ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-wpq7-q8j4-72jg
|
Auth0-js bypasses CSRF checks
|
The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it's missing from the authorization response, leaving the client vulnerable to CSRF attacks.
|
{'CVE-2018-7307'}
|
2022-04-25T22:40:41Z
|
2018-03-07T22:22:24Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7307', 'https://github.com/advisories/GHSA-wpq7-q8j4-72jg', 'https://auth0.com/docs/security/bulletins/cve-2018-7307'}
| null |
npm
|
GHSA-4fc4-4p5g-6w89
|
Cross-site Scripting in CKEditor4
|
### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.18.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse ([@kevinbackhouse](https://github.com/kevinbackhouse)) for recognizing and reporting this vulnerability.
|
{'CVE-2022-24728'}
|
2022-03-30T20:05:59Z
|
2022-03-16T22:47:55Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728', 'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://www.drupal.org/sa-core-2022-005', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-3x9f-74h4-2fqr
|
Denial of Service in SheetJS Pro
|
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).
|
{'CVE-2021-32012'}
|
2022-03-03T05:14:20.253129Z
|
2021-07-22T19:48:17Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32012', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
npm
|
GHSA-h2j3-gg8w-4858
|
Malicious Package in buffer-xos
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:12:39Z
|
2020-09-03T22:12:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1251'}
| null |
npm
|
GHSA-49rv-g7w5-m8xx
|
Cross-Site Scripting in @novnc/novnc
|
Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`.
## Recommendation
Upgrade to version 0.6.2 or later.
|
{'CVE-2017-18635'}
|
2021-09-23T19:08:01Z
|
2020-08-28T21:24:59Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/ShielderSec/cve-2017-18635', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html', 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/', 'https://usn.ubuntu.com/4522-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18635', 'https://github.com/novnc/noVNC/releases/tag/v0.6.2', 'https://www.npmjs.com/advisories/1204', 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136', 'https://bugs.launchpad.net/horizon/+bug/1656435', 'https://github.com/novnc/noVNC', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://github.com/novnc/noVNC/issues/748'}
| null |
npm
|
GHSA-2jm5-2cqf-6vw9
|
Malicious Package in baes-x
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:29:19Z
|
2020-09-04T15:30:32Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1351'}
| null |
npm
|
GHSA-m5ch-gx8g-rg73
|
Remote Code Execution in pomelo-monitor
|
All versions of `pomelo-monitor` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:34:39Z
|
2020-09-02T15:43:53Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/756'}
| null |
npm
|
GHSA-2m53-83f3-562j
|
Prototype pollution in min-dash < 3.8.1
|
### Impact
The `set` method is vulnerable to prototype pollution with specially crafted inputs.
```javascript
// insert the following into poc.js and run node poc,js (after installing the package)
let parser = require("min-dash");
parser.set({}, [["__proto__"], "polluted"], "success");
console.log(polluted);
```
### Patches
`min-dash>=3.8.1` fix the issue.
### Workarounds
No workarounds exist for the issue.
### References
Closed via https://github.com/bpmn-io/min-dash/pull/21.
### Credits
Credits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly.
| null |
2022-01-27T23:11:40Z
|
2022-02-01T00:44:35Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j', 'https://github.com/bpmn-io/min-dash'}
| null |
npm
|
GHSA-xg68-chx2-253g
|
Prototype Pollution in jquery-deparam
|
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam allows a malicious user to inject properties into Object.prototype.
|
{'CVE-2021-20087'}
|
2021-05-20T21:58:11Z
|
2021-05-24T19:53:01Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20087', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md'}
| null |
npm
|
GHSA-pm44-7gw9-6g8p
|
Directory Traversal in uekw1511server
|
Affected versions of `uekw1511server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16185'}
|
2020-08-31T18:23:37Z
|
2020-09-01T18:28:08Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16185', 'https://www.npmjs.com/advisories/450', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server', 'https://nodesecurity.io/advisories/450'}
| null |
npm
|
GHSA-w6xj-45gv-fw35
|
Malicious Package in stream-combine
|
Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue.
## Recommendation
This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen.
| null |
2020-08-31T18:35:17Z
|
2020-09-02T15:57:06Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/774'}
| null |
npm
|
GHSA-xwg4-93c6-3h42
|
Directory Traversal in send
|
Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.
For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`.
## Recommendation
Update to version 0.8.4 or later.
|
{'CVE-2014-6394'}
|
2021-09-22T17:58:56Z
|
2017-10-24T18:33:36Z
|
LOW
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/send-directory-traversal', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727', 'http://www.openwall.com/lists/oss-security/2014/09/24/1', 'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263', 'http://www.openwall.com/lists/oss-security/2014/09/30/10', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'http://secunia.com/advisories/62170', 'http://www.securityfocus.com/bid/70100', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html', 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063', 'https://github.com/visionmedia/send/pull/59', 'https://support.apple.com/HT205217', 'https://github.com/visionmedia/send', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'https://www.npmjs.com/advisories/32'}
| null |
npm
|
GHSA-v5vg-g7rq-363w
|
Prototype Pollution in json-pointer
|
This affects all versions of package `json-pointer`, up to and including `0.6.1`. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.
|
{'CVE-2021-23820'}
|
2021-11-08T17:40:17Z
|
2021-11-08T17:40:49Z
|
MODERATE
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/manuelstofer/json-pointer', 'https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23820', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287'}
| null |
npm
|
GHSA-r5cq-9537-9rpf
|
Prototype Pollution in mixme
|
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
|
{'CVE-2021-28860'}
|
2021-12-13T21:33:52Z
|
2022-02-10T23:52:01Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://github.com/adaltas/node-mixme/issues/1', 'https://security.netapp.com/advisory/ntap-20210618-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://www.npmjs.com/~david', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'http://nodejs.com', 'https://github.com/adaltas/node-mixme'}
| null |
npm
|
GHSA-7r9x-hr76-jr96
|
Command Injection in giting
|
All versions of `gitting` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `pull` function is vulnerable through the `branch` variable.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:59:37Z
|
2020-09-04T17:26:18Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1446'}
| null |
npm
|
GHSA-gm29-35c7-8cfw
|
Cross-Site Scripting in buttle
|
All versions of `buttle` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5422'}
|
2020-08-31T18:43:56Z
|
2019-04-08T15:18:38Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5422', 'https://hackerone.com/reports/331110', 'https://www.npmjs.com/advisories/667', 'https://www.npmjs.com/advisories/1009', 'https://github.com/advisories/GHSA-gm29-35c7-8cfw', 'https://hackerone.com/reports/331032'}
| null |
npm
|
GHSA-7c7g-72q7-4xhm
|
Prototype pollution vulnerability in 'deepref'
|
Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28274'}
|
2021-10-08T22:15:48Z
|
2021-10-12T16:27:35Z
|
CRITICAL
| null | null |
{'https://github.com/isaymatato/deepref', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}
| null |
npm
|
GHSA-9534-h433-2rjf
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify
|
utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.
|
{'CVE-2019-10808'}
|
2021-07-28T18:40:29Z
|
2021-05-07T16:28:47Z
|
HIGH
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
| null |
npm
|
GHSA-w8fh-pvq2-x8c4
|
Malicious npm package: sonatype
|
The npm `sonatype` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-01-29T18:10:59Z
|
2021-01-29T18:11:20Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1596', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755'}
| null |
npm
|
GHSA-3329-pjwv-fjpg
|
Hostname spoofing via backslashes in URL
|
### Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect.
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Example URL: `https://expected-example.com\@observed-example.com`
Escaped string: `https://expected-example.com\\@observed-example.com` (JavaScript strings must escape backslash)
Affected versions incorrectly return `observed-example.com`. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html).
### Patches
Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant.
### References
https://github.com/medialize/URI.js/releases/tag/v1.19.4 (complete fix for this bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.3 (partial fix for this bypass)
[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling)
### For more information
If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
### Reporter credit
[Alesandro Ortiz](https://AlesandroOrtiz.com)
|
{'CVE-2020-26291'}
|
2021-01-08T20:55:21Z
|
2020-12-30T23:40:48Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155', 'https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/package/urijs', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://www.npmjs.com/advisories/1595'}
| null |
npm
|
GHSA-vgrx-w6rg-8fqf
|
Forgeable Public/Private Tokens in jwt-simple
|
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 0.3.1 or later.
Additionally, be sure to always specify an algorithm in calls to `.decode()`.
|
{'CVE-2016-10555'}
|
2020-08-31T18:10:20Z
|
2018-11-06T23:12:07Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97', 'https://github.com/hokaccha/node-jwt-simple/pull/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555', 'https://github.com/hokaccha/node-jwt-simple/pull/16', 'https://nodesecurity.io/advisories/87', 'https://www.npmjs.com/advisories/87'}
| null |
npm
|
GHSA-v6vv-hhqc-6hh2
|
Malicious Package in pyramid-proportion
|
Version 1.0.5 of `pyramid-proportion` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:29Z
|
2020-09-03T19:15:37Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1106'}
| null |
npm
|
GHSA-qjvf-rmwg-64fr
|
Downloads Resources over HTTP in install-g-test
|
Affected versions of `install-g-test` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10630'}
|
2021-01-08T01:58:29Z
|
2019-02-18T23:47:20Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10630', 'https://nodesecurity.io/advisories/228', 'https://www.npmjs.com/advisories/228', 'https://github.com/advisories/GHSA-qjvf-rmwg-64fr'}
| null |
npm
|
GHSA-76xq-58hj-vwm2
|
Malicious Package in test-module-a
|
All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
## Recommendation
Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
| null |
2021-09-30T22:06:07Z
|
2020-09-11T21:16:59Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/929'}
| null |
npm
|
GHSA-7x7c-qm48-pq9c
|
Cross-site Scripting in karma
|
karma prior to version 6.3.14 contains a cross-site scripting vulnerability.
|
{'CVE-2022-0437'}
|
2022-02-11T19:59:48Z
|
2022-02-06T00:00:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0437', 'https://github.com/karma-runner/karma/', 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a', 'https://github.com/karma-runner/karma/releases/tag/v6.3.14'}
| null |
npm
|
GHSA-8hj4-w233-g35q
|
Downloads Resources over HTTP in react-native-baidu-voice-synthesizer
|
Affected versions of `react-native-baidu-voice-synthesizer` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `react-native-baidu-voice-synthesizer`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10697'}
|
2021-01-08T19:09:27Z
|
2018-07-31T22:47:16Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/302', 'https://www.npmjs.com/advisories/302', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10697', 'https://github.com/advisories/GHSA-8hj4-w233-g35q'}
| null |
npm
|
GHSA-chqj-j4fh-rw7m
|
Cross-Site Scripting in dompurify
|
Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of `<svg>`/`<math>` elements and `</p>`/`</br>`. An example payload is: `<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.0.3 or later. You may also disallow `<svg>` and `<math>` through `dompurify` configurations:
```DOMPurify.sanitize(input, {
FORBID_TAGS: ['svg', 'math']
});```
|
{'CVE-2019-16728'}
|
2020-08-31T18:51:06Z
|
2020-08-28T21:25:11Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16728', 'https://research.securitum.com/dompurify-bypass-using-mxss/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://www.npmjs.com/advisories/1205'}
| null |
npm
|
GHSA-c3x7-gjmx-r2ff
|
Open Redirect in serve-static
|
Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory.
## Proof of Concept
A link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e`
Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect.
## Recommendation
Version 1.7.x: Update to version 1.7.2 or later.
Version 1.6.x: Update to version 1.6.5 or later.
|
{'CVE-2015-1164'}
|
2021-09-23T20:59:30Z
|
2020-08-31T22:57:02Z
|
LOW
| null |
{'CWE-601'}
|
{'https://snyk.io/vuln/npm:serve-static:20150113', 'https://github.com/expressjs/serve-static/issues/26', 'http://www.securityfocus.com/bid/72064', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99936', 'https://github.com/expressjs/serve-static', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1164', 'https://bugzilla.redhat.com/show_bug.cgi?id=1181917', 'https://www.npmjs.com/advisories/35', 'http://nodesecurity.io/advisories/serve-static-open-redirect'}
| null |
npm
|
GHSA-g27j-74fp-xfpr
|
Insecure default value for CORS configuration
|
### Impact
The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed.
### Patches
The default values for CORS have been changed in https://github.com/directus/directus/pull/12022 which is released under 9.7.0
### Workarounds
Configure the CORS environment variables to match your project's usage, rather than leaving them at the (permissive) defaults.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [directus/directus](https://github.com/directus/directus)
* Email us at [security@directus.io](mailto:security@directus.io)
|
{'CVE-2022-26969'}
|
2022-04-05T18:31:22Z
|
2022-04-05T18:31:22Z
|
HIGH
| null | null |
{'https://github.com/directus/directus/pull/12022', 'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr', 'https://github.com/directus/directus'}
| null |
npm
|
GHSA-c2m4-w5hm-vqjw
|
Hijacked Environment Variables in crossenv
|
The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16074'}
|
2020-08-31T18:25:59Z
|
2018-08-29T23:05:46Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074', 'https://www.npmjs.com/advisories/513', 'https://nodesecurity.io/advisories/513'}
| null |
npm
|
GHSA-c722-pv5w-cfg2
|
Malicious Package in github-jquery-widgets
|
Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:02Z
|
2020-09-11T21:20:14Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/933'}
| null |
npm
|
GHSA-qm28-7hqv-wg5j
|
OS Command Injection in ng-packagr
|
The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.
|
{'CVE-2020-7735'}
|
2021-10-05T16:28:05Z
|
2021-05-07T16:47:32Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427', 'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735', 'https://github.com/ng-packagr/ng-packagr'}
| null |
npm
|
GHSA-r496-7hgp-53wf
|
Vulnerability in dump function leads to arbitrary code execution via filePath parameters
|
aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36377'}
|
2022-05-04T03:45:56Z
|
2021-11-02T15:42:24Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://github.com/shenzhim/aaptjs/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36377', 'https://github.com/shenzhim/aaptjs'}
| null |
npm
|
GHSA-2r4h-2ghh-5hpx
|
Directory Traversal in weather.swlyons
|
Affected versions of `weather.swlyons` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16110'}
|
2020-08-31T18:21:02Z
|
2020-09-01T17:18:33Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/379', 'https://nodesecurity.io/advisories/379', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16110', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons'}
| null |
npm
|
GHSA-vwjj-2852-3765
|
Cross-Site Scripting in forms
|
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting.
## Recommendation
Update to version 1.3.0 or later.
|
{'CVE-2017-16015'}
|
2020-08-31T18:12:53Z
|
2018-11-09T17:46:27Z
|
MODERATE
| null |
{'CWE-80'}
|
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d', 'https://nodesecurity.io/advisories/158', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015', 'https://github.com/advisories/GHSA-vwjj-2852-3765', 'https://www.npmjs.com/advisories/158'}
| null |
npm
|
GHSA-v633-x5vv-hqwc
|
Cross-Site Scripting in serve-index
|
Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application.
## Recommendation
Update to version 1.6.3 or later.
|
{'CVE-2015-8856'}
|
2021-09-20T15:12:25Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/96392', 'https://github.com/advisories/GHSA-v633-x5vv-hqwc', 'https://github.com/expressjs/serve-index/issues/28', 'https://github.com/expressjs/serve-index', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856', 'https://nodesecurity.io/advisories/34', 'https://www.npmjs.com/advisories/34', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
npm
|
GHSA-53mj-mc38-q894
|
Remote Memory Exposure in openwhisk
|
Versions of `openwhisk` before 3.3.1 are vulnerable to remote memory exposure.
When a number is passed to `api_key`, affected versions of `openwhisk` allocate an uninitialized buffer and send that over network in Authorization header (base64-encoded).
Proof of concept:
```js
var openwhisk = require('openwhisk');
var options = {
apihost: '127.0.0.1:1433',
api_key: USERSUPPLIEDINPUT // number
};
var ow = openwhisk(options);
ow.actions.invoke({actionName: 'sample'}).then(result => console.log(result))
```
## Recommendation
Update to version 3.3.1 or later.
| null |
2021-09-24T14:29:02Z
|
2020-09-01T19:40:41Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/600', 'https://github.com/openwhisk/openwhisk-client-js', 'https://github.com/openwhisk/openwhisk-client-js/pull/34'}
| null |
npm
|
GHSA-gpqq-952q-5327
|
XSS in the `of` option of the `.position()` util in jquery-ui
|
### Impact
Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code:
```js
$( "#element" ).position( {
my: "left top",
at: "right bottom",
of: "<img onerror='window.globalOf=true' src='/404' />",
collision: "none"
} );
```
will call the `doEvilThing()` function.
### Patches
The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector.
### Workarounds
A workaround is to not accept the value of the `of` option from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
|
{'CVE-2021-41184'}
|
2021-10-27T16:59:45Z
|
2021-10-26T14:55:12Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.tenable.com/security/tns-2022-09', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/jquery/jquery-ui', 'https://www.drupal.org/sa-core-2022-001', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327'}
| null |
npm
|
GHSA-ff6g-gm92-rf32
|
Malicious Package in coinstirng
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:58:19Z
|
2020-09-03T19:42:06Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1383'}
| null |
npm
|
GHSA-xfxf-qw26-hr33
|
Arbitrary command execution in roar-pidusage
|
This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23380'}
|
2021-04-19T16:48:06Z
|
2021-05-06T15:55:43Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23380', 'https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103'}
| null |
npm
|
GHSA-h3c2-x77c-7pvr
|
High severity vulnerability that affects git-dummy-commit
|
A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter.
|
{'CVE-2018-3785'}
|
2020-06-16T21:38:34Z
|
2018-08-21T17:03:33Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3785', 'https://hackerone.com/reports/341710', 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'}
| null |
npm
|
GHSA-qmm9-x5gr-4gfm
|
Open Redirect in hekto
|
Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename.
## Recommendation
Update to version 0.2.4 or later.
|
{'CVE-2018-3743'}
|
2020-08-31T18:32:05Z
|
2018-07-18T21:20:12Z
|
LOW
| null |
{'CWE-601'}
|
{'https://www.npmjs.com/advisories/669', 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46', 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm', 'https://github.com/herber/hekto/pull/3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743', 'https://hackerone.com/reports/320693'}
| null |
npm
|
GHSA-2pqj-h3vj-pqgw
|
Cross-Site Scripting in jquery
|
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution.
## Proof of Concept
```
$("#log").html(
$("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html()
);
```
## Recommendation
Update to version 1.9.0 or later.
|
{'CVE-2012-6708'}
|
2022-03-03T05:13:33.982770Z
|
2020-09-01T16:41:46Z
|
HIGH
| null |
{'CWE-79', 'CWE-64'}
|
{'https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0', 'https://bugs.jquery.com/ticket/6429', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://bugs.jquery.com/ticket/12531', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://snyk.io/vuln/npm:jquery:20120206', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6708', 'http://www.securityfocus.com/bid/102792', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://bugs.jquery.com/ticket/9521', 'https://www.npmjs.com/advisories/329', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16011', 'https://bugs.jquery.com/ticket/11290'}
| null |
npm
|
GHSA-r92x-f52r-x54g
|
regular expression denial of service (ReDoS)
|
date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.
|
{'CVE-2020-26289'}
|
2021-01-07T22:33:12Z
|
2020-12-24T20:49:02Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1592', 'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a', 'https://www.npmjs.com/package/date-and-time', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26289', 'https://github.com/knowledgecode/date-and-time/security/advisories/GHSA-r92x-f52r-x54g'}
| null |
npm
|
GHSA-jp9g-5x75-ccp8
|
Malicious Package in colro-name
|
Version 9.0.0 of `colro-name` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:48:24Z
|
2020-09-02T21:34:30Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/902'}
| null |
npm
|
GHSA-m2w9-rm58-mhm9
|
Downloads Resources over HTTP in node-thulac
|
Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10640'}
|
2021-01-08T18:32:04Z
|
2019-02-18T23:47:06Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10640', 'https://www.npmjs.com/advisories/236', 'https://github.com/advisories/GHSA-m2w9-rm58-mhm9', 'https://nodesecurity.io/advisories/236'}
| null |
npm
|
GHSA-j68r-23hj-xf9c
|
Hijacked Environment Variables in node-openssl
|
The `node-openssl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16064'}
|
2020-08-31T18:25:38Z
|
2018-10-10T17:28:14Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/503', 'https://www.npmjs.com/advisories/503', 'https://github.com/advisories/GHSA-j68r-23hj-xf9c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16064'}
| null |
npm
|
GHSA-4cmx-hrq9-c23p
|
Improper Authorization in aedes
|
Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`.
## Recommendation
Update to version 0.35.1 or later.
|
{'CVE-2018-3778'}
|
2020-08-31T18:32:35Z
|
2018-08-15T20:03:22Z
|
MODERATE
| null |
{'CWE-285'}
|
{'https://github.com/mcollina/aedes/issues/211', 'https://github.com/mcollina/aedes/issues/212', 'https://github.com/advisories/GHSA-4cmx-hrq9-c23p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/457.json', 'https://www.npmjs.com/advisories/682'}
| null |
npm
|
GHSA-xh2p-7p87-fhgh
|
Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode
|
TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode.
The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722).
When calculating system's entire collateral, we should also exclude the liquidated trove's surplus collateral, since liquidation closes the trove and makes the surplus collateral claimable by the trove owner. This means, this line of code should look like this:
```
vars.entireSystemColl = vars.entireSystemColl.sub(singleLiquidation.collToSendToSP).sub(singleLiquidation.collSurplus);
```
### Impact
The miscalculated entire collateral is used only to calculate the TCR and check if the system has been able to exit Recovery Mode. The miscalulation only persists temporarily, and within the`batchLiquidateTroves` transaction. Once the transaction completes the TCR and Recovery Mode will be calculated properly again. However, the bug could negatively impact the liquidation throughput and the gas efficiency gains from batching multiple liquidations in a single transaction.
In normal situations, the impact of the collateral surplus of a Trove on the global TCR would be tiny. For instance, we have calculated that liquidating a trove with a collateral representing 1% of the total system collateral (so in the order of at least $10M at current values), would lead to an extra 0.53% in the temporary miscalculation of TCR. So for this bug to be meaningful, in such a scenario, the resulting real TCR must be already be very close to the Recovery Mode boundary anyway - i.e. between 149.47% and 150%. The batch liquidation transaction should also be executed with a particular trove ordering to achieve the TCR distortion. When a different trove order for the liquidation transaction is selected, the bug has no impact. In summary, the bug only has a non-negligible impact in a very narrow, specific set of circumstances.
The potential effects of the bug after it occurs are:
- The next trove in the sequence is not liquidated because the `batchLiquidateTroves` function calculates a premature exit from Recovery Mode. It could be liquidated in a subsequent transaction if the price of Ether doesn’t recover.
- The next trove in the sequence has an ICR below 100% and it’s offset against the Stability Pool instead of redistributed among other troves because the function calculates a premature exit from Recovery Mode. For this to happen, the Ether price must have instantly plummeted by more than 10% (otherwise, the trove would have been already liquidated before).
- The next trove in the sequence is liquidated while its ICR is over the real TCR: the function calculates the TCR as being slightly too high, and thus can liquidate a trove that has ICR less than the calculated TCR, but greater than the true TCR. This is probably the worst outcome - however it is already possible to achieve the same effect, regardless of the bug. A liquidator can craft a `batchLiquidateTroves` transaction whereby they select troves for liquidation such that the TCR increases and makes a given trove liquidateable. To liquidate trove A, they can order troves such that they first liquidate troves which raise the TCR to between A's ICR and 150%. This is intended and expected behavior. As clearly stated in Liquity documentation, to be completely safe and guarantee immunity from liquidation in Recovery Mode, borrowers should keep their ICR above 150%.
We don't believe this bug creates a profitable exploit. Theoretically, and only in a very narrow set of circumstances, a liquidator could try to send a batch liquidation during Recovery Mode that lets the system very temporarily return to Normal Mode earlier than it should. In that case - _and only if the Ether price also happens to suddenly plummet by more than 10%_ - stability providers might take the haircut that should be taken by the borrowers (through redistribution).
### Patches
The problem has been patched in the source code but not on mainnet contracts. Liquity protocol is immutable, and this issue is not critical, so it doesn't merit a launch of a new version.
### Bug bounty
A reward of $1,000 (the maximum for its category) was awarded to Xiahong (`gaoxh06`) for reporting this bug.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/liquity/dev)
* Email us at [security@liquity.org](mailto:security@liquity.org)
| null |
2021-07-29T20:43:48Z
|
2021-08-05T16:56:58Z
|
LOW
| null |
{'CWE-682'}
|
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905', 'https://github.com/liquity/dev/security/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722', 'https://www.npmjs.com/package/@liquity/contracts'}
| null |
npm
|
GHSA-wg96-3933-j2w5
|
Cross-Site Scripting in sanitize-html
|
Affected versions of `sanitize-html` are vulnerable to cross-site scripting.
## Proof of Concept:
`<IMG SRC= onmouseover="alert('XSS');">`
produces the following:
`<img src="onmouseover="alert('XSS');"" />`
This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser.
## Recommendation
Update to version 1.2.3 or later.
|
{'CVE-2017-16017'}
|
2020-08-31T18:12:46Z
|
2018-11-09T17:45:55Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16017', 'https://github.com/punkave/sanitize-html/issues/19', 'https://github.com/punkave/sanitize-html/pull/20', 'https://www.npmjs.com/advisories/155', 'https://nodesecurity.io/advisories/155', 'https://github.com/advisories/GHSA-wg96-3933-j2w5'}
| null |
npm
|
GHSA-rp2c-jrgp-cvr8
|
Code injection in plupload
|
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
|
{'CVE-2021-23562'}
|
2021-12-06T22:08:43Z
|
2021-12-16T15:32:31Z
|
MODERATE
| null |
{'CWE-434', 'CWE-75'}
|
{'https://github.com/moxiecode/plupload', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562', 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb', 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665', 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664'}
| null |
npm
|
GHSA-j438-45hc-vjhm
|
CSRF and DNS Rebinding in Oasis
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_request_forgery) attacks to read/write to vulnerable applications.
**There is no evidence that suggests that this has been used in the wild.**
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes, 2.15.0.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No.
### References
_Are there any links users can visit to find out more?_
No.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fraction/oasis](http://github.com/fraction/oasis)
* Email me at [christianbundy@fraction.io](mailto:christianbundy@fraction.io)
|
{'CVE-2020-11003'}
|
2021-01-08T20:59:34Z
|
2020-04-16T03:14:39Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/fraction/oasis/security/advisories/GHSA-j438-45hc-vjhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11003'}
| null |
npm
|
GHSA-f8rj-4v7g-p5rj
|
Directory Traversal in jansenstuffpleasework
|
Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16176'}
|
2020-08-31T18:24:07Z
|
2020-09-01T18:53:29Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16176', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework', 'https://www.npmjs.com/advisories/464', 'https://nodesecurity.io/advisories/464'}
| null |
npm
|
GHSA-hfj4-96f7-6r5g
|
Cross-Site Scripting in html-janitor
|
Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS).
This is exploitable if user-controlled data is passed into the modules `clean()` function.
## Recommendation
No fix is currently available for this vulnerability. It is recommended to use an alternative module for HTML sanitization.
|
{'CVE-2017-0931'}
|
2020-08-31T18:28:26Z
|
2018-11-09T17:49:11Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/guardian/html-janitor/issues/34', 'https://hackerone.com/reports/308155', 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g', 'https://www.npmjs.com/advisories/576', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0931'}
| null |
npm
|
GHSA-9vp3-7qwq-83r9
|
Server-Side Request Forgery in FUXA
|
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.
|
{'CVE-2021-45851'}
|
2022-03-25T13:33:46Z
|
2022-03-17T00:00:48Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://github.com/frangoteam/FUXA', 'https://www.youtube.com/watch?v=JE1Kcq3iJpc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45851'}
| null |
npm
|
GHSA-r9cj-xj33-4q42
|
Malicious Package in buffgr-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:26:56Z
|
2020-09-03T22:21:54Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1260'}
| null |
npm
|
GHSA-4xrw-wvmq-8jmh
|
OS Command Injection in node-key-sender
|
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.
|
{'CVE-2020-7627'}
|
2021-07-28T22:30:07Z
|
2022-02-10T23:46:11Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7627', 'https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117,'}
| null |
npm
|
GHSA-x2w5-725j-gf2g
|
Prototype Pollution in convict
|
An attacker can inject attributes that are used in other components and override existing attributes with ones that have incompatible type, which may lead to a crash.
The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files.
The problem is patched in `convict@6.2.2`. Users should upgrade to `convict@6.2.2`. There is no way for users to fix or remediate the vulnerability without upgrading.
|
{'CVE-2022-22143'}
|
2022-04-20T16:21:03Z
|
2022-04-20T16:21:03Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.huntr.dev/bounties/1-npm-convict/', 'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569', 'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143', 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g', 'https://github.com/mozilla/node-convict/', 'https://github.com/mozilla/node-convict/pull/384', 'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604', 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2'}
| null |
npm
|
GHSA-hcq6-h8v2-r5wm
|
Server-Side Request Forgery in node-pdf-generator
|
This affects all versions of package node-pdf-generator up to and including 0.0.6. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
|
{'CVE-2020-7740'}
|
2021-04-21T20:52:05Z
|
2021-05-10T18:38:34Z
|
HIGH
| null |
{'CWE-918', 'CWE-20'}
|
{'https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636', 'https://github.com/darrenhaken/node-pdf-generator/blob/master/index.js%23L29', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7740'}
| null |
npm
|
GHSA-fwvp-x5gj-773j
|
Malicious Package in react-server-native
|
Version 0.0.7 of `react-server-native` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 0.0.7 of this module is found installed you will want to replace it with a version before or after 0.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:44Z
|
2020-09-01T20:33:10Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/635'}
| null |
npm
|
GHSA-xj6q-9hx8-mm7f
|
Directory Traversal in liuyaserver
|
Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16170'}
|
2020-08-31T18:22:10Z
|
2020-09-01T17:34:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16170', 'https://www.npmjs.com/advisories/413', 'https://nodesecurity.io/advisories/413'}
| null |
npm
|
GHSA-hf2m-j98r-4fqw
|
API token verification can be bypassed in NodeBB
|
### Impact
Incorrect logic present in the token verification step unintentionally allowed master token access to the API.
### Patches
The vulnerability has been patch as of v1.18.5.
### Workarounds
Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
|
{'CVE-2021-43786'}
|
2021-12-01T15:06:58Z
|
2021-11-30T22:21:05Z
|
CRITICAL
| null |
{'CWE-287'}
|
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500', 'https://github.com/NodeBB/NodeBB', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43786'}
| null |
npm
|
GHSA-v88g-cgmw-v5xw
|
Prototype Pollution in Ajv
|
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
|
{'CVE-2020-15366'}
|
2021-05-10T21:23:41Z
|
2022-02-10T23:30:59Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f', 'https://github.com/ajv-validator/ajv/tags', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366', 'https://hackerone.com/bugs?subject=user&report_id=894259', 'https://github.com/ajv-validator/ajv/releases/tag/v6.12.3'}
| null |
npm
|
GHSA-xf27-jqwv-gf3r
|
Unintended Require in larvitbase-api
|
Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.
## Recommendation
Upgrade to version 0.5.4 or later.
|
{'CVE-2019-5479'}
|
2020-08-31T18:47:56Z
|
2019-09-11T23:03:57Z
|
MODERATE
| null |
{'CWE-98'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5479', 'https://hackerone.com/reports/566056', 'https://www.npmjs.com/advisories/1120'}
| null |
npm
|
GHSA-xr9h-9m79-x29g
|
SSRF in Rendertron
|
Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.
|
{'CVE-2020-8902'}
|
2021-02-24T06:59:10Z
|
2021-03-01T19:38:23Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://www.npmjs.com/package/rendertron', 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8902'}
| null |
npm
|
GHSA-p9g3-vpvp-hcj5
|
Malicious Package in bufber-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:56:22Z
|
2020-09-03T21:41:55Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1234'}
| null |
npm
|
GHSA-322m-p39j-r5m2
|
Malicious Package in npm-script-demo
|
The `npm-script-demo` package is a piece of malware that opens a connection to a command and control server and executed the instructions it is given.
It has been removed from the npm registry.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer has been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
{'CVE-2017-16128'}
|
2020-08-31T18:24:48Z
|
2020-09-01T18:55:37Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/481', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16128', 'https://nodesecurity.io/advisories/481'}
| null |
npm
|
GHSA-3fxp-vwxm-2r5p
|
Command injection in gitlogplus
|
All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.
|
{'CVE-2021-23412'}
|
2021-08-03T18:58:25Z
|
2021-07-26T21:23:35Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832', 'https://www.npmjs.com/package/gitlogplus', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23412', 'https://hackerone.com/reports/808942'}
| null |
npm
|
GHSA-8hmr-w35f-3qgj
|
Malicious Package in harmlesspackage
|
Version 0.0.1 of `harmlesspackage` contains malicious code as a postinstall script. The package printed a message to the console and performed a GET request to a remote server.
## Recommendation
Remove the package from your environment. There is no evidence of further compromise.
| null |
2021-09-29T20:46:19Z
|
2020-09-03T21:07:37Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1199'}
| null |
npm
|
GHSA-m6cx-g6qm-p2cx
|
Arbitrary File Write in npm
|
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk.
This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
## Recommendation
Upgrade to version 6.13.3 or later.
|
{'CVE-2019-16775'}
|
2021-10-21T21:16:09Z
|
2019-12-13T15:39:19Z
|
HIGH
| null |
{'CWE-61', 'CWE-59'}
|
{'https://access.redhat.com/errata/RHSA-2020:0573', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://github.com/npm/cli', 'https://access.redhat.com/errata/RHEA-2020:0330', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775', 'https://www.npmjs.com/advisories/1434', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx'}
| null |
npm
|
GHSA-jxg6-fhwc-9v9c
|
Regular Expression Denial of Service (ReDoS) in es6-crawler-detect
|
This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.
|
{'CVE-2020-28501'}
|
2021-03-23T19:29:27Z
|
2021-04-13T15:19:39Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529', 'https://github.com/JefferyHus/es6-crawler-detect/pull/27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}
| null |
npm
|
GHSA-7mg4-w3w5-x5pc
|
Prototype pollution in json-pointer
|
This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.
|
{'CVE-2020-7709'}
|
2021-04-21T21:10:19Z
|
2021-05-10T18:37:47Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://github.com/manuelstofer/json-pointer/pull/34/files', 'https://www.npmjs.com/package/json-pointer', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-596925', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7709', 'https://github.com/manuelstofer/json-pointer/pull/34'}
| null |
npm
|
GHSA-jxfh-8wgv-vfr2
|
Prototype pollution in dojo
|
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution.
Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects.
An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values.
This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2
|
{'CVE-2020-5258'}
|
2022-02-08T22:06:45Z
|
2020-03-10T18:03:14Z
|
HIGH
| null |
{'CWE-74', 'CWE-94', 'CWE-1321'}
|
{'https://github.com/dojo/dojo/security/advisories/GHSA-jxfh-8wgv-vfr2', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E', 'https://lists.apache.org/thread.html/r3638722360d7ae95f874280518b8d987d799a76df7a9cd78eac33a1b@%3Cusers.qpid.apache.org%3E', 'https://lists.apache.org/thread.html/rf481b3f25f05c52ba4e24991a941c1a6e88d281c6c9360a806554d00@%3Cusers.qpid.apache.org%3E', 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/dojo/dojo', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5258'}
| null |
npm
|
GHSA-832h-xg76-4gv6
|
ReDoS in brace-expansion
|
Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition.
## Proof of Concept
```
var expand = require('brace-expansion');
expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}');
```
## Recommendation
Update to version 1.1.7 or later.
|
{'CVE-2017-18077'}
|
2021-09-03T22:10:24Z
|
2018-01-29T15:50:46Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-832h-xg76-4gv6', 'https://github.com/juliangruber/brace-expansion', 'https://www.npmjs.com/advisories/338', 'https://github.com/juliangruber/brace-expansion/pull/35', 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077', 'https://bugs.debian.org/862712', 'https://nodesecurity.io/advisories/338', 'https://github.com/juliangruber/brace-expansion/issues/33'}
| null |
npm
|
GHSA-3vv5-42wr-m32g
|
Downloads Resources over HTTP in scala-bin
|
Affected versions of `scala-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scala-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10627'}
|
2021-01-08T19:58:45Z
|
2019-02-18T23:57:00Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-3vv5-42wr-m32g', 'https://www.npmjs.com/advisories/227', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10627', 'https://nodesecurity.io/advisories/227'}
| null |
npm
|
GHSA-g68x-vvqq-pvw3
|
Moderate severity vulnerability that affects ckeditor
|
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
|
{'CVE-2018-17960'}
|
2021-09-10T20:27:12Z
|
2018-11-21T22:19:50Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-g68x-vvqq-pvw3', 'https://ckeditor.com/cke4/release/CKEditor-4.11.0', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://ckeditor.com/blog/CKEditor-4.11-with-emoji-dropdown-and-auto-link-on-typing-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17960', 'http://www.securityfocus.com/bid/109205'}
| null |
npm
|
GHSA-5jpf-pj32-xx53
|
Authorization header is not sanitized in an error object in auth0
|
### Overview
Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged exposing a bearer token.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using `auth0` npm package
- You are using a Machine to Machine application authorized to use Auth0's management API https://auth0.com/docs/flows/concepts/client-credentials
### How to fix that?
Upgrade to version `2.27.1`
### Will this update impact my users?
The fix provided in patch will not affect your users.
### Credit
http://github.com/osdiab
|
{'CVE-2020-15125'}
|
2021-01-07T23:44:25Z
|
2020-07-29T16:26:22Z
|
HIGH
| null |
{'CWE-209'}
|
{'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c', 'https://github.com/auth0/node-auth0/pull/507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125', 'https://github.com/auth0/node-auth0/tree/v2.27.1', 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53'}
| null |
npm
|
GHSA-m36m-x4c5-rjxj
|
Silently Runs Cryptocoin Miner in hooka-tools
|
Affected versions of `hooka-tools` were compromised and modified to silently run a cryptocoin miner in the background.
All affected versions have been unpublished from the npm registry.
## Recommendation
While this module has been unpublished, some versions may exist in mirrors or caches. Do not install this module, and remove it if found.
| null |
2020-08-31T18:27:21Z
|
2020-09-01T19:01:58Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/549'}
| null |
npm
|
GHSA-xcgx-27q5-7634
|
Malicious Package in commanedr
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:59:32Z
|
2020-09-03T19:41:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1388'}
| null |
npm
|
GHSA-43ch-2h55-2vj7
|
Server-Side Request Forgery in private-ip
|
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.
|
{'CVE-2020-28360'}
|
2021-03-29T21:49:55Z
|
2021-04-13T15:18:17Z
|
CRITICAL
| null |
{'CWE-918'}
|
{'https://johnjhacking.com/blog/cve-2020-28360/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360', 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9', 'https://www.npmjs.com/package/private-ip', 'https://github.com/frenchbread/private-ip'}
| null |
npm
|
GHSA-j8hw-49gg-vq3w
|
Malicious Package in retcodelog
|
All versions of `retcodelog` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:00:58Z
|
2020-09-03T17:45:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1061'}
| null |
npm
|
GHSA-fwx5-5fqj-jv98
|
Cross-Site Scripting in morris.js
|
Affected versions of `morris.js` are vulnerable to cross-site scripting attacks in labels that appear when hovering over a particular point on a generated graph. The text content of these labels is not escaped, so if control over the labels is obtained, script can be injected. The script will run on the client side whenever that specific graph is loaded.
## Recommendation
A patch for this vulnerability was created in 2014, but has still not been published to npm. In order to mitigate this issue effectively, install the library from github via:
```
npm i morrisjs/morris.js -s
```
|
{'CVE-2017-16022'}
|
2020-08-31T18:18:39Z
|
2018-11-09T17:46:30Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/307', 'https://github.com/advisories/GHSA-fwx5-5fqj-jv98', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16022', 'https://nodesecurity.io/advisories/307', 'https://github.com/morrisjs/morris.js/pull/464'}
| null |
npm
|
GHSA-xf7w-r453-m56c
|
Arbitrary File Overwrite in fstream
|
Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable.
## Recommendation
Upgrade to version 1.0.12 or later.
|
{'CVE-2019-13173'}
|
2021-08-04T20:12:16Z
|
2019-05-30T17:19:34Z
|
HIGH
| null |
{'CWE-59'}
|
{'https://usn.ubuntu.com/4123-1/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html', 'https://www.npmjs.com/advisories/886', 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173'}
| null |
npm
|
GHSA-4w88-rjj3-x7wp
|
Chromium Remote Code Execution in electron
|
Affected versions of `ElectronJS` are susceptible to a remote code execution vulnerability that occurs when an affected application access remote content, even if the [sandbox option](https://electron.atom.io/docs/api/sandbox-option) is enabled.
## Recommendation
Update to electron version 1.7.8 or later.
|
{'CVE-2017-16151'}
|
2021-01-08T19:53:10Z
|
2018-07-24T20:04:23Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16151', 'https://nodesecurity.io/advisories/539', 'https://www.npmjs.com/advisories/539', 'https://github.com/advisories/GHSA-4w88-rjj3-x7wp', 'https://electron.atom.io/blog/2017/09/27/chromium-rce-vulnerability-fix', 'https://electronjs.org/blog/chromium-rce-vulnerability'}
| null |
npm
|
GHSA-jqvv-r4w3-8f7w
|
Malicious Package in bictoind-rpc
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:38:02Z
|
2020-09-04T15:35:00Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1355'}
| null |
npm
|
GHSA-hg5q-rj62-c43g
|
Malicious Package in reqest
|
All versions of `reqest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T21:26:33Z
|
2020-09-02T21:29:08Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/895'}
| null |
npm
|
GHSA-5fjj-cfh2-ghc5
|
Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport
|
An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.
|
{'CVE-2020-8128'}
|
2021-04-06T22:34:40Z
|
2021-04-13T15:25:24Z
|
HIGH
| null |
{'CWE-829', 'CWE-918'}
|
{'https://hackerone.com/reports/660565', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128'}
| null |
npm
|
GHSA-h44f-769q-j6px
|
Malicious Package in requet
|
All versions of `requet` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:08:15Z
|
2020-09-02T20:33:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/864'}
| null |
npm
|
GHSA-5947-m4fg-xhqg
|
Prototype Pollution in lodash.mergewith
|
Versions of `lodash.mergewith` before 4.6.1 are vulnerable to Prototype Pollution. The function 'mergeWith' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later.
| null |
2020-08-31T18:46:11Z
|
2020-09-03T18:08:10Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1069'}
| null |
npm
|
GHSA-9p64-h5q4-phpm
|
Remote Code Execution in office-converter
|
All versions of `office-converter` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:34:44Z
|
2020-09-02T15:44:58Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://www.npmjs.com/advisories/759'}
| null |
npm
|
GHSA-9jm3-5835-537m
|
Command Injection in apex-publish-static-files
|
Versions of `apex-publish-static-files` before 2.0.1 are vulnerable to command injection. This is exploitable if user input is passed into the `connectString` option in the `publish` method.
## Recommendation
Update to version 2.0.1 or later.
|
{'CVE-2018-16462'}
|
2020-08-31T18:33:14Z
|
2018-11-01T14:48:50Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/718', 'https://github.com/advisories/GHSA-9jm3-5835-537m', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/475.json', 'https://hackerone.com/reports/405694', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16462'}
| null |
npm
|
GHSA-xqp8-w826-hh6x
|
Crash server with query parameter
|
### Impact
Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch.
### Patches
Upgrade to Parse Server 4.10.3
|
{'CVE-2021-39187'}
|
2021-09-03T20:35:12Z
|
2021-09-02T16:51:14Z
|
HIGH
| null |
{'CWE-74', 'CWE-20', 'CWE-755'}
|
{'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39187', 'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xqp8-w826-hh6x', 'https://github.com/parse-community/parse-server/releases/tag/4.10.3', 'https://jira.mongodb.org/browse/NODE-3463'}
| null |
npm
|
GHSA-gmjw-49p4-pcfm
|
Prototype poisoning
|
### Impact
The issue is as follows: when `msgpack5` decodes a map containing a
key `"__proto__"`, it assigns the decoded value to `__proto__`. As you
are no doubt aware, `Object.prototype.__proto__` is an accessor
property for the receiver's prototype. If the value corresponding to
the key `__proto__` decodes to an object or `null`, `msgpack5` sets
the decoded object's prototype to that value.
An attacker who can submit crafted MessagePack data to a service can
use this to produce values that appear to be of other types; may have
unexpected prototype properties and methods (for example `length`,
numeric properties, and `push` et al if `__proto__`'s value decodes to
an `Array`); and/or may throw unexpected exceptions when used (for
example if the `__proto__` value decodes to a `Map` or `Date`). Other
unexpected behavior might be produced for other types.
There is no effect on the global prototype.
An example:
```js
const msgpack5 = require('msgpack5')();
const payload = {};
Object.defineProperty(payload, '__proto__', {
value: new Map().set(1, 2),
enumerable: true
});
const encoded = msgpack5.encode(payload);
console.log(encoded); // <Buffer 81 a9 5f 5f 70 72 6f 74 6f 5f 5f 81 01 02>
const decoded = msgpack5.decode(encoded);
// decoded's prototype has been overwritten
console.log(Object.getPrototypeOf(decoded)); // Map(1) { 1 => 2 }
console.log(decoded.get); // [Function: get]
// decoded appears to most common typechecks to be a Map
console.log(decoded instanceof Map); // true
console.log(decoded.toString()); // [object Map]
console.log(Object.prototype.toString.call(decoded)); // [object Map]
console.log(decoded.constructor.name); // Map
console.log(Object.getPrototypeOf(decoded).constructor.name); // Map
// decoded is not, however, a Map
console.log(Object.getPrototypeOf(decoded) === Map.prototype); // false
// using decoded as though it were a Map throws
try {
decoded.get(1);
} catch (error) {
console.log(error); // TypeError: Method Map.prototype.get called
// on incompatible receiver #<Map>
}
try {
decoded.size;
} catch (error) {
console.log(error); // TypeError: Method get Map.prototype.size
// called on incompatible receiver #<Map>
}
// re-encoding the decoded value throws
try {
msgpack5.encode(decoded);
} catch (error) {
console.log(error); // TypeError: Method Map.prototype.entries
// called on incompatible receiver #<Map>
}
```
This "prototype poisoning" is sort of a very limited inversion of a
prototype pollution attack. Only the decoded value's prototype is
affected, and it can only be set to `msgpack5` values (though if the
victim makes use of custom codecs, anything could be a `msgpack5`
value). We have not found a way to escalate this to true prototype
pollution (absent other bugs in the consumer's code).
### Patches
Versions v5.2.1, v4.5.1, v3.6.1 include the fix.
### Workarounds
Always validate incoming data after parsing before doing any processing.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
|
{'CVE-2021-21368'}
|
2021-03-12T16:57:44Z
|
2021-03-12T22:44:17Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1', 'https://www.npmjs.com/package/msgpack5', 'https://github.com/mcollina/msgpack5/releases/tag/v3.6.1', 'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368', 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm', 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1'}
| null |
npm
|
GHSA-236h-rqv8-8q73
|
GraphQL: Security breach on Viewer query
|
### Impact
An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object.
### Patches
This vulnerability has been patched in Parse Server 4.3.0.
### Workarounds
No
### References
See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details.
|
{'CVE-2020-15126'}
|
2021-01-07T23:46:50Z
|
2020-07-22T23:06:47Z
|
HIGH
| null |
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15126', 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73', 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
| null |
npm
|
GHSA-7wwv-vh3v-89cq
|
ReDOS vulnerabities: multiple grammars
|
### Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking)
[oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS):
> The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time.
If are you are using Highlight.js to highlight user-provided data you are possibly vulnerable. On the client-side (in a browser or Electron environment) risks could include lengthy freezes or crashes... On the server-side infinite freezes could occur... effectively preventing users from accessing your app or service (ie, Denial of Service).
This is an issue with grammars shipped with the parser (and potentially 3rd party grammars also), not the parser itself. If you are using Highlight.js with any of the following grammars you are vulnerable. If you are using `highlightAuto` to detect the language (and have any of these grammars registered) you are vulnerable. Exponential grammars (C, Perl, JavaScript) are auto-registered when using the common grammar subset/library `require('highlight.js/lib/common')` as of 10.4.0 - see https://cdn.jsdelivr.net/gh/highlightjs/cdn-release@10.4.0/build/highlight.js
All versions prior to 10.4.1 are vulnerable, including version 9.18.5.
**Grammars with exponential backtracking issues:**
- c-like (c, cpp, arduino)
- handlebars (htmlbars)
- gams
- perl
- jboss-cli
- r
- erlang-repl
- powershell
- routeros
- livescript (10.4.0 and 9.18.5 included this fix)
- javascript & typescript (10.4.0 included partial fixes)
And of course any aliases of those languages have the same issue. ie: `hpp` is no safer than `cpp`.
**Grammars with polynomial backtracking issues:**
- kotlin
- gcode
- d
- aspectj
- moonscript
- coffeescript/livescript
- csharp
- scilab
- crystal
- elixir
- basic
- ebnf
- ruby
- fortran/irpf90
- livecodeserver
- yaml
- x86asm
- dsconfig
- markdown
- ruleslanguage
- xquery
- sqf
And again: any aliases of those languages have the same issue. ie: `ruby` and `rb` share the same ruby issues.
### Patches
- Version 10.4.1 resolves these vulnerabilities. Please upgrade.
### Workarounds / Mitigations
- Discontinue use the affected grammars. (or perhaps use only those with poly vs exponential issues)
- Attempt cherry-picking the grammar fixes into older versions...
- Attempt using newer CDN versions of any affected languages. (ie using an older CDN version of the library with newer CDN grammars). Your mileage may vary.
### References
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue: https://github.com/highlightjs/highlight.js/issues
* Email us at [security@highlightjs.com](mailto:security@highlightjs.com)
| null |
2022-05-03T08:27:45Z
|
2020-12-04T16:47:20Z
|
MODERATE
| null |
{'CWE-400', 'CWE-20'}
|
{'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c', 'https://www.npmjs.com/package/@highlightjs/cdn-assets', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq'}
| null |
npm
|
GHSA-8462-q7x7-g2x4
|
High severity vulnerability that affects bson
|
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
|
{'CVE-2018-13863'}
|
2021-09-03T22:29:39Z
|
2018-09-17T20:44:58Z
|
HIGH
| null |
{'CWE-400', 'CWE-185'}
|
{'https://github.com/advisories/GHSA-8462-q7x7-g2x4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863', 'https://snyk.io/vuln/npm:bson:20180225', 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a', 'https://github.com/mongodb/js-bson'}
| null |
npm
|
GHSA-7h8x-wmq2-7mff
|
Command injection in launchpad
|
All versions of package launchpad are vulnerable to Command Injection via stop.
|
{'CVE-2021-23330'}
|
2021-03-22T22:56:57Z
|
2021-04-13T15:20:20Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23330', 'https://github.com/bitovi/launchpad/pull/124', 'https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118'}
| null |
npm
|
GHSA-q48g-p5cx-c7c7
|
Directory Traversal in yzt
|
Affected versions of `yzt` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16221'}
|
2020-08-31T18:22:18Z
|
2020-09-01T17:36:42Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16221', 'https://www.npmjs.com/advisories/416', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yzt', 'https://nodesecurity.io/advisories/416'}
| null |
npm
|
GHSA-xmh9-rg6f-j3mr
|
Verification flaw in Solid identity-token-verifier
|
### Impact
#### Severity
Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod.
#### Summary
A verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed.
DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP.
A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability.
### Patches
A new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35
### Workarounds
None
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository.
* Email: info@solidproject.org
| null |
2021-03-10T04:01:48Z
|
2021-03-12T22:39:01Z
|
MODERATE
| null |
{'CWE-290'}
|
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c', 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr', 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2', 'https://www.npmjs.com/package/@solid/identity-token-verifier'}
| null |
npm
|
GHSA-4f9m-pxwh-68hg
|
Cross-Site Scripting in swagger-ui
|
Versions of `swagger-ui` prior to 3.20.9 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs used in the OAuth auth flow, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 3.20.9 or later.
| null |
2021-09-28T16:57:07Z
|
2020-09-11T21:20:14Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/swagger-api/swagger-ui/pull/5190', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449921', 'https://www.npmjs.com/advisories/976', 'https://github.com/swagger-api/swagger-ui'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.