Bulk vulnerability fix - Lockfile fix #3
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bulk vulnerability fix - Lockfile fix
This pull request will update your transitive dependencies within the allowed version intervals provided by your direct dependencies.
Fixed vulnerabilities:
CVE–2017–18077
Description
Improper Input Validation
GitHub
NVD
CVSS details - 7.5
References
THIRD PARTY
ReDoS in brace-expansion · CVE-2017-18077 · GitHub Advisory Database · GitHub
nodesecurity.io - nodesecurity Resources and Information.
#862712 - node-brace-expansion: CVE-2017-18077: regular expression denial of service - Debian Bug report logs
avoid ReDoS in expand by myvyang · Pull Request #35 · juliangruber/brace-expansion · GitHub
ReDoS in expand · Issue #33 · juliangruber/brace-expansion · GitHub
avoid ReDoS in expand by myvyang · Pull Request #35 · juliangruber/brace-expansion · GitHub
ReDoS in brace-expansion · CVE-2017-18077 · GitHub Advisory Database · GitHub
CVE–2018–16492
Description
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GitHub
NVD
CVSS details - 9.8
References
Prototype Pollution in extend · CVE-2018-16492 · GitHub Advisory Database · GitHub
NVD - CVE-2018-16492
HackerOne
CVE–2017–16028
Description
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
GitHub
NVD
CVSS details - 5.3
References
Cryptographically Weak PRNG in randomatic · CVE-2017-16028 · GitHub Advisory Database · GitHub
THIRD PARTY
nodesecurity.io - nodesecurity Resources and Information.
react-native-meteor-oauth/meteor-oauth.js at a7eb738b74c469f5db20296b44b7cae4e2337435 · tableflip/react-native-meteor-oauth · GitHub
use cryptographically secure random function · jonschlinkert/randomatic@4a52695 · GitHub
CVE–2017–1000188
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GitHub
NVD
CVSS details - 6.1
References
Bugtraq
Blacklist a few other unsafe opts from passing in data obj · mde/ejs@49264e0 · GitHub
THIRD PARTY
Moderate severity vulnerability that affects ejs · CVE-2017-1000188 · GitHub Advisory Database · GitHub
CVE–2017–1000189
Description
Improper Input Validation
GitHub
NVD
CVSS details - 7.5
References
Bugtraq
Blacklist a few other unsafe opts from passing in data obj · mde/ejs@49264e0 · GitHub
THIRD PARTY
High severity vulnerability that affects ejs · CVE-2017-1000189 · GitHub Advisory Database · GitHub
CVE–2017–1000228
Description
Improper Input Validation
GitHub
NVD
CVSS details - 9.8
References
Bugtraq
THIRD PARTY
ejs is ivulnerable to remote code execution due to weak input validation · CVE-2017-1000228 · GitHub Advisory Database · GitHub
Blacklist 'root' option when looking for opts in data obj · mde/ejs@3d447c5 · GitHub
debricked–154240
Description
C#-ANNOUNCEMENT
CVSS details
No information
References
Microsoft Security Advisory 3181759 : Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege · Issue #203 · aspnet/Announcements · GitHub
Vulnerable Regular Expression · Issue #510 · esamattis/underscore.string · GitHub
Regular Expression Denial of Service in underscore.string · GHSA-v2p6-4mp7-3r9v · GitHub Advisory Database · GitHub
debricked–149668
Description
GitHub
CVSS details
No information
References
Regular Expression Denial of Service in underscore.string · GHSA-v2p6-4mp7-3r9v · GitHub Advisory Database · GitHub
Vulnerable Regular Expression · Issue #510 · esamattis/underscore.string · GitHub
CVE–2016–2537
Description
Improper Input Validation
GitHub
NVD
CVSS details - 7.5
References
NVD - CVE-2016-2537
Regular Expression Denial of Service in is-my-json-valid · CVE-2016-2537 · GitHub Advisory Database · GitHub
nodesecurity.io - nodesecurity Resources and Information.
fix utc-millisec regex to avoid a ddos attack · mafintosh/is-my-json-valid@eca4beb · GitHub
Merge pull request #159 from mafintosh/safe-regex · mafintosh/is-my-json-valid@b3051b2 · GitHub
Regular Expression Denial of Service in is-my-json-valid · CVE-2016-2537 · GitHub Advisory Database · GitHub
HackerOne
Avoid catastrophic backtracking by LinusU · Pull Request #159 · mafintosh/is-my-json-valid · GitHub
THIRD PARTY
CVE–2018–1107
Description
Uncontrolled Resource Consumption
NVD
GitHub
CVSS details - 5.3
References
NVD - CVE-2018-1107
1546357 – (CVE-2018-1107) CVE-2018-1107 nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format
Avoid catastrophic backtracking by LinusU · Pull Request #159 · mafintosh/is-my-json-valid · GitHub
Merge pull request #159 from mafintosh/safe-regex · mafintosh/is-my-json-valid@b3051b2 · GitHub
Regular expression deinal of service (ReDoS) in is-my-json-valid · CVE-2018-1107 · GitHub Advisory Database · GitHub
CVE–2021–23807
Description
Access of Resource Using Incompatible Type ('Type Confusion')
NVD
GitHub
CVSS details - 9.8
References
NVD - CVE-2021-23807
Merge pull request #51 from dellalibera/fix-prototype-pollution · janl/node-jsonpointer@a0345f3 · GitHub
fix-prototype-pollution by dellalibera · Pull Request #51 · janl/node-jsonpointer · GitHub
Prototype Pollution in node-jsonpointer · CVE-2021-23807 · GitHub Advisory Database · GitHub
CVE–2018–3737
Description
Incorrect Regular Expression
GitHub
NVD
CVSS details - 7.5
References
THIRD PARTY
Regular Expression Denial of Service in sshpk · CVE-2018-3737 · GitHub Advisory Database · GitHub
HackerOne
debricked–179667
Description
GitHub
CVSS details
No information
References
Out-of-Bounds read in stringstream · GHSA-qpw2-xchm-655q · GitHub Advisory Database · GitHub
Uninitialized Memory Exposure · Issue #7 · mhart/StringStream · GitHub
HackerOne
NVD - CVE-2018-21270
Out-of-bounds Read in stringstream · CVE-2018-21270 · GitHub Advisory Database · GitHub
Merge pull request #9 from mhart/fix-buffer-constructor-vuln · mhart/StringStream@2f4a9d4 · GitHub
CVE–2017–15010
Description
Uncontrolled Resource Consumption
GitHub
NVD
CVSS details - 7.5
References
Bugtraq
Red Hat Customer Portal - Access to 24x7 support and knowledge
Red Hat Customer Portal - Access to 24x7 support and knowledge
Red Hat Customer Portal - Access to 24x7 support and knowledge
Red Hat Customer Portal - Access to 24x7 support and knowledge
nodesecurity.io - nodesecurity Resources and Information.
Regular Expression Denial of Service in tough-cookie · CVE-2017-15010 · GitHub Advisory Database · GitHub
THIRD PARTY
Vulnerable Regular Expression · Issue #92 · salesforce/tough-cookie · GitHub
[SECURITY] Fedora 30 Update: nodejs-tough-cookie-2.3.4-1.fc30 - package-announce - Fedora Mailing-Lists
Regular Expression Denial of Service in tough-cookie · CVE-2017-15010 · GitHub Advisory Database · GitHub
CVE–2018–20834
Description
Improper Link Resolution Before File Access ('Link Following')
GitHub
NVD
CVSS details - 7.5
References
unpack: only reuse file fs entries if nlink = 1 · npm/node-tar@b0c5843 · GitHub
Comparing 58a8d43...a5f7779 · npm/node-tar · GitHub
HackerOne
Arbitrary File Overwrite in tar · CVE-2018-20834 · GitHub Advisory Database · GitHub
Red Hat Customer Portal - Access to 24x7 support and knowledge
Bump fstream to fix hardlink overwriting vulnerability · npm/node-tar@7ecef07 · GitHub
Commits · npm/node-tar · GitHub
NVD - CVE-2018-20834
Arbitrary File Overwrite in tar · CVE-2018-20834 · GitHub Advisory Database · GitHub
CVE–2019–13173
Description
Improper Link Resolution Before File Access ('Link Following')
GitHub
NVD
CVSS details - 7.5
References
THIRD PARTY
Arbitrary File Overwrite in fstream · CVE-2019-13173 · GitHub Advisory Database · GitHub
Clobber a Link if it's in the way of a File · npm/fstream@6a77d2f · GitHub
Arbitrary File Overwrite in fstream · CVE-2019-13173 · GitHub Advisory Database · GitHub
[security-announce] openSUSE-SU-2019:1846-1: important: Security update for nodejs10 - openSUSE Security Announce - openSUSE Mailing Lists
[security-announce] openSUSE-SU-2019:1907-1: important: Security update for nodejs8 - openSUSE Security Announce - openSUSE Mailing Lists
USN-4123-1: npm/fstream vulnerability | Ubuntu security notices | Ubuntu
CVE–2018–20835
Description
Improper Input Validation
GitHub
NVD
CVSS details - 7.5
References
THIRD PARTY
Improper Input Validation in tar-fs · CVE-2018-20835 · GitHub Advisory Database · GitHub
force hardlink targets to be in the tar · mafintosh/tar-fs@0667282 · GitHub
HackerOne
Comparing d590fc7...a35ce2f · mafintosh/tar-fs · GitHub
debricked–160898
Description
GitHub
CVSS details
No information
References
Regular Expression Denial of Service · GHSA-6394-6h9h-cfjg · GitHub Advisory Database · GitHub
changed instances of \s* with \s? in regular expressions to reduce th… · dperini/nwmatcher@9dcc2b0 · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more at Debricked