You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. The issue is patched in version 3.1.1.
mend-bolt-for-githubbot
changed the title
sails-1.5.2.tgz: 7 vulnerabilities (highest severity is: 9.8)
sails-1.5.2.tgz: 7 vulnerabilities (highest severity is: 9.8) - autoclosed
Jun 8, 2022
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
Vulnerable Library - sails-1.5.2.tgz
API-driven framework for building realtime apps, using MVC conventions (based on Express and Socket.io)
Library home page: https://registry.npmjs.org/sails/-/sails-1.5.2.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/sails/package.json
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Vulnerabilities
Details
CVE-2021-44908
Vulnerable Library - sails-1.5.2.tgz
API-driven framework for building realtime apps, using MVC conventions (based on Express and Socket.io)
Library home page: https://registry.npmjs.org/sails/-/sails-1.5.2.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/sails/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
SailsJS Sails.js <=1.4.0 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules().
Publish Date: 2022-03-17
URL: CVE-2021-44908
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-44908
Release Date: 2022-03-17
Fix Resolution: sails - 1.0.0,0.12.10,0.12.2-0,0.12.11
Step up your Open Source Security Game with Mend here
WS-2021-0153
Vulnerable Library - ejs-2.5.7.tgz
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-2.5.7.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/sails/node_modules/ejs/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
Arbitrary Code Injection vulnerability was found in ejs before 3.1.6. Caused by filename which isn't sanitized for display.
Publish Date: 2021-01-22
URL: WS-2021-0153
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: mde/ejs#571
Release Date: 2021-01-22
Fix Resolution: ejs - 3.1.6
Step up your Open Source Security Game with Mend here
CVE-2021-44906
Vulnerable Library - minimist-1.2.5.tgz
parse argument options
Library home page: https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/sails/node_modules/minimist/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
Publish Date: 2022-03-17
URL: CVE-2021-44906
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://github.com/substack/minimist/issues/164
Release Date: 2022-03-17
Fix Resolution: minimist - 1.2.6
Step up your Open Source Security Game with Mend here
CVE-2022-29078
Vulnerable Library - ejs-2.5.7.tgz
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-2.5.7.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/sails/node_modules/ejs/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
Publish Date: 2022-04-25
URL: CVE-2022-29078
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~
Release Date: 2022-04-25
Fix Resolution: ejs - v3.1.7
Step up your Open Source Security Game with Mend here
CVE-2021-43138
Vulnerable Libraries - async-0.9.2.tgz, async-2.5.0.tgz, async-1.0.0.tgz
async-0.9.2.tgz
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-0.9.2.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/prompt/node_modules/async/package.json
Dependency Hierarchy:
async-2.5.0.tgz
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-2.5.0.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/sails/node_modules/async/package.json
Dependency Hierarchy:
async-1.0.0.tgz
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-1.0.0.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/winston/node_modules/async/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
Publish Date: 2022-04-06
URL: CVE-2021-43138
CVSS 3 Score Details (7.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-43138
Release Date: 2022-04-06
Fix Resolution: async - v3.2.2
Step up your Open Source Security Game with Mend here
CVE-2021-29469
Vulnerable Library - redis-2.8.0.tgz
Redis client library
Library home page: https://registry.npmjs.org/redis/-/redis-2.8.0.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/redis/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. The issue is patched in version 3.1.1.
Publish Date: 2021-04-23
URL: CVE-2021-29469
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-35q2-47q7-3pc3
Release Date: 2021-04-23
Fix Resolution: redis - 3.1.1
Step up your Open Source Security Game with Mend here
CVE-2021-3765
Vulnerable Library - validator-5.7.0.tgz
String validation and sanitization
Library home page: https://registry.npmjs.org/validator/-/validator-5.7.0.tgz
Path to dependency file: /Application/package.json
Path to vulnerable library: /Application/node_modules/validator/package.json
Dependency Hierarchy:
Found in HEAD commit: 0f8e354612545df2de46d3013620a08c3d1079f0
Found in base branch: master
Vulnerability Details
validator.js is vulnerable to Inefficient Regular Expression Complexity
Publish Date: 2021-11-02
URL: CVE-2021-3765
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-qgmg-gppg-76g5
Release Date: 2021-11-02
Fix Resolution: validator - 13.7.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: