4f-2x5w
|
Cross-Site Scripting in console-feed
|
Versions of `console-feed` prior to 2.8.10 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape the rendered output. If an application uses `console-feed` and a malicious JavaScript payload was passed to a `console.log('%_', payload)` call, the package would render HTML containing the malicious payload.
## Recommendation
Upgrade to version 2.8.10 or later.
| null |
2020-08-31T18:46:53Z
|
2020-09-03T19:00:10Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1088'}
| null |
npm
|
GHSA-vwr2-wj63-86gr
|
Path Traversal in simplehttpserver
|
All versions of `simplehttpserver` are vulnerable to Path Traversal.
This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL.
## Recommendation
No fix is currently available. Do not use `simplehttpserver` in production or consider using an alternative module until a fix is made available.
|
{'CVE-2018-16478'}
|
2021-09-16T21:00:54Z
|
2018-12-06T15:49:10Z
|
MODERATE
| null |
{'CWE-22', 'CWE-12'}
|
{'https://github.com/advisories/GHSA-vwr2-wj63-86gr', 'https://github.com/tikonen/blog/tree/master/simplehttpserver', 'https://hackerone.com/reports/403703', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16478', 'https://www.npmjs.com/advisories/744'}
| null |
npm
|
GHSA-8mrf-64fw-2x75
|
Command injection in fs-path
|
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
|
{'CVE-2020-8298'}
|
2021-03-25T21:05:18Z
|
2021-03-25T21:06:41Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7', 'https://github.com/pillys/fs-path/pull/6', 'https://hackerone.com/reports/324491', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298'}
| null |
npm
|
GHSA-fpgg-r39h-3x5x
|
Malicious Package in cxt
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:00:43Z
|
2020-09-03T17:06:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1392'}
| null |
npm
|
GHSA-2958-5r4r-wvv6
|
Directory Traversal in caolilinode
|
Affected versions of `caolilinode` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16159'}
|
2020-08-31T18:21:39Z
|
2020-09-01T17:27:05Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16159', 'https://nodesecurity.io/advisories/394', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/caolilinode', 'https://www.npmjs.com/advisories/394'}
| null |
npm
|
GHSA-xfhh-g9f5-x4m4
|
Resource exhaustion in socket.io-parser
|
The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
|
{'CVE-2020-36049'}
|
2021-06-30T16:53:56Z
|
2021-06-30T16:51:31Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/socket.io-parser/releases/tag/3.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36049', 'https://www.npmjs.com/package/socket.io-parser', 'https://blog.caller.xyz/socketio-engineio-dos/'}
| null |
npm
|
GHSA-36m4-6v6m-4vpr
|
Cross-site Scripting in remarkable
|
In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \x0ejavascript: URL.
|
{'CVE-2019-12043'}
|
2021-08-04T14:53:46Z
|
2019-05-29T18:04:55Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12043', 'https://github.com/jonschlinkert/remarkable/issues/332'}
| null |
npm
|
GHSA-wgw3-gf4p-62xc
|
Command Injection in wizard-syncronizer
|
All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:42:46Z
|
2020-09-11T21:16:59Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/977'}
| null |
npm
|
GHSA-qw9c-8p76-3q2x
|
Directory Traversal in serve46
|
Affected versions of `serve46` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16148'}
|
2020-08-31T18:23:51Z
|
2020-09-01T18:49:11Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16148', 'https://nodesecurity.io/advisories/456', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serve46', 'https://www.npmjs.com/advisories/456'}
| null |
npm
|
GHSA-8g7p-74h8-hg48
|
Denial of Service in https-proxy-agent
|
Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`.
## Recommendation
Update to version 2.2.0 or later.
|
{'CVE-2018-3739'}
|
2021-09-07T19:45:18Z
|
2018-07-27T17:04:52Z
|
CRITICAL
| null |
{'CWE-400', 'CWE-125'}
|
{'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://github.com/TooTallNate/node-https-proxy-agent', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://www.npmjs.com/advisories/593', 'https://hackerone.com/reports/319532', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}
| null |
npm
|
GHSA-h8mc-42c3-r72p
|
Downloads resources over HTTP in hubl-server
|
Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`.
## Recommendation
No patch is currently available for this vulnerability, and it has not seen any updates since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo
|
{'CVE-2017-16035'}
|
2021-01-08T18:42:16Z
|
2018-07-24T15:40:47Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-h8mc-42c3-r72p', 'https://nodesecurity.io/advisories/334', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16035', 'https://www.npmjs.com/advisories/334'}
| null |
npm
|
GHSA-qxg5-2qff-p49r
|
Passing in a non-string 'html' argument can lead to unsanitized output
|
A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function.
### Impact
XSS
### Patches
`3.2.0`
### Workarounds
Ensure that the `html` parameter is a string before calling the function.
|
{'CVE-2021-32696'}
|
2021-06-18T19:31:21Z
|
2021-06-18T19:31:35Z
|
MODERATE
| null |
{'CWE-241', 'CWE-79', 'CWE-843'}
|
{'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r', 'https://www.npmjs.com/package/striptags', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32696', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0'}
| null |
npm
|
GHSA-8864-rhmw-5m6f
|
Cross-Site Scripting in status-board
|
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderDashboard()` function concatenates the `safeDashboard` variable to the printed error message with insufficient sanitization. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15479'}
|
2021-08-17T22:31:16Z
|
2019-09-23T18:32:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15479', 'https://github.com/jameswlane/status-board/pull/948', 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460295', 'https://www.npmjs.com/advisories/1150'}
| null |
npm
|
GHSA-38hx-3542-8fh3
|
Malicious code in `electorn`
|
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:
- IP and IP-based geolocation
- home directory name
- local username
The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
| null |
2020-10-01T17:09:44Z
|
2020-10-01T17:09:56Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1562'}
| null |
npm
|
GHSA-fq77-7p7r-83rj
|
Directory Traversal in Next.js
|
### Impact
- **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected
- **Not affected**: Deployments using the `serverless` target
- **Not affected**: Deployments using `next export`
- **Affected**: Users of Next.js below 9.3.2
We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
### Patches
https://github.com/zeit/next.js/releases/tag/v9.3.2
### References
https://github.com/zeit/next.js/releases/tag/v9.3.2
|
{'CVE-2020-5284'}
|
2021-01-08T20:24:23Z
|
2020-03-30T20:40:50Z
|
MODERATE
| null |
{'CWE-23'}
|
{'https://github.com/zeit/next.js/releases/tag/v9.3.2', 'https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj', 'https://www.npmjs.com/advisories/1503', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5284'}
| null |
npm
|
GHSA-8v63-cqqc-6r2c
|
Prototype Pollution in object-path
|
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3805'}
|
2021-09-20T20:13:12Z
|
2021-09-20T20:46:43Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://github.com/mariocasciaro/object-path', 'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
| null |
npm
|
GHSA-w7q9-p3jq-fmhm
|
Uncontrolled resource consumption in jpeg-js
|
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
|
{'CVE-2020-8175'}
|
2020-07-27T15:48:40Z
|
2020-07-27T15:46:57Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://hackerone.com/reports/842462', 'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'}
| null |
npm
|
GHSA-h5vm-jhq7-w647
|
Malicious Package in momen
|
All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:01:26Z
|
2020-09-02T20:17:13Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/849'}
| null |
npm
|
GHSA-h47j-hc6x-h3qq
|
Remote Code Execution Vulnerability in NPM mongo-express
|
### Impact
Remote code execution on the host machine by any authenticated user.
### Proof Of Concept
Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator:
```javascript
this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator')
```
### Patches
Users should upgrade to version `0.54.0`
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
[Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215)
[CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
#### Thanks
@JLLeitschuh for finding and reporting this vulnerability
|
{'CVE-2019-10758'}
|
2019-12-30T19:29:02Z
|
2019-12-30T19:30:31Z
|
HIGH
| null | null |
{'https://github.com/mongo-express/mongo-express/pull/522', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}
| null |
npm
|
GHSA-4g88-fppr-53pp
|
Prototype Pollution in set-value
|
Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
If you are using `set-value` 3.x, upgrade to version 3.0.1 or later.
If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.
|
{'CVE-2019-10747'}
|
2021-08-17T22:17:11Z
|
2019-08-27T17:43:33Z
|
CRITICAL
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1012', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/', 'https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-450213', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10747'}
| null |
npm
|
GHSA-4xc9-xhrj-v574
|
Prototype Pollution in lodash
|
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.11 or later.
|
{'CVE-2018-16487'}
|
2020-08-31T18:35:33Z
|
2019-02-07T18:16:48Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/782', 'https://github.com/advisories/GHSA-4xc9-xhrj-v574', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16487', 'https://hackerone.com/reports/380873', 'https://security.netapp.com/advisory/ntap-20190919-0004/'}
| null |
npm
|
GHSA-pjh3-jv7w-9jpr
|
Command Injection in gm
|
Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary.
## Recommendation
Update to version 1.21.1 or later.
|
{'CVE-2015-7982'}
|
2021-09-23T21:23:47Z
|
2020-09-01T15:18:55Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://github.com/aheckmann/gm', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982', 'https://www.npmjs.com/advisories/54'}
| null |
npm
|
GHSA-86gv-xpwv-jprc
|
Malicious Package in diamond-clien
|
All versions of `diamond-clien` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:33:54Z
|
2020-09-03T17:36:00Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1052'}
| null |
npm
|
GHSA-fp82-2h99-3fpp
|
Prototype Pollution in async merge-object
|
The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.
|
{'CVE-2018-3753'}
|
2022-04-26T20:44:24Z
|
2018-09-18T13:47:24Z
|
CRITICAL
| null |
{'CWE-20', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3753', 'https://hackerone.com/reports/310706'}
| null |
npm
|
GHSA-3p22-ghq8-v749
|
Renderers can obtain access to random bluetooth device without permission in Electron
|
### Impact
This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the attacker would have no way of selecting a specific device.
All current stable versions of Electron are affected.
### Patches
This has been patched and the following Electron versions contain the fix:
* `17.0.0-alpha.6`
* `16.0.6`
* `15.3.5`
* `14.2.4`
* `13.6.6`
### Workarounds
Adding this code to your app can workaround the issue.
```js
app.on('web-contents-created', (event, webContents) => {
webContents.on('select-bluetooth-device', (event, devices, callback) => {
// Prevent default behavior
event.preventDefault();
// Cancel the request
callback('');
});
});
```
For more information
If you have any questions or comments about this advisory, email us at security@electronjs.org.
|
{'CVE-2022-21718'}
|
2022-03-22T18:49:36Z
|
2022-03-22T18:49:36Z
|
LOW
| null |
{'CWE-668'}
|
{'https://github.com/electron/electron', 'https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21718', 'https://github.com/electron/electron/pull/32178', 'https://github.com/electron/electron/pull/32240'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.