Edgar Joya created GRIFFIN-258:
----------------------------------

             Summary: [UI] Npm Audit 
                 Key: GRIFFIN-258
                 URL: https://issues.apache.org/jira/browse/GRIFFIN-258
             Project: Griffin
          Issue Type: Improvement
            Reporter: Edgar Joya


 Running npm audi, the current packages are vulnerable or other.
{code:java}
{
"actions": [
{
"action": "install",
"module": "@angular/cli",
"target": "8.0.4",
"isMajor": true,
"resolves": [
{
"id": 788,
"path": "@angular/cli>css-loader>cssnano>postcss-svgo>svgo>js-yaml",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 788,
"path": "@angular/cli>cssnano>postcss-svgo>svgo>js-yaml",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 813,
"path": "@angular/cli>css-loader>cssnano>postcss-svgo>svgo>js-yaml",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 813,
"path": "@angular/cli>cssnano>postcss-svgo>svgo>js-yaml",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 39,
"path": "@angular/cli>postcss-url>directory-encoder>handlebars>uglify-js",
"dev": true,
"optional": true,
"bundled": false
},
{
"id": 48,
"path": "@angular/cli>postcss-url>directory-encoder>handlebars>uglify-js",
"dev": true,
"optional": true,
"bundled": false
},
{
"id": 535,
"path": "@angular/cli>url-loader>mime",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 566,
"path": "@angular/cli>less>request>hawk>boom>hoek",
"dev": true,
"optional": true,
"bundled": false
},
{
"id": 566,
"path": "@angular/cli>less>request>hawk>cryptiles>boom>hoek",
"dev": true,
"optional": true,
"bundled": false
},
{
"id": 566,
"path": "@angular/cli>less>request>hawk>hoek",
"dev": true,
"optional": true,
"bundled": false
},
{
"id": 566,
"path": "@angular/cli>less>request>hawk>sntp>hoek",
"dev": true,
"optional": true,
"bundled": false
},
{
"id": 755,
"path": "@angular/cli>postcss-url>directory-encoder>handlebars",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 61,
"path": "@angular/cli>postcss-url>directory-encoder>handlebars",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 786,
"path": "@angular/cli>webpack-dev-server>chokidar>anymatch>micromatch>braces",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 786,
"path": 
"@angular/cli>webpack-dev-server>http-proxy-middleware>micromatch>braces",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 725,
"path": "@angular/cli>webpack-dev-server",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "install",
"module": "karma",
"target": "4.1.0",
"isMajor": true,
"resolves": [
{
"id": 782,
"path": "karma>lodash",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 577,
"path": "karma>lodash",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>engine.io>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>socket.io-adapter>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>socket.io-client>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>socket.io-client>engine.io-client>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>socket.io-adapter>socket.io-parser>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>socket.io-client>socket.io-parser>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 534,
"path": "karma>socket.io>socket.io-parser>debug",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 786,
"path": "karma>chokidar>anymatch>micromatch>braces",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 786,
"path": "karma>expand-braces>braces",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 550,
"path": "karma>socket.io>engine.io>ws",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 550,
"path": "karma>socket.io>socket.io-client>engine.io-client>ws",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 528,
"path": "karma>socket.io>socket.io-client>engine.io-client>parsejson",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "install",
"module": "protractor",
"target": "6.0.0",
"isMajor": true,
"resolves": [
{
"id": 593,
"path": "protractor>saucelabs>https-proxy-agent",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 681,
"path": "protractor>webdriver-js-extender>selenium-webdriver>adm-zip",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 550,
"path": "protractor>webdriver-js-extender>selenium-webdriver>ws",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "install",
"module": "angular-tree-component",
"target": "8.4.0",
"isMajor": true,
"resolves": [
{
"id": 782,
"path": "angular-tree-component>lodash",
"dev": true,
"optional": false,
"bundled": false
},
{
"id": 577,
"path": "angular-tree-component>lodash",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "review",
"module": "https-proxy-agent",
"resolves": [
{
"id": 593,
"path": "typings>typings-core>popsicle-proxy-agent>https-proxy-agent",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "review",
"module": "http-proxy-agent",
"resolves": [
{
"id": 607,
"path": "typings>typings-core>popsicle-proxy-agent>http-proxy-agent",
"dev": true,
"optional": false,
"bundled": false
}
]
},
{
"action": "review",
"module": "moment",
"resolves": [
{
"id": 532,
"path": "ng2-bootstrap>moment",
"dev": false,
"optional": false,
"bundled": false
}
]
}
],
"advisories": {
"39": {
"findings": [
{
"version": "2.3.6",
"paths": [
"@angular/cli>postcss-url>directory-encoder>handlebars>uglify-js"
],
"dev": true,
"optional": true,
"bundled": false
}
],
"id": 39,
"created": "2015-10-17T19:41:46.382Z",
"updated": "2019-06-14T23:28:21.694Z",
"deleted": null,
"title": "Incorrect Handling of Non-Boolean Comparisons During Minification",
"found_by": {
"name": "Tom MacWright"
},
"reported_by": {
"name": "Tom MacWright"
},
"module_name": "uglify-js",
"cves": [
"CVE-2015-8857"
],
"vulnerable_versions": "<= 2.4.23",
"patched_versions": ">= 2.4.24",
"overview": "Versions of `uglify-js` prior to 2.4.24 are affected by a 
vulnerability which may cause crafted JavaScript to have altered functionality 
after minification.\n\n",
"recommendation": "Upgrade UglifyJS to version >= 2.4.24.",
"references": "- [Backdooring JS - Yan 
Zhu(@bcrypt)](https://zyan.scripts.mit.edu/blog/backdooring-js/)\n- [Issue 
#751](https://github.com/mishoo/UglifyJS2/issues/751)",
"access": "public",
"severity": "low",
"cwe": "CWE-95",
"metadata": {
"module_type": "Multi.Compiler",
"exploitability": 2,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/39";
},
"48": {
"findings": [
{
"version": "2.3.6",
"paths": [
"@angular/cli>postcss-url>directory-encoder>handlebars>uglify-js"
],
"dev": true,
"optional": true,
"bundled": false
}
],
"id": 48,
"created": "2015-10-24T17:58:34.232Z",
"updated": "2018-02-24T00:59:58.129Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Adam Baldwin"
},
"reported_by": {
"name": "Adam Baldwin"
},
"module_name": "uglify-js",
"cves": [
"CVE-2015-8858"
],
"vulnerable_versions": "<2.6.0",
"patched_versions": ">=2.6.0",
"overview": "Versions of `uglify-js` prior to 2.6.0 are affected by a regular 
expression denial of service vulnerability when malicious inputs are passed 
into the `parse()` method.\n\n\n### Proof of Concept\n\n```\nvar u = 
require('uglify-js');\nvar genstr = function (len, chr) {\n var result = 
\"\";\n for (i=0; i<=len; i++) {\n result = result + chr;\n }\n\n return 
result;\n}\n\nu.parse(\"var a = \" + genstr(process.argv[2], \"1\") + 
\".1ee7;\");\n```\n\n### Results\n```\n$ time node test.js 
10000\nreal\t0m1.091s\nuser\t0m1.047s\nsys\t0m0.039s\n\n$ time node test.js 
80000\nreal\t0m6.486s\nuser\t0m6.229s\nsys\t0m0.094s\n```",
"recommendation": "Update to version 2.6.0 or later.",
"references": "",
"access": "public",
"severity": "low",
"cwe": "CWE-400",
"metadata": {
"module_type": "CLI.Compiler",
"exploitability": 3,
"affected_components": "Internal::Code::Method::parse([*])"
},
"url": "https://npmjs.com/advisories/48";
},
"61": {
"findings": [
{
"version": "1.3.0",
"paths": [
"@angular/cli>postcss-url>directory-encoder>handlebars"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 61,
"created": "2015-12-14T16:51:56.173Z",
"updated": "2019-06-24T15:19:06.409Z",
"deleted": null,
"title": "Cross-Site Scripting",
"found_by": {
"name": "Matias P. Brutti"
},
"reported_by": {
"name": "Matias P. Brutti"
},
"module_name": "handlebars",
"cves": [
"CVE-2015-8861"
],
"vulnerable_versions": "<4.0.0",
"patched_versions": ">=4.0.0",
"overview": "Versions of `handlebars` prior to 4.0.0 are affected by a 
cross-site scripting vulnerability when attributes in handlebar templates are 
not quoted.\n\n\n## Proof of Concept\nTemplate:\n```<a 
href={{foo}}/>```\n\nInput:\n```{ 'foo' : 'test.com 
onload=alert(1)'}```\n\nRendered result:\n```<a href=test.com 
onload=alert(1)/>```",
"recommendation": "Update to version 4.0.0 or later.\nAlternatively, ensure 
that all attributes in handlebars templates are encapsulated with quotes.",
"references": "- [SourceClear - Handlebars Research 
Findings](https://blog.srcclr.com/handlebars_vulnerability_research_findings/)\n-
 [PR #1083](https://github.com/wycats/handlebars.js/pull/1083)",
"access": "public",
"severity": "high",
"cwe": "CWE-79",
"metadata": {
"module_type": "Network.Library",
"exploitability": 7,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/61";
},
"528": {
"findings": [
{
"version": "0.0.3",
"paths": [
"karma>socket.io>socket.io-client>engine.io-client>parsejson"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 528,
"created": "2017-09-08T20:43:02.594Z",
"updated": "2018-04-09T00:18:57.149Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Cristian-Alexandru Staicu"
},
"reported_by": {
"name": "Cristian-Alexandru Staicu"
},
"module_name": "parsejson",
"cves": [
"CVE-2017-16113"
],
"vulnerable_versions": "<=0.0.3",
"patched_versions": "<0.0.0",
"overview": "Affected versions of `parsejson` are vulnerable to a regular 
expression denial of service when parsing untrusted user input.",
"recommendation": "The `parsejson` package has not been functionally updated 
since it was initially released.\n\nAdditionally, it provides functionality 
which is natively included in Node.js, and therefore the native `JSON.parse()` 
should be used, for both performance and security reasons.",
"references": "[Issue #4](https://github.com/get/parsejson/issues/4)",
"access": "public",
"severity": "high",
"cwe": "CWE-400",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/528";
},
"532": {
"findings": [
{
"version": "2.18.1",
"paths": [
"ng2-bootstrap>moment"
],
"dev": false,
"optional": false,
"bundled": false
}
],
"id": 532,
"created": "2017-09-21T20:40:00.889Z",
"updated": "2019-06-24T15:10:05.868Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Cristian-Alexandru Staicu"
},
"reported_by": {
"name": "Cristian-Alexandru Staicu"
},
"module_name": "moment",
"cves": [],
"vulnerable_versions": "<2.19.3",
"patched_versions": ">=2.19.3",
"overview": "Affected versions of `moment` are vulnerable to a low severity 
regular expression denial of service when parsing dates as strings.",
"recommendation": "Update to version 2.19.3 or later.",
"references": "- [Issue #4163](https://github.com/moment/moment/issues/4163)\n- 
[PR #4326](https://github.com/moment/moment/pull/4326)",
"access": "public",
"severity": "low",
"cwe": "CWE-400",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/532";
},
"534": {
"findings": [
{
"version": "2.3.3",
"paths": [
"karma>socket.io>debug",
"karma>socket.io>engine.io>debug",
"karma>socket.io>socket.io-adapter>debug",
"karma>socket.io>socket.io-client>debug",
"karma>socket.io>socket.io-client>engine.io-client>debug"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "2.2.0",
"paths": [
"karma>socket.io>socket.io-adapter>socket.io-parser>debug",
"karma>socket.io>socket.io-client>socket.io-parser>debug",
"karma>socket.io>socket.io-parser>debug"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 534,
"created": "2017-09-25T18:55:55.956Z",
"updated": "2018-05-16T19:37:43.686Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Cristian-Alexandru Staicu"
},
"reported_by": {
"name": "Cristian-Alexandru Staicu"
},
"module_name": "debug",
"cves": [
"CVE-2017-16137"
],
"vulnerable_versions": "<= 2.6.8 || >= 3.0.0 <= 3.0.1",
"patched_versions": ">= 2.6.9 < 3.0.0 || >= 3.1.0",
"overview": "Affected versions of `debug` are vulnerable to regular expression 
denial of service when untrusted user input is passed into the `o` formatter. 
\n\nAs it takes 50,000 characters to block the event loop for 2 seconds, this 
issue is a low severity issue.",
"recommendation": "Version 2.x.x: Update to version 2.6.9 or later.\nVersion 
3.x.x: Update to version 3.1.0 or later.\n",
"references": "- [Issue 
#501](https://github.com/visionmedia/debug/issues/501)\n- [PR 
#504](https://github.com/visionmedia/debug/pull/504)",
"access": "public",
"severity": "low",
"cwe": "CWE-400",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/534";
},
"535": {
"findings": [
{
"version": "1.3.6",
"paths": [
"@angular/cli>url-loader>mime"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 535,
"created": "2017-09-25T19:02:28.152Z",
"updated": "2018-04-09T00:38:22.785Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"name": "Cristian-Alexandru Staicu"
},
"reported_by": {
"name": "Cristian-Alexandru Staicu"
},
"module_name": "mime",
"cves": [
"CVE-2017-16138"
],
"vulnerable_versions": "< 1.4.1 || > 2.0.0 < 2.0.3",
"patched_versions": ">= 1.4.1 < 2.0.0 || >= 2.0.3",
"overview": "Affected versions of `mime` are vulnerable to regular expression 
denial of service when a mime lookup is performed on untrusted user input.",
"recommendation": "Update to version 2.0.3 or later.",
"references": "[Issue #167](https://github.com/broofa/node-mime/issues/167)",
"access": "public",
"severity": "moderate",
"cwe": "CWE-400",
"metadata": {
"module_type": "Multi.Library",
"exploitability": 4,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/535";
},
"550": {
"findings": [
{
"version": "1.1.2",
"paths": [
"karma>socket.io>engine.io>ws",
"karma>socket.io>socket.io-client>engine.io-client>ws",
"protractor>webdriver-js-extender>selenium-webdriver>ws"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 550,
"created": "2017-11-08T19:25:17.211Z",
"updated": "2019-06-24T14:54:52.443Z",
"deleted": null,
"title": "Denial of Service",
"found_by": {
"name": "Nick Starke, Ryan Knell"
},
"reported_by": {
"name": "Nick Starke, Ryan Knell"
},
"module_name": "ws",
"cves": [],
"vulnerable_versions": "<1.1.5 || >=2.0.0 <3.3.1",
"patched_versions": ">= 1.1.5 <2.0.0 || >=3.3.1",
"overview": "Affected versions of `ws` can crash when a specially crafted 
`Sec-WebSocket-Extensions` header containing `Object.prototype` property names 
as extension or parameter names is sent.\n\n## Proof of concept\n\n```\nconst 
WebSocket = require('ws');\nconst net = require('net');\n\nconst wss = new 
WebSocket.Server({ port: 3000 }, function () {\n const payload = 'constructor'; 
// or ',;constructor'\n\n const request = [\n 'GET / HTTP/1.1',\n 'Connection: 
Upgrade',\n 'Sec-WebSocket-Key: test',\n 'Sec-WebSocket-Version: 8',\n 
`Sec-WebSocket-Extensions: ${payload}`,\n 'Upgrade: websocket',\n '\\r\\n'\n 
].join('\\r\\n');\n\n const socket = net.connect(3000, function () {\n 
socket.resume();\n socket.write(request);\n });\n});\n```",
"recommendation": "Update to version 3.3.1 or later.",
"references": "- [GitHub Commit 
#c4fe466](https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a)\n",
"access": "public",
"severity": "high",
"cwe": "CWE-20",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/550";
},
"566": {
"findings": [
{
"version": "2.16.3",
"paths": [
"@angular/cli>less>request>hawk>boom>hoek",
"@angular/cli>less>request>hawk>cryptiles>boom>hoek",
"@angular/cli>less>request>hawk>hoek",
"@angular/cli>less>request>hawk>sntp>hoek"
],
"dev": true,
"optional": true,
"bundled": false
}
],
"id": 566,
"created": "2018-04-20T21:25:58.421Z",
"updated": "2019-06-19T20:16:59.758Z",
"deleted": null,
"title": "Prototype Pollution",
"found_by": {
"name": "HoLyVieR"
},
"reported_by": {
"name": "HoLyVieR"
},
"module_name": "hoek",
"cves": [
"CVE-2018-3728"
],
"vulnerable_versions": "<= 4.2.0 || >= 5.0.0 < 5.0.3",
"patched_versions": "> 4.2.0 < 5.0.0 || >= 5.0.3",
"overview": "Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to 
prototype pollution.\n\nThe `merge` function, and the `applyToDefaults` and 
`applyToDefaultsWithShallow` functions which leverage `merge` behind the 
scenes, are vulnerable to a prototype pollution attack when provided an 
_unvalidated_ payload created from a JSON string containing the `__proto__` 
property.\n\nThis can be demonstrated like so:\n\n```javascript\nvar Hoek = 
require('hoek');\nvar malicious_payload = '{\"__proto__\":{\"oops\":\"It works 
!\"}}';\n\nvar a = {};\nconsole.log(\"Before : \" + a.oops);\nHoek.merge({}, 
JSON.parse(malicious_payload));\nconsole.log(\"After : \" + 
a.oops);\n```\n\nThis type of attack can be used to overwrite existing 
properties causing a potential denial of service.",
"recommendation": "Update to version 4.2.1, 5.0.3 or later.",
"references": "- [HackerOne Report](https://hackerone.com/reports/310439)",
"access": "public",
"severity": "moderate",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/566";
},
"577": {
"findings": [
{
"version": "4.17.4",
"paths": [
"angular-tree-component>lodash"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "3.10.1",
"paths": [
"karma>lodash"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 577,
"created": "2018-04-24T14:27:02.796Z",
"updated": "2018-04-24T14:27:13.049Z",
"deleted": null,
"title": "Prototype Pollution",
"found_by": {
"name": "Olivier Arteau (HoLyVieR)"
},
"reported_by": {
"name": "Olivier Arteau (HoLyVieR)"
},
"module_name": "lodash",
"cves": [
"CVE-2018-3721"
],
"vulnerable_versions": "<4.17.5",
"patched_versions": ">=4.17.5",
"overview": "Versions of `lodash` before 4.17.5 are vulnerable to prototype 
pollution. \n\nThe vulnerable functions are 'defaultsDeep', 'merge', and 
'mergeWith' which allow a malicious user to modify the prototype of `Object` 
via `__proto__` causing the addition or modification of an existing property 
that will exist on all objects.\n\n",
"recommendation": "Update to version 4.17.5 or later.",
"references": "- [HackerOne Report](https://hackerone.com/reports/310443)",
"access": "public",
"severity": "low",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 1,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/577";
},
"593": {
"findings": [
{
"version": "1.0.0",
"paths": [
"protractor>saucelabs>https-proxy-agent",
"typings>typings-core>popsicle-proxy-agent>https-proxy-agent"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 593,
"created": "2018-04-24T15:54:57.432Z",
"updated": "2018-04-24T15:55:49.931Z",
"deleted": null,
"title": "Denial of Service",
"found_by": {
"name": "Сковорода Никита Андреевич"
},
"reported_by": {
"name": "Сковорода Никита Андреевич"
},
"module_name": "https-proxy-agent",
"cves": [],
"vulnerable_versions": "<=2.1.1",
"patched_versions": ">=2.2.0",
"overview": "Versions of `https-proxy-agent` before 2.2.0 are vulnerable to 
denial of service. This is due to unsanitized options (proxy.auth) being passed 
to `Buffer()`.",
"recommendation": "Update to version 2.2.0 or later.",
"references": "- [index.js Line 
207](https://github.com/TooTallNate/node-https-proxy-agent/blob/2.1.1/index.js#L207)\n-
 [HackerOne Report](https://hackerone.com/reports/319532)",
"access": "public",
"severity": "high",
"cwe": "CWE-20",
"metadata": {
"module_type": "",
"exploitability": 3,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/593";
},
"607": {
"findings": [
{
"version": "1.0.0",
"paths": [
"typings>typings-core>popsicle-proxy-agent>http-proxy-agent"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 607,
"created": "2018-04-24T22:28:57.482Z",
"updated": "2018-04-24T22:28:57.482Z",
"deleted": null,
"title": "Denial of Service",
"found_by": {
"name": "Сковорода Никита Андреевич"
},
"reported_by": {
"name": "Сковорода Никита Андреевич"
},
"module_name": "http-proxy-agent",
"cves": [],
"vulnerable_versions": "<=2.0.0",
"patched_versions": ">=2.1.0",
"overview": "Versions of `http-proxy-agent` before 2.1.0 are vulnerable to 
denial of service and uninitialized memory leak when unsanitized options are 
passed to `Buffer`.",
"recommendation": "Update to version 2.1.0 or later.",
"references": "- 
https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80\n- 
[HackerOne Report](https://hackerone.com/reports/321631)",
"access": "public",
"severity": "high",
"cwe": "CWE-20",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/607";
},
"681": {
"findings": [
{
"version": "0.4.4",
"paths": [
"protractor>webdriver-js-extender>selenium-webdriver>adm-zip"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 681,
"created": "2018-08-03T15:15:42.145Z",
"updated": "2018-08-03T15:15:42.145Z",
"deleted": null,
"title": "Arbitrary File Write via Archive Extraction",
"found_by": {
"name": "snyk security team"
},
"reported_by": {
"name": "snyk security team"
},
"module_name": "adm-zip",
"cves": [
"CVE-2018-1002204"
],
"vulnerable_versions": "<0.4.9",
"patched_versions": ">=0.4.9",
"overview": "Versions of `adm-zip` before 0.4.9 are vulnerable to arbitrary 
file write when used to extract a specifically crafted archive that contains 
path traversal filenames (`../../file.txt` for example).",
"recommendation": "Update to version 0.4.9 or later.",
"references": "- [GitHub Pull 
Request](https://github.com/cthackers/adm-zip/pull/212)\n- [Zip Slip 
Advisory](https://snyk.io/research/zip-slip-vulnerability)",
"access": "public",
"severity": "high",
"cwe": "CWE-29",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/681";
},
"725": {
"findings": [
{
"version": "2.5.1",
"paths": [
"@angular/cli>webpack-dev-server"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 725,
"created": "2018-11-07T17:10:22.191Z",
"updated": "2019-04-12T20:15:22.334Z",
"deleted": null,
"title": "Missing Origin Validation",
"found_by": {
"link": "https://blog.cal1.cn/link";,
"name": "Jiantao Li"
},
"reported_by": {
"link": "https://blog.cal1.cn/link";,
"name": "Jiantao Li"
},
"module_name": "webpack-dev-server",
"cves": [
"CVE-2018-14732"
],
"vulnerable_versions": "<2.11.4 || >=3.0.0 <=3.1.10",
"patched_versions": ">=2.11.4 <3.0.0 || >=3.1.11",
"overview": "Versions of `webpack-dev-server` before 3.1.10 are missing origin 
validation on the websocket server. This vulnerability allows a remote attacker 
to steal a developer's source code because the origin of requests to the 
websocket server that is used for Hot Module Replacement (HMR) are not 
validated.",
"recommendation": "For `webpack-dev-server` 2.x update to version 2.11.4 or 
later.\nFor `webpack-dev-server` 3.x update to version 3.1.11 or later.",
"references": "- [Sniffing Codes in Hot Module Reloading 
Messages](https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)\n-
 [GitHub 
commit](https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10)",
"access": "public",
"severity": "high",
"cwe": "CWE-346",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/725";
},
"755": {
"findings": [
{
"version": "1.3.0",
"paths": [
"@angular/cli>postcss-url>directory-encoder>handlebars"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 755,
"created": "2018-12-28T20:34:57.708Z",
"updated": "2019-04-15T20:54:25.416Z",
"deleted": null,
"title": "Prototype Pollution",
"found_by": {
"link": "",
"name": "Mahmoud Gamal, Matías Lang"
},
"reported_by": {
"link": "",
"name": "Mahmoud Gamal, Matías Lang"
},
"module_name": "handlebars",
"cves": [],
"vulnerable_versions": "<=4.0.13 || >=4.1.0 <4.1.2",
"patched_versions": ">=4.0.14 <4.1.0 || >=4.1.2",
"overview": "Versions of `handlebars` prior to 4.0.14 are vulnerable to 
Prototype Pollution. Templates may alter an Objects' prototype, thus allowing 
an attacker to execute arbitrary code on the server.",
"recommendation": "For handlebars 4.1.x upgrade to 4.1.2 or later.\nFor 
handlebars 4.0.x upgrade to 4.0.14 or later.",
"references": "",
"access": "public",
"severity": "high",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 6,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/755";
},
"782": {
"findings": [
{
"version": "4.17.4",
"paths": [
"angular-tree-component>lodash"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "3.10.1",
"paths": [
"karma>lodash"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 782,
"created": "2019-02-13T16:16:53.770Z",
"updated": "2019-02-13T16:16:53.770Z",
"deleted": null,
"title": "Prototype Pollution",
"found_by": {
"link": "",
"name": "asgerf"
},
"reported_by": {
"link": "",
"name": "asgerf"
},
"module_name": "lodash",
"cves": [
"CVE-2018-16487"
],
"vulnerable_versions": "<4.17.11",
"patched_versions": ">=4.17.11",
"overview": "Versions of `lodash` before 4.17.5 are vulnerable to prototype 
pollution. \n\nThe vulnerable functions are 'defaultsDeep', 'merge', and 
'mergeWith' which allow a malicious user to modify the prototype of `Object` 
via `{constructor: {prototype: {...}}}` causing the addition or modification of 
an existing property that will exist on all objects.\n\n",
"recommendation": "Update to version 4.17.11 or later.",
"references": "- [HackerOne Report](https://hackerone.com/reports/380873)",
"access": "public",
"severity": "moderate",
"cwe": "CWE-471",
"metadata": {
"module_type": "",
"exploitability": 3,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/782";
},
"786": {
"findings": [
{
"version": "1.8.5",
"paths": [
"@angular/cli>webpack-dev-server>chokidar>anymatch>micromatch>braces",
"@angular/cli>webpack-dev-server>http-proxy-middleware>micromatch>braces",
"karma>chokidar>anymatch>micromatch>braces"
],
"dev": true,
"optional": false,
"bundled": false
},
{
"version": "0.1.5",
"paths": [
"karma>expand-braces>braces"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 786,
"created": "2019-02-15T21:44:30.680Z",
"updated": "2019-04-02T18:18:29.356Z",
"deleted": null,
"title": "Regular Expression Denial of Service",
"found_by": {
"link": "",
"name": "Santosh Rao"
},
"reported_by": {
"link": "",
"name": "Santosh Rao"
},
"module_name": "braces",
"cves": [],
"vulnerable_versions": "<2.3.1",
"patched_versions": ">=2.3.1",
"overview": "Versions of `braces` prior to 2.3.1 are vulnerable to Regular 
Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic 
backtracking while matching regular expressions. This can cause the application 
to be unresponsive leading to Denial of Service.",
"recommendation": "Upgrade to version 2.3.1 or higher.",
"references": "- [GitHub 
Commit](https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451)",
"access": "public",
"severity": "low",
"cwe": "CWE-185",
"metadata": {
"module_type": "",
"exploitability": 4,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/786";
},
"788": {
"findings": [
{
"version": "3.7.0",
"paths": [
"@angular/cli>css-loader>cssnano>postcss-svgo>svgo>js-yaml",
"@angular/cli>cssnano>postcss-svgo>svgo>js-yaml"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 788,
"created": "2019-03-18T21:29:08.514Z",
"updated": "2019-04-04T03:44:12.205Z",
"deleted": null,
"title": "Denial of Service",
"found_by": {
"link": "https://sites.google.com/site/jensdietrich/";,
"name": "Shawn Rasheed, Jens DIetrich"
},
"reported_by": {
"link": "https://conf.researchr.org/profile/shawnrasheed";,
"name": "Shawn Rasheed"
},
"module_name": "js-yaml",
"cves": [],
"vulnerable_versions": "<3.13.0",
"patched_versions": ">=3.13.0",
"overview": "Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of 
Service. By parsing a carefully-crafted YAML file, the node process stalls and 
may exhaust system resources leading to a Denial of Service.",
"recommendation": "Upgrade to version 3.13.0.",
"references": "",
"access": "public",
"severity": "moderate",
"cwe": "CWE-400",
"metadata": {
"module_type": "",
"exploitability": 6,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/788";
},
"813": {
"findings": [
{
"version": "3.7.0",
"paths": [
"@angular/cli>css-loader>cssnano>postcss-svgo>svgo>js-yaml",
"@angular/cli>cssnano>postcss-svgo>svgo>js-yaml"
],
"dev": true,
"optional": false,
"bundled": false
}
],
"id": 813,
"created": "2019-04-10T19:02:51.064Z",
"updated": "2019-04-15T21:29:06.670Z",
"deleted": null,
"title": "Code Injection",
"found_by": {
"link": "",
"name": "Alex Kocharin"
},
"reported_by": {
"link": "",
"name": "Alex Kocharin"
},
"module_name": "js-yaml",
"cves": [],
"vulnerable_versions": "<3.13.1",
"patched_versions": ">=3.13.1",
"overview": "Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code 
Injection. The `load()` function may execute arbitrary code injected through a 
malicious YAML file. Objects that have `toString` as key, JavaScript code as 
value and are used as explicit mapping keys allow attackers to execute the 
supplied code through the `load()` function. The `safeLoad()` function is 
unaffected.\n\nAn example payload is \n`{ toString: 
!<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1` 
\nwhich returns the object \n{\n \"1553107949161\": 1\n}",
"recommendation": "Upgrade to version 3.13.1.",
"references": "- [GitHub PR](https://github.com/nodeca/js-yaml/pull/480)",
"access": "public",
"severity": "high",
"cwe": "CWE-94",
"metadata": {
"module_type": "",
"exploitability": 5,
"affected_components": ""
},
"url": "https://npmjs.com/advisories/813";
}
},
"muted": [],
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 17,
"moderate": 9,
"high": 13,
"critical": 0
},
"dependencies": 45,
"devDependencies": 12356,
"optionalDependencies": 994,
"totalDependencies": 12401
},
"runId": "6a92813b-2729-4771-8d75-3e066320e14b"
}{code}
 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to