mirror of
https://github.com/pnpm/pnpm.git
synced 2026-01-25 07:18:33 -05:00
278 lines
12 KiB
JSON
278 lines
12 KiB
JSON
{
|
|
"actions": [
|
|
{
|
|
"action": "review",
|
|
"module": "axios",
|
|
"resolves": [
|
|
{
|
|
"id": 1005018,
|
|
"path": ".>axios",
|
|
"dev": false,
|
|
"optional": false,
|
|
"bundled": false
|
|
},
|
|
{
|
|
"id": 1005506,
|
|
"path": ".>axios",
|
|
"dev": false,
|
|
"optional": false,
|
|
"bundled": false
|
|
},
|
|
{
|
|
"id": 1006349,
|
|
"path": ".>axios",
|
|
"dev": false,
|
|
"optional": false,
|
|
"bundled": false
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"action": "review",
|
|
"module": "sync-exec",
|
|
"resolves": [
|
|
{
|
|
"id": 1005902,
|
|
"path": ".>sync-exec",
|
|
"dev": false,
|
|
"bundled": false,
|
|
"optional": false
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"action": "review",
|
|
"module": "follow-redirects",
|
|
"resolves": [
|
|
{
|
|
"id": 1006865,
|
|
"path": ".>axios>follow-redirects",
|
|
"dev": false,
|
|
"optional": false,
|
|
"bundled": false
|
|
},
|
|
{
|
|
"id": 1007026,
|
|
"path": ".>axios>follow-redirects",
|
|
"dev": false,
|
|
"optional": false,
|
|
"bundled": false
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"advisories": {
|
|
"1005018": {
|
|
"findings": [
|
|
{
|
|
"version": "0.15.3",
|
|
"paths": [
|
|
".>axios"
|
|
]
|
|
}
|
|
],
|
|
"metadata": null,
|
|
"vulnerable_versions": "<=0.21.1",
|
|
"module_name": "axios",
|
|
"severity": "high",
|
|
"github_advisory_id": "GHSA-cph5-m8f7-6c5x",
|
|
"cves": [
|
|
"CVE-2021-3749"
|
|
],
|
|
"access": "public",
|
|
"patched_versions": ">=0.21.2",
|
|
"updated": "2021-09-08T16:46:47.000Z",
|
|
"recommendation": "Upgrade to version 0.21.2 or later",
|
|
"cwe": "CWE-697",
|
|
"found_by": null,
|
|
"deleted": null,
|
|
"id": 1005018,
|
|
"references": "- https://nvd.nist.gov/vuln/detail/CVE-2021-3749\n- https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929\n- https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31\n- https://www.npmjs.com/package/axios\n- https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E\n- https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E\n- https://github.com/advisories/GHSA-cph5-m8f7-6c5x",
|
|
"created": "2021-11-18T16:00:48.489Z",
|
|
"reported_by": null,
|
|
"title": "Incorrect Comparison in axios",
|
|
"npm_advisory_id": null,
|
|
"overview": "axios is vulnerable to Inefficient Regular Expression Complexity",
|
|
"url": "https://github.com/advisories/GHSA-cph5-m8f7-6c5x"
|
|
},
|
|
"1005506": {
|
|
"findings": [
|
|
{
|
|
"version": "0.15.3",
|
|
"paths": [
|
|
".>axios"
|
|
]
|
|
}
|
|
],
|
|
"metadata": null,
|
|
"vulnerable_versions": "<0.21.1",
|
|
"module_name": "axios",
|
|
"severity": "high",
|
|
"github_advisory_id": "GHSA-4w2v-q235-vp99",
|
|
"cves": [
|
|
"CVE-2020-28168"
|
|
],
|
|
"access": "public",
|
|
"patched_versions": ">=0.21.1",
|
|
"updated": "2021-01-04T20:58:17.000Z",
|
|
"recommendation": "Upgrade to version 0.21.1 or later",
|
|
"cwe": "CWE-918",
|
|
"found_by": null,
|
|
"deleted": null,
|
|
"id": 1005506,
|
|
"references": "- https://nvd.nist.gov/vuln/detail/CVE-2020-28168\n- https://github.com/axios/axios/issues/3369\n- https://github.com/axios/axios/commit/c7329fefc890050edd51e40e469a154d0117fc55\n- https://snyk.io/vuln/SNYK-JS-AXIOS-1038255\n- https://www.npmjs.com/package/axios\n- https://www.npmjs.com/advisories/1594\n- https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E\n- https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E\n- https://github.com/advisories/GHSA-4w2v-q235-vp99",
|
|
"created": "2021-11-18T16:00:48.546Z",
|
|
"reported_by": null,
|
|
"title": "Server-Side Request Forgery in Axios",
|
|
"npm_advisory_id": null,
|
|
"overview": "Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.",
|
|
"url": "https://github.com/advisories/GHSA-4w2v-q235-vp99"
|
|
},
|
|
"1005902": {
|
|
"findings": [
|
|
{
|
|
"version": "0.6.2",
|
|
"paths": [
|
|
".>sync-exec"
|
|
]
|
|
}
|
|
],
|
|
"metadata": null,
|
|
"vulnerable_versions": "<=0.6.2",
|
|
"module_name": "sync-exec",
|
|
"severity": "moderate",
|
|
"github_advisory_id": "GHSA-38h8-x697-gh8q",
|
|
"cves": [
|
|
"CVE-2017-16024"
|
|
],
|
|
"access": "public",
|
|
"patched_versions": "<0.0.0",
|
|
"updated": "2020-08-31T18:18:48.000Z",
|
|
"recommendation": "None",
|
|
"cwe": "CWE-377",
|
|
"found_by": null,
|
|
"deleted": null,
|
|
"id": 1005902,
|
|
"references": "- https://nvd.nist.gov/vuln/detail/CVE-2017-16024\n- https://github.com/gvarsanyi/sync-exec/issues/17\n- https://cwe.mitre.org/data/definitions/377.html\n- https://github.com/advisories/GHSA-38h8-x697-gh8q\n- https://www.npmjs.com/advisories/310\n- https://nodesecurity.io/advisories/310\n- https://www.owasp.org/index.php/Insecure_Temporary_File",
|
|
"created": "2021-11-18T16:00:48.581Z",
|
|
"reported_by": null,
|
|
"title": "Tmp files readable by other users in sync-exec",
|
|
"npm_advisory_id": null,
|
|
"overview": "Affected versions of `sync-exec` use files located in `/tmp/` to buffer command results before returning values. As `/tmp/` is almost always set with world readable permissions, this may allow low privilege users on the system to read the results of commands run via `sync-exec` under a higher privilege user.\n\n\n## Recommendation\n\nThere is currently no direct patch for `sync-exec`, as the `child_process.execSync` function provided in Node.js v0.12.0 and later provides the same functionality natively. \n\nThe best mitigation currently is to update to Node.js v0.12.0 or later, and migrate all uses of `sync-exec` to `child_process.execSync()`.",
|
|
"url": "https://github.com/advisories/GHSA-38h8-x697-gh8q"
|
|
},
|
|
"1006349": {
|
|
"findings": [
|
|
{
|
|
"version": "0.15.3",
|
|
"paths": [
|
|
".>axios"
|
|
]
|
|
}
|
|
],
|
|
"metadata": null,
|
|
"vulnerable_versions": "<=0.18.0",
|
|
"module_name": "axios",
|
|
"severity": "high",
|
|
"github_advisory_id": "GHSA-42xw-2xvc-qx8m",
|
|
"cves": [
|
|
"CVE-2019-10742"
|
|
],
|
|
"access": "public",
|
|
"patched_versions": ">=0.18.1",
|
|
"updated": "2019-06-05T16:22:11.000Z",
|
|
"recommendation": "Upgrade to version 0.18.1 or later",
|
|
"cwe": "CWE-20",
|
|
"found_by": null,
|
|
"deleted": null,
|
|
"id": 1006349,
|
|
"references": "- https://nvd.nist.gov/vuln/detail/CVE-2019-10742\n- https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505\n- https://github.com/axios/axios/issues/1098\n- https://github.com/axios/axios/pull/1485\n- https://snyk.io/vuln/SNYK-JS-AXIOS-174505\n- https://www.npmjs.com/advisories/880\n- https://github.com/advisories/GHSA-42xw-2xvc-qx8m",
|
|
"created": "2021-11-18T16:00:48.617Z",
|
|
"reported_by": null,
|
|
"title": "Denial of Service in axios",
|
|
"npm_advisory_id": null,
|
|
"overview": "Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.\n\n\n## Recommendation\n\nUpgrade to 0.18.1 or later.",
|
|
"url": "https://github.com/advisories/GHSA-42xw-2xvc-qx8m"
|
|
},
|
|
"1006865": {
|
|
"findings": [
|
|
{
|
|
"version": "1.0.0",
|
|
"paths": [
|
|
".>axios>follow-redirects"
|
|
]
|
|
}
|
|
],
|
|
"metadata": null,
|
|
"vulnerable_versions": "<1.14.7",
|
|
"module_name": "follow-redirects",
|
|
"severity": "high",
|
|
"github_advisory_id": "GHSA-74fj-2j2h-c42q",
|
|
"cves": [
|
|
"CVE-2022-0155"
|
|
],
|
|
"access": "public",
|
|
"patched_versions": ">=1.14.7",
|
|
"updated": "2022-01-11T18:41:09.000Z",
|
|
"recommendation": "Upgrade to version 1.14.7 or later",
|
|
"cwe": "CWE-359",
|
|
"found_by": null,
|
|
"deleted": null,
|
|
"id": 1006865,
|
|
"references": "- https://nvd.nist.gov/vuln/detail/CVE-2022-0155\n- https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22\n- https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406\n- https://github.com/advisories/GHSA-74fj-2j2h-c42q",
|
|
"created": "2022-01-12T23:00:43.967Z",
|
|
"reported_by": null,
|
|
"title": "Exposure of sensitive information in follow-redirects",
|
|
"npm_advisory_id": null,
|
|
"overview": "follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor",
|
|
"url": "https://github.com/advisories/GHSA-74fj-2j2h-c42q"
|
|
},
|
|
"1007026": {
|
|
"findings": [
|
|
{
|
|
"version": "1.0.0",
|
|
"paths": [
|
|
".>axios>follow-redirects"
|
|
]
|
|
}
|
|
],
|
|
"metadata": null,
|
|
"vulnerable_versions": "<1.14.8",
|
|
"module_name": "follow-redirects",
|
|
"severity": "moderate",
|
|
"github_advisory_id": "GHSA-pw2r-vq6v-hr8c",
|
|
"cves": [
|
|
"CVE-2022-0536"
|
|
],
|
|
"access": "public",
|
|
"patched_versions": ">=1.14.8",
|
|
"updated": "2022-02-11T21:18:03.000Z",
|
|
"recommendation": "Upgrade to version 1.14.8 or later",
|
|
"cwe": "CWE-200",
|
|
"found_by": null,
|
|
"deleted": null,
|
|
"id": 1007026,
|
|
"references": "- https://nvd.nist.gov/vuln/detail/CVE-2022-0536\n- https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445\n- https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db\n- https://github.com/advisories/GHSA-pw2r-vq6v-hr8c",
|
|
"created": "2022-02-14T23:00:43.878Z",
|
|
"reported_by": null,
|
|
"title": "Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects",
|
|
"npm_advisory_id": null,
|
|
"overview": "Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.",
|
|
"url": "https://github.com/advisories/GHSA-pw2r-vq6v-hr8c"
|
|
}
|
|
},
|
|
"muted": [],
|
|
"metadata": {
|
|
"vulnerabilities": {
|
|
"info": 0,
|
|
"low": 0,
|
|
"moderate": 2,
|
|
"high": 4,
|
|
"critical": 0
|
|
},
|
|
"dependencies": 6,
|
|
"devDependencies": 0,
|
|
"optionalDependencies": 0,
|
|
"totalDependencies": 6
|
|
}
|
|
} |