ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-hc9w-4p87-j549
Prototype Pollution in cached-path-relative
Version of `cached-path-relative` before 1.0.2 are vulnerable to prototype pollution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2018-16472'}
2020-08-31T18:34:03Z
2018-11-07T20:46:25Z
HIGH
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-hc9w-4p87-j549', 'https://hackerone.com/reports/390847', 'https://www.npmjs.com/advisories/739', 'https://github.com/ashaffer/cached-path-relative/issues/3', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/480.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16472'}
null
npm
GHSA-h33p-5j96-w8qh
OS Command Injection in gulkp-styledocco
gulp-styledocco through 0.0.3 allows execution of arbitrary commands. The argument 'options' of the exports function in 'index.js' can be controlled by users without any sanitization.
{'CVE-2020-7607'}
2021-07-28T21:22:24Z
2021-05-07T16:14:48Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7607', 'https://snyk.io/vuln/SNYK-JS-GULPSTYLEDOCCO-560126'}
null
npm
GHSA-rw53-q8x7-ccx8
Malicious Package in buffer-xkr
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:00Z
2020-09-03T21:55:17Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1245'}
null
npm
GHSA-mh6f-8j2x-4483
Critical severity vulnerability that affects event-stream and flatmap-stream
The NPM package `flatmap-stream` is considered malicious. A malicious actor added this package as a dependency to the NPM `event-stream` package in version `3.3.6`. Users of `event-stream` are encouraged to downgrade to the last non-malicious version, `3.3.4`, or upgrade to the latest 4.x version. Users of `flatmap-stream` are encouraged to remove the dependency entirely.
null
2021-09-15T20:08:26Z
2018-11-26T23:58:21Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-mh6f-8j2x-4483', 'https://github.com/dominictarr/event-stream', 'https://github.com/dominictarr/event-stream/issues/116'}
null
npm
GHSA-j8r2-2x94-2q67
Cross-Site Scripting in diagram-js-direct-editing
Versions of `diagram-js-direct-editing` prior to 1.4.3 are vulnerable to Cross-Site Scripting. The package fails to sanitize input from the clipboard, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.4.3 or later.
null
2021-09-28T16:59:50Z
2020-09-11T21:19:09Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/983', 'https://github.com/bpmn-io/diagram-js-direct-editing'}
null
npm
GHSA-8m5v-f2wp-wqr9
Malicious Package in ali-contributors
All versions of `ali-contributors` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T17:50:11Z
2020-09-03T17:30:36Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1046'}
null
npm
GHSA-qcff-ffx3-m25c
Command Injection in meta-git
All versions of `meta-git` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `clone` command is vulnerable through the branch name. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:59:58Z
2020-09-04T17:31:44Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1457', 'https://hackerone.com/reports/728040'}
null
npm
GHSA-6gg3-pmm7-97xc
DOM-based XSS in auth0-lock
### Overview Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection. - For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification code input. - For Enterprise connection, the value of the input (IdP Domain) from the Enterprise connection setup screen (Auth0 Dashboard) is displayed back to the user when the `lock` widget opens. When Passwordless or Enterprise connection is used, the application and its users might be exposed to cross-site scripting (XSS) attacks. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using auth0-lock - You are using Passwordless or Enterprise connection mode ### How to fix that? Upgrade to version `11.26.3` ### Will this update impact my users? The fix provided in patch will not affect your users. ### Credit https://github.com/mvisat
{'CVE-2020-15119'}
2021-01-07T23:40:43Z
2020-08-19T21:05:03Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15119', 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc', 'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}
null
npm
GHSA-w9hw-v97w-g5f5
Malicious Package in bitconi-ops
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:43:23Z
2020-09-04T16:43:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1368'}
null
npm
GHSA-4g53-vp7q-gfjv
constructEvent does not verify header
### Impact Anyone verifying a Stripe webhook request via this library's `constructEvent` function. ### Patches Upgrade to 1.1.4. ### Workarounds Use `await verifyHeader(...)` directly instead of `constructEvent`. ### References https://github.com/worker-tools/stripe-webhook/issues/1
null
2021-05-27T22:24:49Z
2021-05-28T19:18:28Z
HIGH
null
null
{'https://github.com/worker-tools/stripe-webhook/security/advisories/GHSA-4g53-vp7q-gfjv'}
null
npm
GHSA-j377-2x76-558h
Improper Input Validation in is-email
is-email helps validate an email address. A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU.
{'CVE-2021-36716'}
2022-05-04T03:12:57Z
2021-12-10T17:25:21Z
HIGH
null
{'CWE-400', 'CWE-20'}
{'https://github.com/segmentio/is-email/releases', 'https://github.com/segmentio/is-email', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36716', 'https://segment.com/docs/release_notes/2021-07-13-cve-2021-36716/'}
null
npm
GHSA-x7q3-67vc-wvcf
Downloads Resources over HTTP in grunt-images
Affected versions of `grunt-images` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-images`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10645'}
2021-09-16T20:53:24Z
2018-08-15T19:05:14Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10645', 'https://github.com/advisories/GHSA-x7q3-67vc-wvcf', 'https://github.com/gcpantazis/grunt-images', 'https://nodesecurity.io/advisories/255', 'https://www.npmjs.com/advisories/255'}
null
npm
GHSA-v9p9-535w-4285
Prototype Pollution in litespeed.js and appwrite/server-ce
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
{'CVE-2021-23682'}
2022-02-25T15:40:33Z
2022-02-17T00:00:32Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23682', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://github.com/appwrite/appwrite/pull/2778', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/releases/tag/0.11.1'}
null
npm
GHSA-9rwj-8mh9-4876
Malicious Package in carloprojectdiscord
All versions of `carloprojectdiscord` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T21:23:53Z
2020-09-02T21:19:37Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/874'}
null
npm
GHSA-9qrg-h9g8-c65q
Prototype Pollution in deep-setter
All versions of `deep-setter` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:28Z
2020-09-04T15:14:26Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1333'}
null
npm
GHSA-23xp-j737-282v
Path Traversal in takeapeek
All versions of `takeapeek` are vulnerable to path traversal exposing files and directories. ## Recommendation As no fix is currently available for this vulnerability is it is our recommendation to use another static file server.
{'CVE-2018-16473'}
2020-08-31T18:34:06Z
2018-11-06T23:12:30Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-23xp-j737-282v', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/478.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16473', 'https://hackerone.com/reports/403736', 'https://www.npmjs.com/advisories/740'}
null
npm
GHSA-f72h-wf57-7xwh
Malicious Package in buffer-xo2
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:04:48Z
2020-09-03T21:58:34Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1248'}
null
npm
GHSA-fg5w-w99f-rj6w
Command Injection in @ronomon/opened
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
{'CVE-2021-29300'}
2021-05-28T16:56:53Z
2021-06-08T23:15:35Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300', 'https://advisory.checkmarx.net/advisory/CX-2021-4775'}
null
npm
GHSA-qr4m-jcvc-3382
Prototype Pollution in dot-notes
All versions of package dot-notes up to and including version 3.2.0 are vulnerable to Prototype Pollution via the create function.
{'CVE-2020-7717'}
2021-05-05T18:52:45Z
2021-05-06T18:12:00Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7717', 'https://snyk.io/vuln/SNYK-JS-DOTNOTES-598668'}
null
npm
GHSA-chwr-hf3w-c984
Regular Expression Denial of Service in dat.gui
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.
{'CVE-2020-7755'}
2021-04-21T17:36:43Z
2021-05-10T18:44:38Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-DATGUI-1016275', 'https://www.npmjs.com/package/dat.gui', 'https://github.com/dataarts/dat.gui/issues/278', 'https://github.com/dataarts/dat.gui/pull/279', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7755'}
null
npm
GHSA-wrvr-8mpx-r7pp
Regular Expression Denial of Service in mime
Affected versions of `mime` are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. ## Recommendation Update to version 2.0.3 or later.
{'CVE-2017-16138'}
2020-08-31T18:26:49Z
2018-07-20T16:20:52Z
MODERATE
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-wrvr-8mpx-r7pp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16138', 'https://github.com/broofa/node-mime/issues/167', 'https://www.npmjs.com/advisories/535', 'https://nodesecurity.io/advisories/535'}
null
npm
GHSA-7p6w-x2gr-rrf8
Cross-Site Scripting in ag-grid-community
Versions of `ag-grid-community` prior to 14.0.0 are vulnerable to Cross-Site Scripting (XSS). Grid contents are not properly sanitized and may allow attackers to execute arbitrary JavaScript if user input is rendered in the grid. ## Recommendation Upgrade to version 14.0.0 or later
null
2021-09-27T21:42:28Z
2020-09-02T21:28:05Z
HIGH
null
{'CWE-79'}
{'https://github.com/ag-grid/ag-grid/issues/1961', 'https://github.com/ag-grid/ag-grid', 'https://www.npmjs.com/advisories/894'}
null
npm
GHSA-6fc8-4gx4-v693
ReDoS in Sec-Websocket-Protocol header
### Impact A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. ### Proof of concept ```js for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) { const value = 'b' + ' '.repeat(length) + 'x'; const start = process.hrtime.bigint(); value.trim().split(/ *, */); const end = process.hrtime.bigint(); console.log('length = %d, time = %f ns', length, end - start); } ``` ### Patches The vulnerability was fixed in ws@7.4.6 (https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff) and backported to ws@6.2.2 (https://github.com/websockets/ws/commit/78c676d2a1acefbc05292e9f7ea0a9457704bf1b) and ws@5.2.3 (https://github.com/websockets/ws/commit/76d47c1479002022a3e4357b3c9f0e23a68d4cd2). ### Workarounds In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the [`--max-http-header-size=size`](https://nodejs.org/api/cli.html#cli_max_http_header_size_size) and/or the [`maxHeaderSize`](https://nodejs.org/api/http.html#http_http_createserver_options_requestlistener) options. ### Credits The vulnerability was responsibly disclosed along with a fix in private by [Robert McLaughlin](https://github.com/robmcl4) from University of California, Santa Barbara.
{'CVE-2021-32640'}
2021-10-06T22:05:51Z
2021-05-28T19:19:03Z
MODERATE
null
{'CWE-345', 'CWE-400'}
{'https://github.com/websockets/ws', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640', 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693', 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'https://github.com/websockets/ws/issues/1895', 'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'}
null
npm
GHSA-xq98-5rcf-5wqh
Directory Traversal in badjs-sourcemap-server
Affected versions of `badjs-sourcemap-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16036'}
2020-08-31T18:20:13Z
2018-07-24T15:43:02Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/349', 'https://github.com/advisories/GHSA-xq98-5rcf-5wqh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16036', 'https://nodesecurity.io/advisories/349', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/badjs-sourcemap-server'}
null
npm
GHSA-9x64-5r7x-2q53
Malicious Package in flatmap-stream
Version 0.1.1 of `flatmap-stream` is considered malicious. This module runs an encrypted payload targeting a very specific application, `copay` and because they shared the same description it would have likely worked for `copay-dash`. The injected code: - Read in AES encrypted data from a file disguised as a test fixture - Grabbed the npm package description of the module that imported it, using an automatically set environment variable - Used the package description as a key to decrypt a chunk of data pulled in from the disguised file The decrypted data was part of a module, which was then compiled in memory and executed. This module performed the following actions: - Decrypted another chunk of data from the disguised file - Concatenated a small, commented prefix from the first decrypted chunk to the end of the second decrypted chunk - Performed minor decoding tasks to transform the concatenated block of code from invalid JS to valid JS (we believe this was done to evade detection by dynamic analysis tools) - Wrote this processed block of JS out to a file stored in a dependency that would be packaged by the build scripts: The chunk of code that was written out was the actual malicious code, intended to be run on devices owned by the end users of Copay. This code would do the following: - Detect the current environment: Mobile/Cordova/Electron - Check the Bitcoin and Bitcoin Cash balances on the victim's copay account - If the current balance was greater than 100 Bitcoin, or 1000 Bitcoin Cash: - Harvest the victim's account data in full - Harvest the victim's copay private keys - Send the victim's account data/private keys off to a collection ## Recommendation If you find this module in your environment it's best to remove it. The malicious version of event-stream and flatmap-stream have been removed from the npm Registry.
null
2021-10-01T13:30:04Z
2020-09-01T21:21:32Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/737', 'https://github.com/dominictarr/event-stream/issues/116'}
null
npm
GHSA-rhvc-x32h-5526
No CSRF Validation in droppy
Affected versions of `droppy` are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others. ## Recommendation Update to version 3.5.0 or later.
{'CVE-2016-10529'}
2020-08-31T18:10:30Z
2019-02-18T23:39:32Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10529', 'https://github.com/advisories/GHSA-rhvc-x32h-5526', 'https://www.npmjs.com/advisories/91', 'https://nodesecurity.io/advisories/91'}
null
npm
GHSA-m428-jqc4-2p5j
Prototype Pollution in phpjs
All versions of phpjs up to and including 1.3.2 are vulnerable to Prototype Pollution via parse_str. phpjs is no longer maintained and users are advised to use Locutus as a replacement (https://github.com/locutusjs/locutus)
{'CVE-2020-7700'}
2021-05-05T21:46:10Z
2021-05-06T17:28:46Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7700', 'https://snyk.io/vuln/SNYK-JS-PHPJS-598681'}
null
npm
GHSA-46fh-8fc5-xcwx
Prototype Pollution in lodash.defaultsdeep
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to Prototype Pollution. The function 'defaultsDeep' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2020-08-31T18:46:13Z
2020-09-03T18:09:16Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1070'}
null
npm
GHSA-q643-w9jp-q2qg
Hardcoded Initialization Vector in parsel
All versions of `parsel` have a default hardcoded initialization vector. In cases where the IV is not provided, the package defaults to a hardcoded IV which renders the cipher vulnerable to chosen plaintext attacks. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
null
2020-08-31T19:00:05Z
2020-09-04T17:34:59Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1460'}
null
npm
GHSA-c2vr-2c89-ph88
Downloads Resources over HTTP in node-bsdiff-android
Affected versions of `node-bsdiff-android` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10641'}
2021-09-16T20:54:14Z
2018-09-18T13:49:54Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://nodesecurity.io/advisories/234', 'https://github.com/advisories/GHSA-c2vr-2c89-ph88', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10641', 'https://www.npmjs.com/advisories/234', 'https://github.com/arthur-zhang/node-bsdiff-android'}
null
npm
GHSA-qfcv-5whw-7pcw
Exposure of Sensitive Information to an Unauthorized Actor in AEgir
### Impact `aegir publish` and `aegir build` may leak secrets from environmental variables in the browser bundle published to npm. ### Patches The code has been patched, users should upgrade to >= 21.10.1 ### Workarounds Run `printenv` to check your environment variables and revoke any secrets. ### For more information If you have any questions or comments about this advisory: * Open an issue in [aegir](https://github.com/ipfs/aegir)
{'CVE-2020-11059'}
2021-10-08T19:56:28Z
2020-05-27T21:09:15Z
CRITICAL
null
{'CWE-200'}
{'https://github.com/ipfs/aegir', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11059', 'https://github.com/ipfs/aegir/security/advisories/GHSA-qfcv-5whw-7pcw'}
null
npm
GHSA-72fv-qgj6-2w2p
Cross-site Scripting in NodeBB
Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.
{'CVE-2015-9286'}
2021-08-03T21:27:01Z
2019-05-01T18:37:08Z
MODERATE
null
{'CWE-79'}
{'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529', 'https://github.com/NodeBB/NodeBB/pull/3371', 'https://www.vulnerability-lab.com/get_content.php?id=1608', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286', 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'}
null
npm
GHSA-9cph-cqqh-36pw
Malicious Package in babel-loqder
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:17:59Z
2020-09-04T15:29:25Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1350'}
null
npm
GHSA-rch7-f4h5-x9rj
Identity Spoofing in libp2p-secio
Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability. ## Recommendation Update to version 0.9.0 or later.
null
2021-08-17T21:32:42Z
2019-08-23T00:04:52Z
CRITICAL
null
{'CWE-290'}
{'https://www.npmjs.com/advisories/558', 'https://nodesecurity.io/advisories/558', 'https://github.com/libp2p/js-libp2p-secio/pull/95', 'https://snyk.io/vuln/npm:libp2p-secio:20180115'}
null
npm
GHSA-mm62-wxc8-cf7m
Code Execution Through IIFE in serialize-to-js
Affected versions of `serialize-to-js` may be vulnerable to arbitrary code execution through an Immediately Invoked Function Expression (IIFE). ## Proof of Concept ``` var payload = "{e: (function(){ eval('console.log(`exploited`)') })() }" var serialize = require('serialize-to-js'); serialize.deserialize(payload); ``` ## Recommendation Update to version 1.0.0, or later, and review [this disclaimer](https://www.npmjs.com/package/serialize-to-js#deserialize) from the author.
{'CVE-2017-5954'}
2021-09-15T20:28:22Z
2018-07-18T18:27:41Z
CRITICAL
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-5954', 'https://www.npmjs.com/advisories/313', 'https://github.com/commenthol/serialize-to-js/issues/1', 'http://www.securityfocus.com/bid/96223', 'https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/', 'https://github.com/commenthol/serialize-to-js', 'https://github.com/advisories/GHSA-mm62-wxc8-cf7m', 'https://www.npmjs.com/package/serialize-to-js#deserialize'}
null
npm
GHSA-9r27-994c-4xch
discord-html not escaping HTML code blocks when lacking a language identifier
### Impact Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed. ### Patches This has been patched in version 2.3.1 ### Workarounds Escape the characters `<>&` before sending plain code blocks to discord-markdown. ### References https://github.com/brussell98/discord-markdown/issues/13
null
2020-02-21T20:20:53Z
2020-02-24T17:34:02Z
HIGH
null
null
{'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7', 'https://github.com/brussell98/discord-markdown/issues/13', 'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch'}
null
npm
GHSA-h7pc-85cg-wmch
Downloads Resources over HTTP in kindlegen
Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`. ## Recommendation Update to version 1.1.0 or greater.
{'CVE-2016-10575'}
2021-01-08T18:42:35Z
2019-02-18T23:35:10Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10575', 'https://github.com/advisories/GHSA-h7pc-85cg-wmch', 'https://www.npmjs.com/advisories/251', 'https://nodesecurity.io/advisories/251'}
null
npm
GHSA-w222-53c6-c86p
Remote Code Execution in electron
Affected versions of `electron` may be susceptible to a remote code execution flaw when certain conditions are met: 1. The electron application is running on Windows. 2. The electron application registers as the default handler for a protocol, such as `nodeapp://`. This vulnerability is caused by a failure to sanitize additional arguments to chromium in the command line handler for Electron. MacOS and Linux are not vulnerable. ## Recommendation Update electron to a version that is not vulnerable. If updating is not possible, the electron team has provided the following guidance: If for some reason you are unable to upgrade your Electron version, you can append `--` as the last argument when calling `app.setAsDefaultProtocolClient`, which prevents Chromium from parsing further options. The double dash `--` signifies the end of command options, after which only positional parameters are accepted. ``` app.setAsDefaultProtocolClient(protocol, process.execPath, [ '--your-switches-here', '--' ]) ```
{'CVE-2018-1000006'}
2021-06-10T19:55:43Z
2018-01-23T03:57:44Z
HIGH
null
{'CWE-78'}
{'https://electronjs.org/blog/protocol-handler-fix', 'https://github.com/advisories/GHSA-w222-53c6-c86p', 'http://www.securityfocus.com/bid/102796', 'https://www.exploit-db.com/exploits/44357/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000006', 'https://github.com/electron/electron/releases/tag/v1.8.2-beta.4', 'https://www.npmjs.com/advisories/563', 'https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374', 'https://www.exploit-db.com/exploits/43899/'}
null
npm
GHSA-jp27-cwp2-5qqr
Hijacked Environment Variables in jquery.js
The `jquery.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16045'}
2020-08-31T18:25:22Z
2018-07-23T20:54:24Z
MODERATE
null
{'CWE-506'}
{'https://nodesecurity.io/advisories/496', 'https://github.com/advisories/GHSA-jp27-cwp2-5qqr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16045', 'https://www.npmjs.com/advisories/496'}
null
npm
GHSA-582f-p4pg-xc74
Regular Expression Denial of Service in csv-parse
Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option. ## Recommendation Upgrade to version 4.4.6 or later.
{'CVE-2019-17592'}
2022-01-04T19:51:33Z
2019-10-15T20:06:16Z
HIGH
null
{'CWE-400', 'CWE-20'}
{'https://www.npmjs.com/advisories/1171', 'https://security.netapp.com/advisory/ntap-20191127-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://github.com/adaltas/node-csv-parse', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17592', 'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a'}
null
npm
GHSA-xh8g-j88w-6v59
Malicious Package in cionstring
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:57:22Z
2020-09-03T19:42:16Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1381'}
null
npm
GHSA-34r7-q49f-h37c
Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js
Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification. ## Recommendation Upgrade UglifyJS to version >= 2.4.24.
{'CVE-2015-8857'}
2021-10-29T14:15:03Z
2017-10-24T18:33:36Z
CRITICAL
null
{'CWE-1254'}
{'https://nodesecurity.io/advisories/39', 'https://github.com/mishoo/UglifyJS2', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857', 'https://zyan.scripts.mit.edu/blog/backdooring-js/', 'https://github.com/mishoo/UglifyJS2/issues/751', 'https://github.com/advisories/GHSA-34r7-q49f-h37c', 'https://www.npmjs.com/advisories/39', 'http://www.securityfocus.com/bid/96410', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-3cpj-mj3q-82wr
Malicious Package in bs58chek
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:49:46Z
2020-09-04T16:49:43Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1376'}
null
npm
GHSA-5635-9mvj-r6hp
Malicious Package in vue-backbone
Version 0.1.2 of `vue-backbone` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:08:21Z
2020-09-03T02:34:39Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/945'}
null
npm
GHSA-3wj8-vp9h-rm6m
Remote Code Execution (RCE)
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
{'CVE-2021-23344'}
2021-03-12T22:42:43Z
2021-03-19T21:32:20Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069'}
null
npm
GHSA-3fw4-4h3m-892h
OS Command Injection in serial-number
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
{'CVE-2019-10804'}
2021-04-09T21:39:10Z
2021-04-13T15:22:19Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10804', 'https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010', 'https://github.com/es128/serial-number/blob/master/index.js#L106'}
null
npm
GHSA-mq76-m7gv-xhfm
Downloads Resources over HTTP in sauce-connect
Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`. ## Recommendation No patch is currently available for this vulnerability, and this package has not been updated since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10599'}
2021-01-08T18:26:41Z
2019-02-18T23:34:00Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/186', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599', 'https://nodesecurity.io/advisories/186', 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm'}
null
npm
GHSA-cr3q-pqgq-m8c2
Spoofing attack in swagger-ui
Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.
{'CVE-2018-25031'}
2022-03-29T19:09:55Z
2022-03-12T00:00:36Z
MODERATE
null
{'CWE-20'}
{'https://github.com/swagger-api/swagger-ui/pull/7697', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUI-2314885', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://github.com/swagger-api/swagger-ui', 'https://github.com/swagger-api/swagger-ui/issues/4872', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25031', 'https://github.com/swagger-api/swagger-ui/releases/tag/v4.1.3'}
null
npm
GHSA-8hrq-9wm7-v3jw
Malicious Package in btffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:53:26Z
2020-09-03T21:39:41Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1231'}
null
npm
GHSA-vh5w-fg69-rc8m
Improper Input Validation in Google Closure Library
A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315.
{'CVE-2020-8910'}
2021-05-06T20:57:55Z
2021-05-07T16:06:34Z
MODERATE
null
{'CWE-20'}
{'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8910', 'https://github.com/google/closure-library/releases/tag/v20200315'}
null
npm
GHSA-5xjx-4xcm-hpcm
Prototype Pollution in ts-nodash
`ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.
{'CVE-2021-23403'}
2021-12-10T18:53:36Z
2021-12-10T18:53:42Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5', 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403', 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'}
null
npm
GHSA-c6c4-jmqx-3r33
Open Redirect in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.
{'CVE-2020-11611'}
2021-05-25T16:23:58Z
2021-12-09T19:30:14Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11611', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client', 'https://github.com/ofirdagan/cross-domain-local-storage'}
null
npm
GHSA-g7mw-5cq6-fv82
Cross-Site Scripting in wangeditor
All versions of `wangeditor` are vulnerable to Cross-Site Scripting. The package fails to properly encode output, allowing arbitrary JavaScript to be inserted in links and executed by browsers. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T21:00:38Z
2020-09-02T21:20:40Z
HIGH
null
{'CWE-79'}
{'https://github.com/wangfupeng1988/wangEditor/', 'https://www.npmjs.com/advisories/876', 'https://github.com/wangfupeng1988/wangEditor/issues/1945', 'https://snyk.io/vuln/SNYK-JS-WANGEDITOR-174536'}
null
npm
GHSA-c6rp-xvqv-mwmf
Cross-site Scripting in epubjs
managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.
{'CVE-2021-33040'}
2022-01-19T14:07:11Z
2022-01-21T23:52:17Z
HIGH
null
{'CWE-79'}
{'https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373', 'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e', 'https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89', 'https://github.com/futurepress/epub.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33040'}
null
npm
GHSA-rwg6-3fmj-w4wx
Hijacked Environment Variables in tkinter
The `tkinter` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16061'}
2021-09-16T20:57:01Z
2018-11-01T14:47:21Z
CRITICAL
null
{'CWE-506', 'CWE-433'}
{'https://www.npmjs.com/advisories/500', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16061', 'https://nodesecurity.io/advisories/500'}
null
npm
GHSA-q26w-wjj2-22vv
Cross-site scripting in Joplin
Joplin allows XSS via a LINK element in a note.
{'CVE-2020-28249'}
2021-04-20T19:38:53Z
2021-05-10T18:47:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28249', 'https://github.com/fhlip0/JopinXSS', 'https://www.npmjs.com/package/joplin', 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13', 'https://github.com/laurent22/joplin/releases/tag/v1.3.11'}
null
npm
GHSA-94m7-w873-6wwf
Malicious Package in modlibrary
Version 0.1.1 of `modlibrary` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:35Z
2020-09-01T20:28:56Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/631'}
null
npm
GHSA-v3r2-3fp4-rp46
Prototype pollution in paypal-adaptive
paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2020-7643'}
2021-10-05T17:20:31Z
2021-12-10T20:05:57Z
MODERATE
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-PAYPALADAPTIVE-565089', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7643', 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs', 'https://github.com/Ideame/paypal-adaptive-sdk-nodejs/blob/master/lib/paypal-adaptive.js#L31'}
null
npm
GHSA-f3pc-c2gf-hvgw
Malicious Package in requets
All versions of `requets` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:10:10Z
2020-09-02T21:13:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/868'}
null
npm
GHSA-v6cj-r88p-92rm
Buffer Overflow in centra
## Denial of Service ### Impact Affected Centra versions will, when not in stream mode, buffer responses to requests into memory with no size limit. This issue affects anyone requesting content from untrusted sources. ### Patches Version 2.4.0 resolves the issue by limiting the size of buffered response body. ### Workarounds Attempting workarounds isn't recommended. Updating is preferred. ### For more information If you have any questions or comments about this advisory, open an issue in [ethanent/centra](https://github.com/ethanent/centra).
null
2021-09-20T15:40:54Z
2019-09-30T19:31:59Z
HIGH
null
{'CWE-119'}
{'https://github.com/ethanent/centra', 'https://github.com/advisories/GHSA-v6cj-r88p-92rm', 'https://snyk.io/vuln/SNYK-JS-CENTRA-536073', 'https://github.com/ethanent/centra/security/advisories/GHSA-v6cj-r88p-92rm'}
null
npm
GHSA-788m-pj96-7w2c
Cross-Site Scripting in fomantic-ui
Versions of `fomantic-ui` are vulnerable to Cross-Site Scripting. Lack of output encoding on the selection dropdowns can lead to user input being executed instead of printed as text. ## Recommendation Upgrade to version 2.7.0 or later.
null
2021-09-27T21:41:40Z
2020-09-02T21:23:51Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/885', 'https://github.com/fomantic/Fomantic-UI', 'https://github.com/fomantic/Fomantic-UI/releases/tag/2.7.0'}
null
npm
GHSA-8f9f-pc5v-9r5h
Malicious takeover of previously owned ENS names
### Impact A user who owns an ENS domain can set a "trapdoor", allowing them to transfer ownership to another user, and later regain ownership without the new owner's consent or awareness. ### Patches A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. The registry is newly deployed at [0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e](https://etherscan.io/address/0x00000000000C2E074eC69A0dFb2997BA6C7d2e1e). ### Workarounds Do not accept transfers of ENS domains from other users on the old registrar.
{'CVE-2020-5232'}
2021-01-08T20:31:45Z
2020-01-30T23:55:04Z
CRITICAL
null
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5232', 'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf', 'https://github.com/ensdomains/ens/security/advisories/GHSA-8f9f-pc5v-9r5h'}
null
npm
GHSA-r628-mhmh-qjhw
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2. ### Patches 3.2.3 || 4.4.15 || 5.0.7 || 6.1.2 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom `filter` method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patch versions, rather than attempt to sanitize tar input themselves.
{'CVE-2021-32803'}
2021-08-30T23:14:33Z
2021-08-03T19:00:40Z
HIGH
null
{'CWE-23', 'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw', 'https://www.npmjs.com/advisories/1771', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803', 'https://github.com/npm/node-tar'}
null
npm
GHSA-563h-697m-j7x5
Malicious Package in device-mqtt
Version 1.0.11 of `device-mqtt` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:35Z
2020-09-03T19:18:58Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1109'}
null
npm
GHSA-62gr-4qp9-h98f
Regular Expression Denial of Service in Handlebars
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
{'CVE-2019-20922'}
2021-04-22T23:31:21Z
2022-02-10T20:38:22Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1300', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922', 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b', 'https://www.npmjs.com/package/handlebars', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388'}
null
npm
GHSA-g6ww-v8xp-vmwg
Prototype pollution in pathval
A prototype pollution vulnerability affects all versions of package pathval under 1.1.1.
{'CVE-2020-7751'}
2022-04-18T21:58:49Z
2022-02-10T20:21:24Z
HIGH
null
{'CWE-20', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7751', 'https://github.com/chaijs/pathval/releases/tag/v1.1.1', 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a', 'https://github.com/chaijs/pathval', 'https://github.com/chaijs/pathval/pull/58/files', 'https://snyk.io/vuln/SNYK-JS-PATHVAL-596926'}
null
npm
GHSA-46c4-8wrp-j99v
Improper Validation and Sanitization in url-parse
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
{'CVE-2020-8124'}
2021-03-22T21:07:36Z
2022-01-06T20:30:34Z
MODERATE
null
{'CWE-20'}
{'https://hackerone.com/reports/496293', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8124'}
null
npm
GHSA-rh6c-q938-3r9q
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
{'CVE-2013-7452'}
2021-09-17T18:17:08Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7452', 'https://github.com/advisories/GHSA-rh6c-q938-3r9q'}
null
npm
GHSA-j3ff-xp6c-6gcc
Failure to validate signature during handshake
### Impact `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. ### Patches Users should upgrade to 4.1.2 or 5.0.3 ### Workarounds No workarounds, just patch upgrade ### References https://github.com/ChainSafe/js-libp2p-noise/pull/130
{'CVE-2022-24759'}
2022-03-18T18:57:53Z
2022-03-18T18:57:53Z
HIGH
null
{'CWE-347'}
{'https://github.com/ChainSafe/js-libp2p-noise/pull/130', 'https://github.com/ChainSafe/js-libp2p-noise/releases/tag/v5.0.3', 'https://github.com/ChainSafe', 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24759'}
null
npm
GHSA-c7m7-4257-h698
Prototype Pollution in templ8
All versions of package templ8 up to and including 0.0.44 are vulnerable to Prototype Pollution via the parse function.
{'CVE-2020-7702'}
2021-05-05T21:29:36Z
2021-05-06T17:29:13Z
CRITICAL
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-TEMPL8-598770', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7702'}
null
GSD
GSD-2022-1000074
malicious code in PyPi Humanqueen version all
In the PyPi Easyfuncsys package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user, additionally it appears to be stealing leveldb files.
null
2022-02-02T18:53:12.653286Z
2022-02-02T18:53:12.653286Z
null
null
null
{'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository', 'https://pepy.tech/project/humanqueen'}
null
GSD
GSD-2022-1000075
Malicious code in PyPi Humanqueenn version all
In the PyPi Easyfuncsys package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user, additionally it appears to be stealing leveldb files.
null
2022-02-02T18:55:16.940754Z
2022-02-02T18:55:16.940754Z
null
null
null
{'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository', 'https://pepy.tech/project/humanqueenn'}
null
GSD
GSD-2022-1000072
Backdoor in PyPi xss package version all
In the PyPi xss package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user.
null
2022-02-02T18:47:52.318148Z
2022-02-02T18:47:52.318148Z
null
null
null
{'https://pepy.tech/project/xss', 'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository'}
null
GSD
CAN-2022-1000071
Default Credentials in XB6 Fibre+ Gateway version XB6_0821
In Shaw Communications Inc XB6 Fibre+ Gateway version XB6_0821 a Default Credentials exists in the Router/Modem that can be attacked via local access resulting in Admin access to router
null
2022-02-01T19:38:14.238938Z
2022-02-01T19:38:14.238938Z
null
null
null
{'https://support.shaw.ca/t5/internet-articles/guide-fibre-gateway-xb6-xb7/ta-p/5114'}
null
GSD
GSD-2022-1000073
malicious code in PyPi Easyfuncsys version all
In the PyPi Easyfuncsys package there is malicious code that appears to be stealing Discord tokens allowing it to access Discord as that user, additionally it steals leveldb files, and runs a suspicious EXE.
null
2022-02-02T18:51:06.691479Z
2022-02-02T18:51:06.691479Z
null
null
null
{'https://blog.sonatype.com/malicious-roblox-cookie-and-discord-token-stealers-hit-pypi-repository', 'https://pepy.tech/project/Easyfuncsys'}
null
GSD
CAN-2022-1000284
Risk in WISP version general
In Netonix WISP version general a Risk exists in the Firmware update frequency/method/stability that can be attacked via N/A resulting in risk of use of older protocols / slower firmware patching speed / rushed instable updates
null
2022-02-23T11:57:23.287111Z
2022-02-23T11:57:23.287111Z
null
null
null
{'https://forum.netonix.com/'}
null
GSD
GSD-2022-1000069
Hardware glitching attack in Trezor One Hardware Wallet version Unknown
The Trezor Hardware Wallet One based on the ARM Cortex-M3-based STM32 F2 uses the RDP2 security level by default (in SDP2 RAM cannot be copied), but the security can be downgraded to RDP1 (where the contents of memory can be copied) via glitch injection during device power on. Please note although the timing of the glitch is largely up to chance an attacker with access to the hardware and several hours can recover it through a simple brute force attack (power wallet on, glitch, repeat until it works). The exploitation of this vulnerability has been confirmed and a Youtube video with extensive details is available. As hardware wallets are explicitly designed to prevent physical attacks from recovering seed material this represents a major vulnerability.
null
2022-02-01T17:44:59.482663Z
2022-02-01T17:44:59.482663Z
null
null
null
{'https://www.youtube.com/watch?v=dT9y-KQbqi4', 'https://www.theverge.com/2022/1/24/22898712/crypto-hardware-wallet-hacking-lost-bitcoin-ethereum-nft'}
null
GSD
GSD-2022-1000284
Risk in WISP version general
In Netonix WISP version general a Risk exists in the Firmware update frequency/method/stability that can be attacked via N/A resulting in risk of use of older protocols / slower firmware patching speed / rushed instable updates
null
2022-02-23T11:57:23.287111Z
2022-02-23T11:57:23.287111Z
null
null
null
{'https://forum.netonix.com/'}
null
GSD
GSD-2022-1000070
Reliance on improperly secured communications channel (Discord) in Grape Network version unknown
In Grape Network Grape Network version unknown a Reliance on improperly secured communications channel (Discord) exists in the Discord community "announcement" channels for multiple NFTs that can be attacked via unknown resulting in access Grape Network tokens was used to send Discord server messages resulting in social engineering of access to crypto wallets resulting in $1.3 Million USD (Monkey Kingdom) and $150,000 USD (Fractal) in stolen funds
null
2022-02-01T17:45:15.768503Z
2022-02-01T17:45:15.768503Z
null
null
null
{'https://twitter.com/MonkeyKingdom_/status/1473312369556213769', 'https://twitter.com/justinkan/status/1473328245030277122', 'https://cointelegraph.com/news/hong-kong-nft-project-monkey-kingdom-loses-1-3m-in-phishing-hack-launches-compensation-fund', 'https://www.theverge.com/2022/1/7/22870912/nft-communities-boom-discord-hackers-cryptocurrency-webhooks', 'https://twitter.com/grapeprotocol/status/1473422238250680320', 'https://it.slashdot.org/story/22/01/07/1957250/discord-hacking-is-the-newest-threat-for-nft-buyers'}
null
GSD
GSD-2022-1000071
Default Credentials in XB6 Fibre+ Gateway version XB6_0821
In Shaw Communications Inc XB6 Fibre+ Gateway version XB6_0821 a Default Credentials exists in the Router/Modem that can be attacked via local access resulting in Admin access to router
null
2022-02-01T19:38:14.238938Z
2022-02-01T19:38:14.238938Z
null
null
null
{'https://support.shaw.ca/t5/internet-articles/guide-fibre-gateway-xb6-xb7/ta-p/5114'}
null
GSD
GSD-2022-1000285
Unsafe default configuration values in Nginx version all version
# INFORMATIONAL In Nginx, all versions, a number of unsafe default configuration values exists in the web server that can be attacked via the network resulting in disclosure of information and availability. These include but are not limited to: 1. Not enough file descriptors per worker 2. The error_log off directive 3. Not enabling keepalive connections to upstream servers 4. Forgetting how directive inheritance works 5. The proxy_buffering off directive 6. Improper use of the if directive 7. Excessive health checks 8. Unsecured access to metrics 9. Using ip_hash when all traffic comes from the same /24 CIDR block 10. Not taking advantage of upstream groups
null
2022-02-23T19:01:53.222611Z
2022-02-23T19:01:53.222611Z
null
null
null
{'https://news.ycombinator.com/item?id=30435282', 'https://www.nginx.com/blog/avoiding-top-10-nginx-configuration-mistakes/#unsecured-metrics'}
null
GSD
GSD-2022-1000076
Unknown vulnerability in Wormhole on 2022-02-02 resulting in 120K ETH on Solana by an attacker.
An attacker was able to exploit a bug in Wormhole allowing them to mint 120K ETH on Solana worth approximately $300 Million USD. This has been confirmed with an on-chain message from Wormhole offering a $10 Million USD bug bounty if the newly minted tokens are returned to Wormhole. Wormhole has also stated that the vulnertability has been patched.
null
2022-02-02T23:13:19.928218Z
2022-02-02T23:13:19.928218Z
null
null
null
{'https://twitter.com/wormholecrypto/status/1489001949881978883', 'https://twitter.com/RektHQ/status/1488994599318208512', 'https://www.notifi.xyz/messages/1497', 'https://decrypt.co/91899/hacker-steals-250-million-solana-ethereum-bridge-wormhole', 'https://twitter.com/VitalikButerin/status/1479501366192132099', 'https://twitter.com/samczsun/status/1489044939732406275', 'https://twitter.com/0xB07DAD/status/1488982652174540802', 'https://twitter.com/samczsun/status/1488974372756987906', 'https://thedefiant.io/wormhole-exploit-320m/', 'https://twitter.com/wormholecrypto/status/1489036273012682753', 'https://twitter.com/wormholecrypto/status/1488976115750383626', 'https://twitter.com/DefiantNews/status/1489012237683486721', 'https://twitter.com/wormholecrypto/status/1488997053631971331', 'https://twitter.com/tony_intern/status/1488979589602840581', 'https://old.reddit.com/r/ethereum/comments/rwojtk/ama_we_are_the_efs_research_team_pt_7_07_january/hrngyk8/', 'https://etherscan.io/tx/0x24c7d855a0a931561e412d809e2596c3fd861cc7385566fd1cb528f9e93e5f14'}
null
GSD
GSD-2022-1000955
Access control check in Elementor WordPress plugin version =<3.6.2
In Elementor WordPress plugin version 3.6.2 and earlier an access control check vulnerability exists. To quote Bill Toulas from BleepingComputer: "The problem lies in the absence of a crucial access check on one of the plugin's files, "module.php", which is loaded on every request during the admin_init action, even for users that are not logged in, the researchers explain." This can be attacked via the network using standard web requests, resulting in remote code execution. This is fixed in version 3.6.3.
null
2022-04-13T16:18:45.179126Z
2022-04-13T16:18:45.179126Z
null
null
null
{'https://www.pluginvulnerabilities.com/2022/04/12/5-million-install-wordpress-plugin-elementor-contains-authenticated-remote-code-execution-rce-vulnerability/', 'https://www.bleepingcomputer.com/news/security/critical-flaw-in-elementor-wordpress-plugin-may-affect-500k-sites/'}
null
GSD
GSD-2021-1001147
CWE-89 in Secure Remote Access (SRA) version 8.x, 9.0.0.9-26sv and earlier
SonicWall is aware of improper neutralization of a SQL Command leading to SQL Injection vulnerability, reported by CrowdStrike, impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware or an old version of firmware 9.x (9.0.0.9-26sv or earlier). In February 2021, SonicWall released SMA firmware 10.2.0.7 and 9.0.0.10 to fix a zero-day vulnerability, along with additional comprehensive code-strengthening. This strengthening proactively prevented this newly reported vulnerability in 9.0.0.10. Organizations that already upgraded to the 9.0.0.10 firmware are already protected against this newly reported issue and don’t need to take any action. Organizations with any 10.x version is not subject to this vulnerability as the vulnerable feature was deprecated in the 10.x release. Organizations running any firmware versions of 8.x or older than 9.0.0.10 or 10.2.0.7 should, per our earlier instructions, upgrade immediately. These older versions may potentially be exploited if not patched immediately. SMA 1000 Series products are not affected by this vulnerability.
null
2021-07-17T15:03:52.309482Z
2021-07-17T15:03:52.309482Z
null
null
null
{'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0017'}
null
GSD
GSD-2022-1000283
Multiple vulnerabilities in NFT version All
A phishing attack was conducted against users of the Opensea.io NFT platform, resulting in 17 users losing approx. $1.7 Million USD in NFTs. This incident appears to include email phishing, a fake website, bad wallet UI that make it difficult for users to know exactly what is going on and use of the Wyvern 2.2 version Smart Contract which is being deprecated. Please note that this issue may be split into multiple GSD IDs at some point, e.g. for the bad wallet UI (you are selling something for 0 ETH which should generate a warning), lack of EIP-712 support in the Smart Contract which makes signing things more dangerous and so on.
null
2022-02-23T01:55:19.527375Z
2022-02-23T01:55:19.527375Z
null
null
null
{'https://twitter.com/onbjerg/status/1495209661645131777', 'https://threatpost.com/nft-investors-lose-1-7m-in-opensea-phishing-attack/178558/', 'https://www.theverge.com/2022/2/20/22943228/opensea-phishing-hack-smart-contract-bug-stolen-nft', 'https://twitter.com/isotile/status/1495234649970421760?s=21', 'https://www.reddit.com/r/CryptoCurrency/comments/swshf5/opensea_nft_hack_explain_thread/', 'https://www.coindesk.com/business/2022/02/20/opensea-investigating-exploit-rumors-as-users-complain-of-missing-nfts/', 'https://twitter.com/YannickCrypto/status/1495228939287113734', 'https://twitter.com/NadavAHollander/status/1495509511179755530', 'https://www.zdnet.com/article/opensea-scam-artists-swindle-nfts-worth-millions-in-phishing-attack/', 'https://cryptodeadline.com/opensea-has-been-attacked-by-phishing-with-its-new-upgrade/', 'https://twitter.com/NFTDrops/status/1495479006396833793', 'https://twitter.com/125Citizen/status/1495209637712388098', 'https://twitter.com/opensea/status/1495211277097996290', 'https://twitter.com/opensea/status/1495625768713469954', 'https://ca.finance.yahoo.com/news/opensea-investigating-exploit-rumors-users-033216712.html', 'https://twitter.com/TheAlexAlbi/status/1495236036875763716', 'https://twitter.com/dev_allo/status/1495211980902313989', 'https://etherscan.io/address/0x3e0defb880cd8e163bad68abe66437f99a7a8a74'}
null
GSD
GSD-2022-1000077
CWE-749 in Dragos version all versions
In RigoBlock Dragos, all versions as of 2022-02-17 and later (until a major protocol update is accomplished) contain an exposed function (CWE-749), specifically setMultipleAllowances() which was not set to onlyOwner. The setMultipleAllowances() function can be to manipulate tokens with the contract.
null
2022-02-18T03:50:18.115366Z
2022-02-18T03:50:18.115366Z
null
null
null
{'https://etherscan.io/contractdiffchecker?a1=0x876b9ebd725d1fa0b879fcee12560a6453b51dc8', 'https://twitter.com/danielvf/status/1494317265835147272', 'https://twitter.com/RigoBlock/status/1494351180713050116', 'https://etherscan.io/tx/0x5a6c108d5a729be2011cd47590583a04444d4e7c85cd0427071b968edc3bfc1f'}
null
Hex
GHSA-qpmc-wprv-x746
Inline DTD allows XML bomb attack
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
{'CVE-2019-15160'}
2022-04-12T21:31:26Z
2022-04-12T21:31:26Z
HIGH
null
{'CWE-611', 'CWE-776'}
{'https://hex.pm/packages/sweet_xml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15160', 'https://github.com/kbrw/sweet_xml', 'https://github.com/kbrw/sweet_xml/issues/71'}
null
Hex
GHSA-5653-437f-5hmc
Denial of service
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This is unsafe as it is user provided data, and can be used to fill up the whole atom table of ~1M which will cause the app to crash.
{'CVE-2019-16764'}
2022-04-12T21:29:30Z
2022-04-12T21:29:30Z
MODERATE
null
{'CWE-400'}
{'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf', 'https://hex.pm/packages/pow_assent', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764', 'https://github.com/pow-auth/pow_assent', 'https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986', 'http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1'}
null
Hex
GHSA-2xxx-fhc8-9qvq
Missing `is_nil` requirement
Ecto will not raise on queries with non-explicit nil comparisons (ie if they aren't checked with `is_nil`).
null
2022-04-12T19:42:45Z
2022-04-12T19:42:45Z
MODERATE
null
null
{'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250', 'https://github.com/elixir-ecto/ecto', 'https://groups.google.com/forum/#!topic/elixir-ecto/0m4NPfg_MMU', 'https://github.com/elixir-ecto/ecto/pull/2125'}
null
Hex
GHSA-5chx-gg25-v37m
Cross-site Scripting in xain
XSS is possible via the use of the order query parameter. An example request would look like: ``` http://host/ressources?order=%27><script>alert(1);</script> ```
{'CVE-2018-20302'}
2022-04-12T21:17:38Z
2022-04-12T21:17:38Z
MODERATE
null
{'CWE-79'}
{'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/xain/2018-09-03.yml', 'https://github.com/smpallen99/xain', 'https://github.com/smpallen99/xain/issues/18', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20302'}
null
Hex
GHSA-w98m-2xqg-9cvj
Remote Code Execution in paginator
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. ### Impact There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. This will potentially affect all current users of `Paginator` prior to version >= 1.0.0. ### Patches The vulnerability has been patched in version 1.0.0 and all users should upgrade to this version immediately. Note that this patched version uses a dependency that requires an Elixir version >=1.5. ### Credits Thank you to Peter Stöckli.
{'CVE-2020-15150'}
2022-04-12T19:36:39Z
2022-04-12T19:36:39Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15150', 'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8', 'https://hex.pm/packages/paginator', 'https://github.com/duffelhq/paginator', 'https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations', 'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj'}
null
Hex
GHSA-2q6v-32mr-8p8x
Null Byte Injection in Plug.Static
Plug.Static is used for serving static assets, and is vulnerable to null byte injection. If file upload functionality is provided, this can allow users to bypass filetype restrictions. We recommend all applications that provide file upload functionality and serve those uploaded files locally with Plug.Static to upgrade immediately or include the fix below. If uploaded files are rather stored and served from S3 or any other cloud storage, you are not affected.
{'CVE-2017-1000052'}
2022-04-12T21:20:20Z
2022-04-12T21:20:20Z
HIGH
null
{'CWE-74'}
{'https://github.com/elixir-plug/plug', 'https://elixirforum.com/t/security-releases-for-plug/3913', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000052'}
null
Hex
GHSA-5v4m-c73v-c7gq
Arbitrary Code Execution in Cookie Serialization
The default serialization used by Plug session may result in code execution in certain situations. Keep in mind, however, the session cookie is signed and this attack can only be exploited if the attacker has access to your secret key as well as your signing/encryption salts. We recommend users to change their secret key base and salts if they suspect they have been leaked, regardless of this vulnerability.
{'CVE-2017-1000053'}
2022-04-12T21:23:43Z
2022-04-12T21:23:43Z
HIGH
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000053', 'https://elixirforum.com/t/security-releases-for-plug/3913', 'https://github.com/elixir-plug/plug'}
null
Hex
GHSA-j3gg-r6gp-95q2
XSS in HEEx class attributes
The `class` attribute was not protected against XSS attacks when using HEEx.
null
2022-04-12T20:22:57Z
2022-04-12T20:22:57Z
MODERATE
null
{'CWE-79'}
{'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620', 'https://github.com/phoenixframework/phoenix_html'}
null
Hex
GHSA-v2wf-c3j6-wpvw
Session fixation
### Impact The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability. ### Workarounds Call `Plug.Conn.configure_session(conn, renew: true)` periodically and after privilege change. A custom authorization plug can be written where the `create/3` method should return the `conn` only after `Plug.Conn.configure_session/2` have been called on it. ### References https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f https://www.owasp.org/index.php/Session_fixation
{'CVE-2020-5205'}
2022-04-12T21:27:49Z
2022-04-12T21:27:49Z
MODERATE
null
{'CWE-384'}
{'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw', 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f', 'https://github.com/danschultzer/pow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5205', 'https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1016-2020-01-07'}
null
Hex
GHSA-cmfh-8f8r-fj96
Arbitrary URL Redirect
The Phoenix team designed Phoenix.Controller.redirect/2 to protect against redirects allowing user input to redirect to an external URL where your application code otherwise assumes a local path redirect. This is why the :to option is used for “local” URL redirects and why you must pass the :external option to intentionally allow external URLs to be redirected to. It has been disclosed that carefully crafted user input may be treated by some browsers as an external URL. An attacker can use this vulnerability to aid in social engineering attacks. The most common use would be to create highly believable phishing attacks. For example, the following user input would pass local URL validation, but be treated by Chrome and Firefox as external URLs: http://localhost:4000/?redirect=/\nexample.com Not all browsers are affected, but latest Chrome and Firefox will issue a get request for example.com and successfully redirect externally
{'CVE-2017-1000163'}
2022-04-12T21:16:09Z
2022-04-12T21:16:09Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000163', 'https://github.com/phoenixframework/phoenix', 'https://elixirforum.com/t/security-releases-for-phoenix/4143'}
null
Hex
GHSA-9h73-w7ch-rh73
Header Injection
Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1.0.6.
{'CVE-2018-1000883'}
2022-04-12T21:26:27Z
2022-04-12T21:26:27Z
MODERATE
null
{'CWE-20'}
{'https://github.com/elixir-plug/plug', 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883', 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml'}
null
Hex
GHSA-mrq8-53r4-3j5m
Permissive parameters and privilege escalation
An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confirmed_at parameter with their registration request.
{'CVE-2018-20301'}
2022-01-27T20:15:58Z
2022-02-10T22:35:39Z
MODERATE
null
{'CWE-20'}
{'https://github.com/smpallen99/coherence', 'https://github.com/smpallen99/coherence/issues/270', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20301'}
null
Packagist
GHSA-rh5w-82wh-jhr8
XSS vulnerability on asset view
### Impact Mautic versions before 3.3.4 / 4.0.0 are vulnerable to an inline JS XSS attack when viewing Mautic assets by utilizing inline JS in the title and adding a broken image URL as a remote asset. This can only be leveraged by an authenticated user with permission to create or edit assets. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2021-27912'}
2021-08-30T18:05:54Z
2021-09-01T18:40:31Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27912', 'https://github.com/mautic/mautic', 'https://github.com/mautic/mautic/security/advisories/GHSA-rh5w-82wh-jhr8'}
null
Packagist
GHSA-qpxw-6473-ppww
Session Fixation in Subrion CMS
Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie.
{'CVE-2020-12467'}
2021-05-25T20:45:01Z
2021-06-22T15:23:04Z
MODERATE
null
{'CWE-384'}
{'https://github.com/belong2yourself/vulnerabilities/tree/master/Subrion%20CMS/Session%20Fixation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12467'}
null