ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-wpq7-q8j4-72jg
Auth0-js bypasses CSRF checks
The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it's missing from the authorization response, leaving the client vulnerable to CSRF attacks.
{'CVE-2018-7307'}
2022-04-25T22:40:41Z
2018-03-07T22:22:24Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7307', 'https://github.com/advisories/GHSA-wpq7-q8j4-72jg', 'https://auth0.com/docs/security/bulletins/cve-2018-7307'}
null
npm
GHSA-4fc4-4p5g-6w89
Cross-site Scripting in CKEditor4
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.18.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse ([@kevinbackhouse](https://github.com/kevinbackhouse)) for recognizing and reporting this vulnerability.
{'CVE-2022-24728'}
2022-03-30T20:05:59Z
2022-03-16T22:47:55Z
MODERATE
null
{'CWE-79'}
{'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728', 'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://www.drupal.org/sa-core-2022-005', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-3x9f-74h4-2fqr
Denial of Service in SheetJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).
{'CVE-2021-32012'}
2022-03-03T05:14:20.253129Z
2021-07-22T19:48:17Z
MODERATE
null
{'CWE-400'}
{'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32012', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
npm
GHSA-h2j3-gg8w-4858
Malicious Package in buffer-xos
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:12:39Z
2020-09-03T22:12:09Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1251'}
null
npm
GHSA-49rv-g7w5-m8xx
Cross-Site Scripting in @novnc/novnc
Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`. ## Recommendation Upgrade to version 0.6.2 or later.
{'CVE-2017-18635'}
2021-09-23T19:08:01Z
2020-08-28T21:24:59Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ShielderSec/cve-2017-18635', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html', 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/', 'https://usn.ubuntu.com/4522-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18635', 'https://github.com/novnc/noVNC/releases/tag/v0.6.2', 'https://www.npmjs.com/advisories/1204', 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136', 'https://bugs.launchpad.net/horizon/+bug/1656435', 'https://github.com/novnc/noVNC', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://github.com/novnc/noVNC/issues/748'}
null
npm
GHSA-2jm5-2cqf-6vw9
Malicious Package in baes-x
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:29:19Z
2020-09-04T15:30:32Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1351'}
null
npm
GHSA-m5ch-gx8g-rg73
Remote Code Execution in pomelo-monitor
All versions of `pomelo-monitor` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:34:39Z
2020-09-02T15:43:53Z
HIGH
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/756'}
null
npm
GHSA-2m53-83f3-562j
Prototype pollution in min-dash < 3.8.1
### Impact The `set` method is vulnerable to prototype pollution with specially crafted inputs. ```javascript // insert the following into poc.js and run node poc,js (after installing the package) let parser = require("min-dash"); parser.set({}, [["__proto__"], "polluted"], "success"); console.log(polluted); ``` ### Patches `min-dash>=3.8.1` fix the issue. ### Workarounds No workarounds exist for the issue. ### References Closed via https://github.com/bpmn-io/min-dash/pull/21. ### Credits Credits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly.
null
2022-01-27T23:11:40Z
2022-02-01T00:44:35Z
HIGH
null
{'CWE-1321'}
{'https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j', 'https://github.com/bpmn-io/min-dash'}
null
npm
GHSA-xg68-chx2-253g
Prototype Pollution in jquery-deparam
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam allows a malicious user to inject properties into Object.prototype.
{'CVE-2021-20087'}
2021-05-20T21:58:11Z
2021-05-24T19:53:01Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20087', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md'}
null
npm
GHSA-pm44-7gw9-6g8p
Directory Traversal in uekw1511server
Affected versions of `uekw1511server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16185'}
2020-08-31T18:23:37Z
2020-09-01T18:28:08Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16185', 'https://www.npmjs.com/advisories/450', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server', 'https://nodesecurity.io/advisories/450'}
null
npm
GHSA-w6xj-45gv-fw35
Malicious Package in stream-combine
Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue. ## Recommendation This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen.
null
2020-08-31T18:35:17Z
2020-09-02T15:57:06Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/774'}
null
npm
GHSA-xwg4-93c6-3h42
Directory Traversal in send
Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`. ## Recommendation Update to version 0.8.4 or later.
{'CVE-2014-6394'}
2021-09-22T17:58:56Z
2017-10-24T18:33:36Z
LOW
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/send-directory-traversal', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727', 'http://www.openwall.com/lists/oss-security/2014/09/24/1', 'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263', 'http://www.openwall.com/lists/oss-security/2014/09/30/10', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'http://secunia.com/advisories/62170', 'http://www.securityfocus.com/bid/70100', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html', 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063', 'https://github.com/visionmedia/send/pull/59', 'https://support.apple.com/HT205217', 'https://github.com/visionmedia/send', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'https://www.npmjs.com/advisories/32'}
null
npm
GHSA-v5vg-g7rq-363w
Prototype Pollution in json-pointer
This affects all versions of package `json-pointer`, up to and including `0.6.1`. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.
{'CVE-2021-23820'}
2021-11-08T17:40:17Z
2021-11-08T17:40:49Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://github.com/manuelstofer/json-pointer', 'https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23820', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287'}
null
npm
GHSA-r5cq-9537-9rpf
Prototype Pollution in mixme
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
{'CVE-2021-28860'}
2021-12-13T21:33:52Z
2022-02-10T23:52:01Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/adaltas/node-mixme/issues/1', 'https://security.netapp.com/advisory/ntap-20210618-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://www.npmjs.com/~david', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'http://nodejs.com', 'https://github.com/adaltas/node-mixme'}
null
npm
GHSA-7r9x-hr76-jr96
Command Injection in giting
All versions of `gitting` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `pull` function is vulnerable through the `branch` variable. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:59:37Z
2020-09-04T17:26:18Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1446'}
null
npm
GHSA-gm29-35c7-8cfw
Cross-Site Scripting in buttle
All versions of `buttle` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5422'}
2020-08-31T18:43:56Z
2019-04-08T15:18:38Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5422', 'https://hackerone.com/reports/331110', 'https://www.npmjs.com/advisories/667', 'https://www.npmjs.com/advisories/1009', 'https://github.com/advisories/GHSA-gm29-35c7-8cfw', 'https://hackerone.com/reports/331032'}
null
npm
GHSA-7c7g-72q7-4xhm
Prototype pollution vulnerability in 'deepref'
Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28274'}
2021-10-08T22:15:48Z
2021-10-12T16:27:35Z
CRITICAL
null
null
{'https://github.com/isaymatato/deepref', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}
null
npm
GHSA-9534-h433-2rjf
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify
utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10808'}
2021-07-28T18:40:29Z
2021-05-07T16:28:47Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
null
npm
GHSA-w8fh-pvq2-x8c4
Malicious npm package: sonatype
The npm `sonatype` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-01-29T18:10:59Z
2021-01-29T18:11:20Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1596', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}
null
npm
GHSA-3329-pjwv-fjpg
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. Example URL: `https://expected-example.com\@observed-example.com` Escaped string: `https://expected-example.com\\@observed-example.com` (JavaScript strings must escape backslash) Affected versions incorrectly return `observed-example.com`. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html). ### Patches Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant. ### References https://github.com/medialize/URI.js/releases/tag/v1.19.4 (complete fix for this bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.3 (partial fix for this bypass) [PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling) ### For more information If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js ### Reporter credit [Alesandro Ortiz](https://AlesandroOrtiz.com)
{'CVE-2020-26291'}
2021-01-08T20:55:21Z
2020-12-30T23:40:48Z
MODERATE
null
{'CWE-20'}
{'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155', 'https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/package/urijs', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://www.npmjs.com/advisories/1595'}
null
npm
GHSA-vgrx-w6rg-8fqf
Forgeable Public/Private Tokens in jwt-simple
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 0.3.1 or later. Additionally, be sure to always specify an algorithm in calls to `.decode()`.
{'CVE-2016-10555'}
2020-08-31T18:10:20Z
2018-11-06T23:12:07Z
CRITICAL
null
{'CWE-20'}
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97', 'https://github.com/hokaccha/node-jwt-simple/pull/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555', 'https://github.com/hokaccha/node-jwt-simple/pull/16', 'https://nodesecurity.io/advisories/87', 'https://www.npmjs.com/advisories/87'}
null
npm
GHSA-v6vv-hhqc-6hh2
Malicious Package in pyramid-proportion
Version 1.0.5 of `pyramid-proportion` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:29Z
2020-09-03T19:15:37Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1106'}
null
npm
GHSA-qjvf-rmwg-64fr
Downloads Resources over HTTP in install-g-test
Affected versions of `install-g-test` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10630'}
2021-01-08T01:58:29Z
2019-02-18T23:47:20Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10630', 'https://nodesecurity.io/advisories/228', 'https://www.npmjs.com/advisories/228', 'https://github.com/advisories/GHSA-qjvf-rmwg-64fr'}
null
npm
GHSA-76xq-58hj-vwm2
Malicious Package in test-module-a
All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking, ## Recommendation Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
null
2021-09-30T22:06:07Z
2020-09-11T21:16:59Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/929'}
null
npm
GHSA-7x7c-qm48-pq9c
Cross-site Scripting in karma
karma prior to version 6.3.14 contains a cross-site scripting vulnerability.
{'CVE-2022-0437'}
2022-02-11T19:59:48Z
2022-02-06T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0437', 'https://github.com/karma-runner/karma/', 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a', 'https://github.com/karma-runner/karma/releases/tag/v6.3.14'}
null
npm
GHSA-8hj4-w233-g35q
Downloads Resources over HTTP in react-native-baidu-voice-synthesizer
Affected versions of `react-native-baidu-voice-synthesizer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `react-native-baidu-voice-synthesizer`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10697'}
2021-01-08T19:09:27Z
2018-07-31T22:47:16Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/302', 'https://www.npmjs.com/advisories/302', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10697', 'https://github.com/advisories/GHSA-8hj4-w233-g35q'}
null
npm
GHSA-chqj-j4fh-rw7m
Cross-Site Scripting in dompurify
Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of `<svg>`/`<math>` elements and `</p>`/`</br>`. An example payload is: `<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.0.3 or later. You may also disallow `<svg>` and `<math>` through `dompurify` configurations: ```DOMPurify.sanitize(input, { FORBID_TAGS: ['svg', 'math'] });```
{'CVE-2019-16728'}
2020-08-31T18:51:06Z
2020-08-28T21:25:11Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16728', 'https://research.securitum.com/dompurify-bypass-using-mxss/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://www.npmjs.com/advisories/1205'}
null
npm
GHSA-c3x7-gjmx-r2ff
Open Redirect in serve-static
Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory. ## Proof of Concept A link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e` Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect. ## Recommendation Version 1.7.x: Update to version 1.7.2 or later. Version 1.6.x: Update to version 1.6.5 or later.
{'CVE-2015-1164'}
2021-09-23T20:59:30Z
2020-08-31T22:57:02Z
LOW
null
{'CWE-601'}
{'https://snyk.io/vuln/npm:serve-static:20150113', 'https://github.com/expressjs/serve-static/issues/26', 'http://www.securityfocus.com/bid/72064', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99936', 'https://github.com/expressjs/serve-static', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1164', 'https://bugzilla.redhat.com/show_bug.cgi?id=1181917', 'https://www.npmjs.com/advisories/35', 'http://nodesecurity.io/advisories/serve-static-open-redirect'}
null
npm
GHSA-g27j-74fp-xfpr
Insecure default value for CORS configuration
### Impact The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed. ### Patches The default values for CORS have been changed in https://github.com/directus/directus/pull/12022 which is released under 9.7.0 ### Workarounds Configure the CORS environment variables to match your project's usage, rather than leaving them at the (permissive) defaults. ### For more information If you have any questions or comments about this advisory: * Open an issue in [directus/directus](https://github.com/directus/directus) * Email us at [security@directus.io](mailto:security@directus.io)
{'CVE-2022-26969'}
2022-04-05T18:31:22Z
2022-04-05T18:31:22Z
HIGH
null
null
{'https://github.com/directus/directus/pull/12022', 'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr', 'https://github.com/directus/directus'}
null
npm
GHSA-c2m4-w5hm-vqjw
Hijacked Environment Variables in crossenv
The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16074'}
2020-08-31T18:25:59Z
2018-08-29T23:05:46Z
MODERATE
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074', 'https://www.npmjs.com/advisories/513', 'https://nodesecurity.io/advisories/513'}
null
npm
GHSA-c722-pv5w-cfg2
Malicious Package in github-jquery-widgets
Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:02Z
2020-09-11T21:20:14Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/933'}
null
npm
GHSA-qm28-7hqv-wg5j
OS Command Injection in ng-packagr
The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.
{'CVE-2020-7735'}
2021-10-05T16:28:05Z
2021-05-07T16:47:32Z
MODERATE
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427', 'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735', 'https://github.com/ng-packagr/ng-packagr'}
null
npm
GHSA-r496-7hgp-53wf
Vulnerability in dump function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36377'}
2022-05-04T03:45:56Z
2021-11-02T15:42:24Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36377', 'https://github.com/shenzhim/aaptjs'}
null
npm
GHSA-2r4h-2ghh-5hpx
Directory Traversal in weather.swlyons
Affected versions of `weather.swlyons` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16110'}
2020-08-31T18:21:02Z
2020-09-01T17:18:33Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/379', 'https://nodesecurity.io/advisories/379', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16110', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons'}
null
npm
GHSA-vwjj-2852-3765
Cross-Site Scripting in forms
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting. ## Recommendation Update to version 1.3.0 or later.
{'CVE-2017-16015'}
2020-08-31T18:12:53Z
2018-11-09T17:46:27Z
MODERATE
null
{'CWE-80'}
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d', 'https://nodesecurity.io/advisories/158', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015', 'https://github.com/advisories/GHSA-vwjj-2852-3765', 'https://www.npmjs.com/advisories/158'}
null
npm
GHSA-v633-x5vv-hqwc
Cross-Site Scripting in serve-index
Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application. ## Recommendation Update to version 1.6.3 or later.
{'CVE-2015-8856'}
2021-09-20T15:12:25Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/96392', 'https://github.com/advisories/GHSA-v633-x5vv-hqwc', 'https://github.com/expressjs/serve-index/issues/28', 'https://github.com/expressjs/serve-index', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856', 'https://nodesecurity.io/advisories/34', 'https://www.npmjs.com/advisories/34', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-53mj-mc38-q894
Remote Memory Exposure in openwhisk
Versions of `openwhisk` before 3.3.1 are vulnerable to remote memory exposure. When a number is passed to `api_key`, affected versions of `openwhisk` allocate an uninitialized buffer and send that over network in Authorization header (base64-encoded). Proof of concept: ```js var openwhisk = require('openwhisk'); var options = { apihost: '127.0.0.1:1433', api_key: USERSUPPLIEDINPUT // number }; var ow = openwhisk(options); ow.actions.invoke({actionName: 'sample'}).then(result => console.log(result)) ``` ## Recommendation Update to version 3.3.1 or later.
null
2021-09-24T14:29:02Z
2020-09-01T19:40:41Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/600', 'https://github.com/openwhisk/openwhisk-client-js', 'https://github.com/openwhisk/openwhisk-client-js/pull/34'}
null
npm
GHSA-gpqq-952q-5327
XSS in the `of` option of the `.position()` util in jquery-ui
### Impact Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code: ```js $( "#element" ).position( { my: "left top", at: "right bottom", of: "<img onerror='window.globalOf=true' src='/404' />", collision: "none" } ); ``` will call the `doEvilThing()` function. ### Patches The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. ### Workarounds A workaround is to not accept the value of the `of` option from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
{'CVE-2021-41184'}
2021-10-27T16:59:45Z
2021-10-26T14:55:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.tenable.com/security/tns-2022-09', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/jquery/jquery-ui', 'https://www.drupal.org/sa-core-2022-001', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327'}
null
npm
GHSA-ff6g-gm92-rf32
Malicious Package in coinstirng
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:58:19Z
2020-09-03T19:42:06Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1383'}
null
npm
GHSA-xfxf-qw26-hr33
Arbitrary command execution in roar-pidusage
This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23380'}
2021-04-19T16:48:06Z
2021-05-06T15:55:43Z
MODERATE
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23380', 'https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103'}
null
npm
GHSA-h3c2-x77c-7pvr
High severity vulnerability that affects git-dummy-commit
A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter.
{'CVE-2018-3785'}
2020-06-16T21:38:34Z
2018-08-21T17:03:33Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3785', 'https://hackerone.com/reports/341710', 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'}
null
npm
GHSA-qmm9-x5gr-4gfm
Open Redirect in hekto
Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename. ## Recommendation Update to version 0.2.4 or later.
{'CVE-2018-3743'}
2020-08-31T18:32:05Z
2018-07-18T21:20:12Z
LOW
null
{'CWE-601'}
{'https://www.npmjs.com/advisories/669', 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46', 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm', 'https://github.com/herber/hekto/pull/3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743', 'https://hackerone.com/reports/320693'}
null
npm
GHSA-2pqj-h3vj-pqgw
Cross-Site Scripting in jquery
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution. ## Proof of Concept ``` $("#log").html( $("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html() ); ``` ## Recommendation Update to version 1.9.0 or later.
{'CVE-2012-6708'}
2022-03-03T05:13:33.982770Z
2020-09-01T16:41:46Z
HIGH
null
{'CWE-79', 'CWE-64'}
{'https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0', 'https://bugs.jquery.com/ticket/6429', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://bugs.jquery.com/ticket/12531', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://snyk.io/vuln/npm:jquery:20120206', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6708', 'http://www.securityfocus.com/bid/102792', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://bugs.jquery.com/ticket/9521', 'https://www.npmjs.com/advisories/329', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16011', 'https://bugs.jquery.com/ticket/11290'}
null
npm
GHSA-r92x-f52r-x54g
regular expression denial of service (ReDoS)
date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.
{'CVE-2020-26289'}
2021-01-07T22:33:12Z
2020-12-24T20:49:02Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1592', 'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a', 'https://www.npmjs.com/package/date-and-time', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26289', 'https://github.com/knowledgecode/date-and-time/security/advisories/GHSA-r92x-f52r-x54g'}
null
npm
GHSA-jp9g-5x75-ccp8
Malicious Package in colro-name
Version 9.0.0 of `colro-name` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:48:24Z
2020-09-02T21:34:30Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/902'}
null
npm
GHSA-m2w9-rm58-mhm9
Downloads Resources over HTTP in node-thulac
Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10640'}
2021-01-08T18:32:04Z
2019-02-18T23:47:06Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10640', 'https://www.npmjs.com/advisories/236', 'https://github.com/advisories/GHSA-m2w9-rm58-mhm9', 'https://nodesecurity.io/advisories/236'}
null
npm
GHSA-j68r-23hj-xf9c
Hijacked Environment Variables in node-openssl
The `node-openssl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16064'}
2020-08-31T18:25:38Z
2018-10-10T17:28:14Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/503', 'https://www.npmjs.com/advisories/503', 'https://github.com/advisories/GHSA-j68r-23hj-xf9c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16064'}
null
npm
GHSA-4cmx-hrq9-c23p
Improper Authorization in aedes
Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`. ## Recommendation Update to version 0.35.1 or later.
{'CVE-2018-3778'}
2020-08-31T18:32:35Z
2018-08-15T20:03:22Z
MODERATE
null
{'CWE-285'}
{'https://github.com/mcollina/aedes/issues/211', 'https://github.com/mcollina/aedes/issues/212', 'https://github.com/advisories/GHSA-4cmx-hrq9-c23p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/457.json', 'https://www.npmjs.com/advisories/682'}
null
npm
GHSA-xh2p-7p87-fhgh
Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode
TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode. The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722). When calculating system's entire collateral, we should also exclude the liquidated trove's surplus collateral, since liquidation closes the trove and makes the surplus collateral claimable by the trove owner. This means, this line of code should look like this: ``` vars.entireSystemColl = vars.entireSystemColl.sub(singleLiquidation.collToSendToSP).sub(singleLiquidation.collSurplus); ``` ### Impact The miscalculated entire collateral is used only to calculate the TCR and check if the system has been able to exit Recovery Mode. The miscalulation only persists temporarily, and within the`batchLiquidateTroves` transaction. Once the transaction completes the TCR and Recovery Mode will be calculated properly again. However, the bug could negatively impact the liquidation throughput and the gas efficiency gains from batching multiple liquidations in a single transaction. In normal situations, the impact of the collateral surplus of a Trove on the global TCR would be tiny. For instance, we have calculated that liquidating a trove with a collateral representing 1% of the total system collateral (so in the order of at least $10M at current values), would lead to an extra 0.53% in the temporary miscalculation of TCR. So for this bug to be meaningful, in such a scenario, the resulting real TCR must be already be very close to the Recovery Mode boundary anyway - i.e. between 149.47% and 150%. The batch liquidation transaction should also be executed with a particular trove ordering to achieve the TCR distortion. When a different trove order for the liquidation transaction is selected, the bug has no impact. In summary, the bug only has a non-negligible impact in a very narrow, specific set of circumstances. The potential effects of the bug after it occurs are: - The next trove in the sequence is not liquidated because the `batchLiquidateTroves` function calculates a premature exit from Recovery Mode. It could be liquidated in a subsequent transaction if the price of Ether doesn’t recover. - The next trove in the sequence has an ICR below 100% and it’s offset against the Stability Pool instead of redistributed among other troves because the function calculates a premature exit from Recovery Mode. For this to happen, the Ether price must have instantly plummeted by more than 10% (otherwise, the trove would have been already liquidated before). - The next trove in the sequence is liquidated while its ICR is over the real TCR: the function calculates the TCR as being slightly too high, and thus can liquidate a trove that has ICR less than the calculated TCR, but greater than the true TCR. This is probably the worst outcome - however it is already possible to achieve the same effect, regardless of the bug. A liquidator can craft a `batchLiquidateTroves` transaction whereby they select troves for liquidation such that the TCR increases and makes a given trove liquidateable. To liquidate trove A, they can order troves such that they first liquidate troves which raise the TCR to between A's ICR and 150%. This is intended and expected behavior. As clearly stated in Liquity documentation, to be completely safe and guarantee immunity from liquidation in Recovery Mode, borrowers should keep their ICR above 150%. We don't believe this bug creates a profitable exploit. Theoretically, and only in a very narrow set of circumstances, a liquidator could try to send a batch liquidation during Recovery Mode that lets the system very temporarily return to Normal Mode earlier than it should. In that case - _and only if the Ether price also happens to suddenly plummet by more than 10%_ - stability providers might take the haircut that should be taken by the borrowers (through redistribution). ### Patches The problem has been patched in the source code but not on mainnet contracts. Liquity protocol is immutable, and this issue is not critical, so it doesn't merit a launch of a new version. ### Bug bounty A reward of $1,000 (the maximum for its category) was awarded to Xiahong (`gaoxh06`) for reporting this bug. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/liquity/dev) * Email us at [security@liquity.org](mailto:security@liquity.org)
null
2021-07-29T20:43:48Z
2021-08-05T16:56:58Z
LOW
null
{'CWE-682'}
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905', 'https://github.com/liquity/dev/security/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722', 'https://www.npmjs.com/package/@liquity/contracts'}
null
npm
GHSA-wg96-3933-j2w5
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting. ## Proof of Concept: `<IMG SRC= onmouseover="alert('XSS');">` produces the following: `<img src="onmouseover="alert('XSS');"" />` This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser. ## Recommendation Update to version 1.2.3 or later.
{'CVE-2017-16017'}
2020-08-31T18:12:46Z
2018-11-09T17:45:55Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16017', 'https://github.com/punkave/sanitize-html/issues/19', 'https://github.com/punkave/sanitize-html/pull/20', 'https://www.npmjs.com/advisories/155', 'https://nodesecurity.io/advisories/155', 'https://github.com/advisories/GHSA-wg96-3933-j2w5'}
null
npm
GHSA-rp2c-jrgp-cvr8
Code injection in plupload
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
{'CVE-2021-23562'}
2021-12-06T22:08:43Z
2021-12-16T15:32:31Z
MODERATE
null
{'CWE-434', 'CWE-75'}
{'https://github.com/moxiecode/plupload', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562', 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb', 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665', 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664'}
null
npm
GHSA-j438-45hc-vjhm
CSRF and DNS Rebinding in Oasis
### Impact _What kind of vulnerability is it? Who is impacted?_ If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_request_forgery) attacks to read/write to vulnerable applications. **There is no evidence that suggests that this has been used in the wild.** ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, 2.15.0. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No. ### References _Are there any links users can visit to find out more?_ No. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fraction/oasis](http://github.com/fraction/oasis) * Email me at [christianbundy@fraction.io](mailto:christianbundy@fraction.io)
{'CVE-2020-11003'}
2021-01-08T20:59:34Z
2020-04-16T03:14:39Z
MODERATE
null
{'CWE-352'}
{'https://github.com/fraction/oasis/security/advisories/GHSA-j438-45hc-vjhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11003'}
null
npm
GHSA-f8rj-4v7g-p5rj
Directory Traversal in jansenstuffpleasework
Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16176'}
2020-08-31T18:24:07Z
2020-09-01T18:53:29Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16176', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework', 'https://www.npmjs.com/advisories/464', 'https://nodesecurity.io/advisories/464'}
null
npm
GHSA-hfj4-96f7-6r5g
Cross-Site Scripting in html-janitor
Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS). This is exploitable if user-controlled data is passed into the modules `clean()` function. ## Recommendation No fix is currently available for this vulnerability. It is recommended to use an alternative module for HTML sanitization.
{'CVE-2017-0931'}
2020-08-31T18:28:26Z
2018-11-09T17:49:11Z
HIGH
null
{'CWE-79'}
{'https://github.com/guardian/html-janitor/issues/34', 'https://hackerone.com/reports/308155', 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g', 'https://www.npmjs.com/advisories/576', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0931'}
null
npm
GHSA-9vp3-7qwq-83r9
Server-Side Request Forgery in FUXA
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.
{'CVE-2021-45851'}
2022-03-25T13:33:46Z
2022-03-17T00:00:48Z
HIGH
null
{'CWE-918'}
{'https://github.com/frangoteam/FUXA', 'https://www.youtube.com/watch?v=JE1Kcq3iJpc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45851'}
null
npm
GHSA-r9cj-xj33-4q42
Malicious Package in buffgr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:56Z
2020-09-03T22:21:54Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1260'}
null
npm
GHSA-4xrw-wvmq-8jmh
OS Command Injection in node-key-sender
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.
{'CVE-2020-7627'}
2021-07-28T22:30:07Z
2022-02-10T23:46:11Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7627', 'https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117,'}
null
npm
GHSA-x2w5-725j-gf2g
Prototype Pollution in convict
An attacker can inject attributes that are used in other components and override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. The problem is patched in `convict@6.2.2`. Users should upgrade to `convict@6.2.2`. There is no way for users to fix or remediate the vulnerability without upgrading.
{'CVE-2022-22143'}
2022-04-20T16:21:03Z
2022-04-20T16:21:03Z
HIGH
null
{'CWE-1321'}
{'https://www.huntr.dev/bounties/1-npm-convict/', 'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569', 'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143', 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g', 'https://github.com/mozilla/node-convict/', 'https://github.com/mozilla/node-convict/pull/384', 'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604', 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2'}
null
npm
GHSA-hcq6-h8v2-r5wm
Server-Side Request Forgery in node-pdf-generator
This affects all versions of package node-pdf-generator up to and including 0.0.6. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
{'CVE-2020-7740'}
2021-04-21T20:52:05Z
2021-05-10T18:38:34Z
HIGH
null
{'CWE-918', 'CWE-20'}
{'https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636', 'https://github.com/darrenhaken/node-pdf-generator/blob/master/index.js%23L29', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7740'}
null
npm
GHSA-fwvp-x5gj-773j
Malicious Package in react-server-native
Version 0.0.7 of `react-server-native` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.7 of this module is found installed you will want to replace it with a version before or after 0.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:44Z
2020-09-01T20:33:10Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/635'}
null
npm
GHSA-xj6q-9hx8-mm7f
Directory Traversal in liuyaserver
Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16170'}
2020-08-31T18:22:10Z
2020-09-01T17:34:34Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16170', 'https://www.npmjs.com/advisories/413', 'https://nodesecurity.io/advisories/413'}
null
npm
GHSA-hf2m-j98r-4fqw
API token verification can be bypassed in NodeBB
### Impact Incorrect logic present in the token verification step unintentionally allowed master token access to the API. ### Patches The vulnerability has been patch as of v1.18.5. ### Workarounds Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade. ### For more information If you have any questions or comments about this advisory: * Email us at [security@nodebb.org](mailto:security@nodebb.org)
{'CVE-2021-43786'}
2021-12-01T15:06:58Z
2021-11-30T22:21:05Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500', 'https://github.com/NodeBB/NodeBB', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43786'}
null
npm
GHSA-v88g-cgmw-v5xw
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
{'CVE-2020-15366'}
2021-05-10T21:23:41Z
2022-02-10T23:30:59Z
MODERATE
null
{'CWE-915'}
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f', 'https://github.com/ajv-validator/ajv/tags', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366', 'https://hackerone.com/bugs?subject=user&report_id=894259', 'https://github.com/ajv-validator/ajv/releases/tag/v6.12.3'}
null
npm
GHSA-xf27-jqwv-gf3r
Unintended Require in larvitbase-api
Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running. ## Recommendation Upgrade to version 0.5.4 or later.
{'CVE-2019-5479'}
2020-08-31T18:47:56Z
2019-09-11T23:03:57Z
MODERATE
null
{'CWE-98'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5479', 'https://hackerone.com/reports/566056', 'https://www.npmjs.com/advisories/1120'}
null
npm
GHSA-xr9h-9m79-x29g
SSRF in Rendertron
Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
{'CVE-2020-8902'}
2021-02-24T06:59:10Z
2021-03-01T19:38:23Z
MODERATE
null
{'CWE-918'}
{'https://www.npmjs.com/package/rendertron', 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8902'}
null
npm
GHSA-p9g3-vpvp-hcj5
Malicious Package in bufber-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:56:22Z
2020-09-03T21:41:55Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1234'}
null
npm
GHSA-322m-p39j-r5m2
Malicious Package in npm-script-demo
The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given. It has been removed from the npm registry. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{'CVE-2017-16128'}
2020-08-31T18:24:48Z
2020-09-01T18:55:37Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/481', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16128', 'https://nodesecurity.io/advisories/481'}
null
npm
GHSA-3fxp-vwxm-2r5p
Command injection in gitlogplus
All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.
{'CVE-2021-23412'}
2021-08-03T18:58:25Z
2021-07-26T21:23:35Z
CRITICAL
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832', 'https://www.npmjs.com/package/gitlogplus', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23412', 'https://hackerone.com/reports/808942'}
null
npm
GHSA-8hmr-w35f-3qgj
Malicious Package in harmlesspackage
Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server. ## Recommendation Remove the package from your environment. There is no evidence of further compromise.
null
2021-09-29T20:46:19Z
2020-09-03T21:07:37Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1199'}
null
npm
GHSA-m6cx-g6qm-p2cx
Arbitrary File Write in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.
{'CVE-2019-16775'}
2021-10-21T21:16:09Z
2019-12-13T15:39:19Z
HIGH
null
{'CWE-61', 'CWE-59'}
{'https://access.redhat.com/errata/RHSA-2020:0573', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://github.com/npm/cli', 'https://access.redhat.com/errata/RHEA-2020:0330', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775', 'https://www.npmjs.com/advisories/1434', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx'}
null
npm
GHSA-jxg6-fhwc-9v9c
Regular Expression Denial of Service (ReDoS) in es6-crawler-detect
This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.
{'CVE-2020-28501'}
2021-03-23T19:29:27Z
2021-04-13T15:19:39Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529', 'https://github.com/JefferyHus/es6-crawler-detect/pull/27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}
null
npm
GHSA-7mg4-w3w5-x5pc
Prototype pollution in json-pointer
This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.
{'CVE-2020-7709'}
2021-04-21T21:10:19Z
2021-05-10T18:37:47Z
MODERATE
null
{'CWE-1321'}
{'https://github.com/manuelstofer/json-pointer/pull/34/files', 'https://www.npmjs.com/package/json-pointer', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7709', 'https://github.com/manuelstofer/json-pointer/pull/34'}
null
npm
GHSA-jxfh-8wgv-vfr2
Prototype pollution in dojo
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
{'CVE-2020-5258'}
2022-02-08T22:06:45Z
2020-03-10T18:03:14Z
HIGH
null
{'CWE-74', 'CWE-94', 'CWE-1321'}
{'https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E', 'https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E', 'https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E', 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/dojo/dojo', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5258'}
null
npm
GHSA-832h-xg76-4gv6
ReDoS in brace-expansion
Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition. ## Proof of Concept ``` var expand = require('brace-expansion'); expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}'); ``` ## Recommendation Update to version 1.1.7 or later.
{'CVE-2017-18077'}
2021-09-03T22:10:24Z
2018-01-29T15:50:46Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-832h-xg76-4gv6', 'https://github.com/juliangruber/brace-expansion', 'https://www.npmjs.com/advisories/338', 'https://github.com/juliangruber/brace-expansion/pull/35', 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077', 'https://bugs.debian.org/862712', 'https://nodesecurity.io/advisories/338', 'https://github.com/juliangruber/brace-expansion/issues/33'}
null
npm
GHSA-3vv5-42wr-m32g
Downloads Resources over HTTP in scala-bin
Affected versions of `scala-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scala-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10627'}
2021-01-08T19:58:45Z
2019-02-18T23:57:00Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-3vv5-42wr-m32g', 'https://www.npmjs.com/advisories/227', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10627', 'https://nodesecurity.io/advisories/227'}
null
npm
GHSA-g68x-vvqq-pvw3
Moderate severity vulnerability that affects ckeditor
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
{'CVE-2018-17960'}
2021-09-10T20:27:12Z
2018-11-21T22:19:50Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-g68x-vvqq-pvw3', 'https://ckeditor.com/cke4/release/CKEditor-4.11.0', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960', 'http://www.securityfocus.com/bid/109205'}
null
npm
GHSA-5jpf-pj32-xx53
Authorization header is not sanitized in an error object in auth0
### Overview Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using `auth0` npm package - You are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentials ### How to fix that? Upgrade to version `2.27.1` ### Will this update impact my users? The fix provided in patch will not affect your users. ### Credit http://github.com/osdiab
{'CVE-2020-15125'}
2021-01-07T23:44:25Z
2020-07-29T16:26:22Z
HIGH
null
{'CWE-209'}
{'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c', 'https://github.com/auth0/node-auth0/pull/507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125', 'https://github.com/auth0/node-auth0/tree/v2.27.1', 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53'}
null
npm
GHSA-m36m-x4c5-rjxj
Silently Runs Cryptocoin Miner in hooka-tools
Affected versions of `hooka-tools` were compromised and modified to silently run a cryptocoin miner in the background. All affected versions have been unpublished from the npm registry. ## Recommendation While this module has been unpublished, some versions may exist in mirrors or caches. Do not install this module, and remove it if found.
null
2020-08-31T18:27:21Z
2020-09-01T19:01:58Z
LOW
null
null
{'https://www.npmjs.com/advisories/549'}
null
npm
GHSA-xcgx-27q5-7634
Malicious Package in commanedr
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:32Z
2020-09-03T19:41:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1388'}
null
npm
GHSA-43ch-2h55-2vj7
Server-Side Request Forgery in private-ip
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.
{'CVE-2020-28360'}
2021-03-29T21:49:55Z
2021-04-13T15:18:17Z
CRITICAL
null
{'CWE-918'}
{'https://johnjhacking.com/blog/cve-2020-28360/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360', 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9', 'https://www.npmjs.com/package/private-ip', 'https://github.com/frenchbread/private-ip'}
null
npm
GHSA-j8hw-49gg-vq3w
Malicious Package in retcodelog
All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:00:58Z
2020-09-03T17:45:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1061'}
null
npm
GHSA-fwx5-5fqj-jv98
Cross-Site Scripting in morris.js
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded. ## Recommendation A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via: ``` npm i morrisjs/morris.js -s ```
{'CVE-2017-16022'}
2020-08-31T18:18:39Z
2018-11-09T17:46:30Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/307', 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022', 'https://nodesecurity.io/advisories/307', 'https://github.com/morrisjs/morris.js/pull/464'}
null
npm
GHSA-xf7w-r453-m56c
Arbitrary File Overwrite in fstream
Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable. ## Recommendation Upgrade to version 1.0.12 or later.
{'CVE-2019-13173'}
2021-08-04T20:12:16Z
2019-05-30T17:19:34Z
HIGH
null
{'CWE-59'}
{'https://usn.ubuntu.com/4123-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html', 'https://www.npmjs.com/advisories/886', 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173'}
null
npm
GHSA-4w88-rjj3-x7wp
Chromium Remote Code Execution in electron
Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled. ## Recommendation Update to electron version 1.7.8 or later.
{'CVE-2017-16151'}
2021-01-08T19:53:10Z
2018-07-24T20:04:23Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16151', 'https://nodesecurity.io/advisories/539', 'https://www.npmjs.com/advisories/539', 'https://github.com/advisories/GHSA-4w88-rjj3-x7wp', 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix', 'https://electronjs.org/blog/chromium-rce-vulnerability'}
null
npm
GHSA-jqvv-r4w3-8f7w
Malicious Package in bictoind-rpc
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:38:02Z
2020-09-04T15:35:00Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1355'}
null
npm
GHSA-hg5q-rj62-c43g
Malicious Package in reqest
All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T21:26:33Z
2020-09-02T21:29:08Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/895'}
null
npm
GHSA-5fjj-cfh2-ghc5
Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport
An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.
{'CVE-2020-8128'}
2021-04-06T22:34:40Z
2021-04-13T15:25:24Z
HIGH
null
{'CWE-829', 'CWE-918'}
{'https://hackerone.com/reports/660565', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128'}
null
npm
GHSA-h44f-769q-j6px
Malicious Package in requet
All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:08:15Z
2020-09-02T20:33:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/864'}
null
npm
GHSA-5947-m4fg-xhqg
Prototype Pollution in lodash.mergewith
Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2020-08-31T18:46:11Z
2020-09-03T18:08:10Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1069'}
null
npm
GHSA-9p64-h5q4-phpm
Remote Code Execution in office-converter
All versions of `office-converter` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:34:44Z
2020-09-02T15:44:58Z
HIGH
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/759'}
null
npm
GHSA-9jm3-5835-537m
Command Injection in apex-publish-static-files
Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method. ## Recommendation Update to version 2.0.1 or later.
{'CVE-2018-16462'}
2020-08-31T18:33:14Z
2018-11-01T14:48:50Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/718', 'https://github.com/advisories/GHSA-9jm3-5835-537m', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json', 'https://hackerone.com/reports/405694', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462'}
null
npm
GHSA-xqp8-w826-hh6x
Crash server with query parameter
### Impact Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. ### Patches Upgrade to Parse Server 4.10.3
{'CVE-2021-39187'}
2021-09-03T20:35:12Z
2021-09-02T16:51:14Z
HIGH
null
{'CWE-74', 'CWE-20', 'CWE-755'}
{'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187', 'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x', 'https://github.com/parse-community/parse-server/releases/tag/4.10.3', 'https://jira.mongodb.org/browse/NODE-3463'}
null
npm
GHSA-gmjw-49p4-pcfm
Prototype poisoning
### Impact The issue is as follows: when `msgpack5` decodes a map containing a key `"__proto__"`, it assigns the decoded value to `__proto__`. As you are no doubt aware, `Object.prototype.__proto__` is an accessor property for the receiver's prototype. If the value corresponding to the key `__proto__` decodes to an object or `null`, `msgpack5` sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example `length`, numeric properties, and `push` et al if `__proto__`'s value decodes to an `Array`); and/or may throw unexpected exceptions when used (for example if the `__proto__` value decodes to a `Map` or `Date`). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. An example: ```js const msgpack5 = require('msgpack5')(); const payload = {}; Object.defineProperty(payload, '__proto__', { value: new Map().set(1, 2), enumerable: true }); const encoded = msgpack5.encode(payload); console.log(encoded); // <Buffer 81 a9 5f 5f 70 72 6f 74 6f 5f 5f 81 01 02> const decoded = msgpack5.decode(encoded); // decoded's prototype has been overwritten console.log(Object.getPrototypeOf(decoded)); // Map(1) { 1 => 2 } console.log(decoded.get); // [Function: get] // decoded appears to most common typechecks to be a Map console.log(decoded instanceof Map); // true console.log(decoded.toString()); // [object Map] console.log(Object.prototype.toString.call(decoded)); // [object Map] console.log(decoded.constructor.name); // Map console.log(Object.getPrototypeOf(decoded).constructor.name); // Map // decoded is not, however, a Map console.log(Object.getPrototypeOf(decoded) === Map.prototype); // false // using decoded as though it were a Map throws try { decoded.get(1); } catch (error) { console.log(error); // TypeError: Method Map.prototype.get called // on incompatible receiver #<Map> } try { decoded.size; } catch (error) { console.log(error); // TypeError: Method get Map.prototype.size // called on incompatible receiver #<Map> } // re-encoding the decoded value throws try { msgpack5.encode(decoded); } catch (error) { console.log(error); // TypeError: Method Map.prototype.entries // called on incompatible receiver #<Map> } ``` This "prototype poisoning" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to `msgpack5` values (though if the victim makes use of custom codecs, anything could be a `msgpack5` value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). ### Patches Versions v5.2.1, v4.5.1, v3.6.1 include the fix. ### Workarounds Always validate incoming data after parsing before doing any processing. ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com)
{'CVE-2021-21368'}
2021-03-12T16:57:44Z
2021-03-12T22:44:17Z
MODERATE
null
{'CWE-915'}
{'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1', 'https://www.npmjs.com/package/msgpack5', 'https://github.com/mcollina/msgpack5/releases/tag/v3.6.1', 'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368', 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm', 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1'}
null
npm
GHSA-236h-rqv8-8q73
GraphQL: Security breach on Viewer query
### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details.
{'CVE-2020-15126'}
2021-01-07T23:46:50Z
2020-07-22T23:06:47Z
HIGH
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15126', 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73', 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
null
npm
GHSA-7wwv-vh3v-89cq
ReDOS vulnerabities: multiple grammars
### Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking) [oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS): > The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time. If are you are using Highlight.js to highlight user-provided data you are possibly vulnerable. On the client-side (in a browser or Electron environment) risks could include lengthy freezes or crashes... On the server-side infinite freezes could occur... effectively preventing users from accessing your app or service (ie, Denial of Service). This is an issue with grammars shipped with the parser (and potentially 3rd party grammars also), not the parser itself. If you are using Highlight.js with any of the following grammars you are vulnerable. If you are using `highlightAuto` to detect the language (and have any of these grammars registered) you are vulnerable. Exponential grammars (C, Perl, JavaScript) are auto-registered when using the common grammar subset/library `require('highlight.js/lib/common')` as of 10.4.0 - see https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@10.4.0/build/highlight.js All versions prior to 10.4.1 are vulnerable, including version 9.18.5. **Grammars with exponential backtracking issues:** - c-like (c, cpp, arduino) - handlebars (htmlbars) - gams - perl - jboss-cli - r - erlang-repl - powershell - routeros - livescript (10.4.0 and 9.18.5 included this fix) - javascript & typescript (10.4.0 included partial fixes) And of course any aliases of those languages have the same issue. ie: `hpp` is no safer than `cpp`. **Grammars with polynomial backtracking issues:** - kotlin - gcode - d - aspectj - moonscript - coffeescript/livescript - csharp - scilab - crystal - elixir - basic - ebnf - ruby - fortran/irpf90 - livecodeserver - yaml - x86asm - dsconfig - markdown - ruleslanguage - xquery - sqf And again: any aliases of those languages have the same issue. ie: `ruby` and `rb` share the same ruby issues. ### Patches - Version 10.4.1 resolves these vulnerabilities. Please upgrade. ### Workarounds / Mitigations - Discontinue use the affected grammars. (or perhaps use only those with poly vs exponential issues) - Attempt cherry-picking the grammar fixes into older versions... - Attempt using newer CDN versions of any affected languages. (ie using an older CDN version of the library with newer CDN grammars). Your mileage may vary. ### References - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue: https://github.com/highlightjs/highlight.js/issues * Email us at [security@highlightjs.com](mailto:security@highlightjs.com)
null
2022-05-03T08:27:45Z
2020-12-04T16:47:20Z
MODERATE
null
{'CWE-400', 'CWE-20'}
{'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c', 'https://www.npmjs.com/package/@highlightjs/cdn-assets', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq'}
null
npm
GHSA-8462-q7x7-g2x4
High severity vulnerability that affects bson
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
{'CVE-2018-13863'}
2021-09-03T22:29:39Z
2018-09-17T20:44:58Z
HIGH
null
{'CWE-400', 'CWE-185'}
{'https://github.com/advisories/GHSA-8462-q7x7-g2x4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863', 'https://snyk.io/vuln/npm:bson:20180225', 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a', 'https://github.com/mongodb/js-bson'}
null
npm
GHSA-7h8x-wmq2-7mff
Command injection in launchpad
All versions of package launchpad are vulnerable to Command Injection via stop.
{'CVE-2021-23330'}
2021-03-22T22:56:57Z
2021-04-13T15:20:20Z
CRITICAL
null
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23330', 'https://github.com/bitovi/launchpad/pull/124', 'https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118'}
null
npm
GHSA-q48g-p5cx-c7c7
Directory Traversal in yzt
Affected versions of `yzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16221'}
2020-08-31T18:22:18Z
2020-09-01T17:36:42Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16221', 'https://www.npmjs.com/advisories/416', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt', 'https://nodesecurity.io/advisories/416'}
null
npm
GHSA-xmh9-rg6f-j3mr
Verification flaw in Solid identity-token-verifier
### Impact #### Severity Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod. #### Summary A verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed. DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP. A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability. ### Patches A new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35 ### Workarounds None ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository. * Email: info@solidproject.org
null
2021-03-10T04:01:48Z
2021-03-12T22:39:01Z
MODERATE
null
{'CWE-290'}
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c', 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr', 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2', 'https://www.npmjs.com/package/@solid/identity-token-verifier'}
null
npm
GHSA-4f9m-pxwh-68hg
Cross-Site Scripting in swagger-ui
Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 3.20.9 or later.
null
2021-09-28T16:57:07Z
2020-09-11T21:20:14Z
MODERATE
null
{'CWE-79'}
{'https://github.com/swagger-api/swagger-ui/pull/5190', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921', 'https://www.npmjs.com/advisories/976', 'https://github.com/swagger-api/swagger-ui'}
null