Bulk vulnerability fix - Lockfile fix#3
Open
debricked[bot] wants to merge 1 commit intodebricked-fix-CVE_2018_3774-3119382885ea373dfrom
Open
Bulk vulnerability fix - Lockfile fix#3debricked[bot] wants to merge 1 commit intodebricked-fix-CVE_2018_3774-3119382885ea373dfrom
debricked[bot] wants to merge 1 commit intodebricked-fix-CVE_2018_3774-3119382885ea373dfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bulk vulnerability fix - Lockfile fix
This pull request will update your transitive dependencies within the allowed version intervals provided by your direct dependencies.
Fixed vulnerabilities:
CVE–2017–18077
Description
Improper Input Validation
GitHub
NVD
CVSS details -
7.5
References
THIRD PARTY







ReDoS in brace-expansion · CVE-2017-18077 · GitHub Advisory Database · GitHub
nodesecurity.io - nodesecurity Resources and Information.
#862712 - node-brace-expansion: CVE-2017-18077: regular expression denial of service - Debian Bug report logs
avoid ReDoS in expand by myvyang · Pull Request #35 · juliangruber/brace-expansion · GitHub
ReDoS in expand · Issue #33 · juliangruber/brace-expansion · GitHub
avoid ReDoS in expand by myvyang · Pull Request #35 · juliangruber/brace-expansion · GitHub
ReDoS in brace-expansion · CVE-2017-18077 · GitHub Advisory Database · GitHub
CVE–2018–16492
Description
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GitHub
NVD
CVSS details -
9.8
References
Prototype Pollution in extend · CVE-2018-16492 · GitHub Advisory Database · GitHub


NVD - CVE-2018-16492
HackerOne
CVE–2017–16028
Description
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
GitHub
NVD
CVSS details -
5.3
References
Cryptographically Weak PRNG in randomatic · CVE-2017-16028 · GitHub Advisory Database · GitHub




THIRD PARTY
nodesecurity.io - nodesecurity Resources and Information.
react-native-meteor-oauth/meteor-oauth.js at a7eb738b74c469f5db20296b44b7cae4e2337435 · tableflip/react-native-meteor-oauth · GitHub
use cryptographically secure random function · jonschlinkert/randomatic@4a52695 · GitHub
CVE–2017–1000188
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GitHub
NVD
CVSS details -
6.1
References
Bugtraq



Blacklist a few other unsafe opts from passing in data obj · mde/ejs@49264e0 · GitHub
THIRD PARTY
Moderate severity vulnerability that affects ejs · CVE-2017-1000188 · GitHub Advisory Database · GitHub
CVE–2017–1000189
Description
Improper Input Validation
GitHub
NVD
CVSS details -
7.5
References
Bugtraq



Blacklist a few other unsafe opts from passing in data obj · mde/ejs@49264e0 · GitHub
THIRD PARTY
High severity vulnerability that affects ejs · CVE-2017-1000189 · GitHub Advisory Database · GitHub
CVE–2017–1000228
Description
Improper Input Validation
GitHub
NVD
CVSS details -
9.8
References
Bugtraq



THIRD PARTY
ejs is ivulnerable to remote code execution due to weak input validation · CVE-2017-1000228 · GitHub Advisory Database · GitHub
Blacklist 'root' option when looking for opts in data obj · mde/ejs@3d447c5 · GitHub
debricked–154240
Description
C#-ANNOUNCEMENT
CVSS details
No information
References
Microsoft Security Advisory 3181759 : Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege · Issue #203 · aspnet/Announcements · GitHub


Vulnerable Regular Expression · Issue #510 · esamattis/underscore.string · GitHub
Regular Expression Denial of Service in underscore.string · GHSA-v2p6-4mp7-3r9v · GitHub Advisory Database · GitHub
debricked–149668
Description
GitHub
CVSS details
No information
References
Regular Expression Denial of Service in underscore.string · GHSA-v2p6-4mp7-3r9v · GitHub Advisory Database · GitHub

Vulnerable Regular Expression · Issue #510 · esamattis/underscore.string · GitHub
CVE–2016–2537
Description
Improper Input Validation
GitHub
NVD
CVSS details -
7.5
References
NVD - CVE-2016-2537








Regular Expression Denial of Service in is-my-json-valid · CVE-2016-2537 · GitHub Advisory Database · GitHub
nodesecurity.io - nodesecurity Resources and Information.
fix utc-millisec regex to avoid a ddos attack · mafintosh/is-my-json-valid@eca4beb · GitHub
Merge pull request #159 from mafintosh/safe-regex · mafintosh/is-my-json-valid@b3051b2 · GitHub
Regular Expression Denial of Service in is-my-json-valid · CVE-2016-2537 · GitHub Advisory Database · GitHub
HackerOne
Avoid catastrophic backtracking by LinusU · Pull Request #159 · mafintosh/is-my-json-valid · GitHub
THIRD PARTY
CVE–2018–1107
Description
Uncontrolled Resource Consumption
NVD
GitHub
CVSS details -
5.3
References
NVD - CVE-2018-1107




1546357 – (CVE-2018-1107) CVE-2018-1107 nodejs-is-my-json-valid: ReDoS when validating JSON fields with email format
Avoid catastrophic backtracking by LinusU · Pull Request #159 · mafintosh/is-my-json-valid · GitHub
Merge pull request #159 from mafintosh/safe-regex · mafintosh/is-my-json-valid@b3051b2 · GitHub
Regular expression deinal of service (ReDoS) in is-my-json-valid · CVE-2018-1107 · GitHub Advisory Database · GitHub
CVE–2021–23807
Description
Access of Resource Using Incompatible Type ('Type Confusion')
NVD
GitHub
CVSS details -
9.8
References
NVD - CVE-2021-23807



Merge pull request #51 from dellalibera/fix-prototype-pollution · janl/node-jsonpointer@a0345f3 · GitHub
fix-prototype-pollution by dellalibera · Pull Request #51 · janl/node-jsonpointer · GitHub
Prototype Pollution in node-jsonpointer · CVE-2021-23807 · GitHub Advisory Database · GitHub
CVE–2018–3737
Description
Incorrect Regular Expression
GitHub
NVD
CVSS details -
7.5
References
THIRD PARTY


Regular Expression Denial of Service in sshpk · CVE-2018-3737 · GitHub Advisory Database · GitHub
HackerOne
debricked–179667
Description
GitHub
CVSS details
No information
References
Out-of-Bounds read in stringstream · GHSA-qpw2-xchm-655q · GitHub Advisory Database · GitHub





Uninitialized Memory Exposure · Issue #7 · mhart/StringStream · GitHub
HackerOne
NVD - CVE-2018-21270
Out-of-bounds Read in stringstream · CVE-2018-21270 · GitHub Advisory Database · GitHub
Merge pull request #9 from mhart/fix-buffer-constructor-vuln · mhart/StringStream@2f4a9d4 · GitHub
CVE–2017–15010
Description
Uncontrolled Resource Consumption
GitHub
NVD
CVSS details -
7.5
References
Bugtraq










Red Hat Customer Portal - Access to 24x7 support and knowledge
Red Hat Customer Portal - Access to 24x7 support and knowledge
Red Hat Customer Portal - Access to 24x7 support and knowledge
Red Hat Customer Portal - Access to 24x7 support and knowledge
nodesecurity.io - nodesecurity Resources and Information.
Regular Expression Denial of Service in tough-cookie · CVE-2017-15010 · GitHub Advisory Database · GitHub
THIRD PARTY
Vulnerable Regular Expression · Issue #92 · salesforce/tough-cookie · GitHub
[SECURITY] Fedora 30 Update: nodejs-tough-cookie-2.3.4-1.fc30 - package-announce - Fedora Mailing-Lists
Regular Expression Denial of Service in tough-cookie · CVE-2017-15010 · GitHub Advisory Database · GitHub
CVE–2018–20834
Description
Improper Link Resolution Before File Access ('Link Following')
GitHub
NVD
CVSS details -
7.5
References
unpack: only reuse file fs entries if nlink = 1 · npm/node-tar@b0c5843 · GitHub








Comparing 58a8d43...a5f7779 · npm/node-tar · GitHub
HackerOne
Arbitrary File Overwrite in tar · CVE-2018-20834 · GitHub Advisory Database · GitHub
Red Hat Customer Portal - Access to 24x7 support and knowledge
Bump fstream to fix hardlink overwriting vulnerability · npm/node-tar@7ecef07 · GitHub
Commits · npm/node-tar · GitHub
NVD - CVE-2018-20834
Arbitrary File Overwrite in tar · CVE-2018-20834 · GitHub Advisory Database · GitHub
CVE–2019–13173
Description
Improper Link Resolution Before File Access ('Link Following')
GitHub
NVD
CVSS details -
7.5
References
THIRD PARTY






Arbitrary File Overwrite in fstream · CVE-2019-13173 · GitHub Advisory Database · GitHub
Clobber a Link if it's in the way of a File · npm/fstream@6a77d2f · GitHub
Arbitrary File Overwrite in fstream · CVE-2019-13173 · GitHub Advisory Database · GitHub
[security-announce] openSUSE-SU-2019:1846-1: important: Security update for nodejs10 - openSUSE Security Announce - openSUSE Mailing Lists
[security-announce] openSUSE-SU-2019:1907-1: important: Security update for nodejs8 - openSUSE Security Announce - openSUSE Mailing Lists
USN-4123-1: npm/fstream vulnerability | Ubuntu security notices | Ubuntu
CVE–2018–20835
Description
Improper Input Validation
GitHub
NVD
CVSS details -
7.5
References
THIRD PARTY




Improper Input Validation in tar-fs · CVE-2018-20835 · GitHub Advisory Database · GitHub
force hardlink targets to be in the tar · mafintosh/tar-fs@0667282 · GitHub
HackerOne
Comparing d590fc7...a35ce2f · mafintosh/tar-fs · GitHub
debricked–160898
Description
GitHub
CVSS details
No information
References
Regular Expression Denial of Service · GHSA-6394-6h9h-cfjg · GitHub Advisory Database · GitHub

changed instances of \s* with \s? in regular expressions to reduce th… · dperini/nwmatcher@9dcc2b0 · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more at Debricked