broadcast-sample-app
broadcast-sample-app copied to clipboard
ejs-3.1.5.tgz: 4 vulnerabilities (highest severity is: 9.8)
Vulnerable Library - ejs-3.1.5.tgz
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-3.1.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ejs/package.json
Found in HEAD commit: 12d9d9cff8f6e8b898c87aaa8bb77a3df3741f83
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in | Remediation Available | |
|---|---|---|---|---|---|---|
| WS-2021-0153 | 9.8 | ejs-3.1.5.tgz | Direct | 3.1.6 | ✅ | |
| CVE-2022-29078 | 9.8 | ejs-3.1.5.tgz | Direct | 3.1.7 | ✅ | |
| CVE-2021-43138 | 7.8 | async-0.9.2.tgz | Transitive | 3.1.6 | ✅ | |
| CVE-2022-3517 | 7.5 | minimatch-3.0.4.tgz | Transitive | N/A | ❌ |
Details
WS-2021-0153
Vulnerable Library - ejs-3.1.5.tgz
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-3.1.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ejs/package.json
Dependency Hierarchy:
- :x: ejs-3.1.5.tgz (Vulnerable Library)
Found in HEAD commit: 12d9d9cff8f6e8b898c87aaa8bb77a3df3741f83
Found in base branch: main
Vulnerability Details
Arbitrary Code Injection vulnerability was found in ejs before 3.1.6. Caused by filename which isn't sanitized for display.
Publish Date: 2021-01-22
URL: WS-2021-0153
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2021-01-22
Fix Resolution: 3.1.6
:rescue_worker_helmet: Automatic Remediation is available for this issue
CVE-2022-29078
Vulnerable Library - ejs-3.1.5.tgz
Embedded JavaScript templates
Library home page: https://registry.npmjs.org/ejs/-/ejs-3.1.5.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/ejs/package.json
Dependency Hierarchy:
- :x: ejs-3.1.5.tgz (Vulnerable Library)
Found in HEAD commit: 12d9d9cff8f6e8b898c87aaa8bb77a3df3741f83
Found in base branch: main
Vulnerability Details
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
Publish Date: 2022-04-25
URL: CVE-2022-29078
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29078~
Release Date: 2022-04-25
Fix Resolution: 3.1.7
:rescue_worker_helmet: Automatic Remediation is available for this issue
CVE-2021-43138
Vulnerable Library - async-0.9.2.tgz
Higher-order functions and common patterns for asynchronous code
Library home page: https://registry.npmjs.org/async/-/async-0.9.2.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/async/package.json
Dependency Hierarchy:
- ejs-3.1.5.tgz (Root Library)
- jake-10.8.2.tgz
- :x: async-0.9.2.tgz (Vulnerable Library)
- jake-10.8.2.tgz
Found in HEAD commit: 12d9d9cff8f6e8b898c87aaa8bb77a3df3741f83
Found in base branch: main
Vulnerability Details
In Async before 2.6.4 and 3.x before 3.2.2, a malicious user can obtain privileges via the mapValues() method, aka lib/internal/iterator.js createObjectIterator prototype pollution.
Publish Date: 2022-04-06
URL: CVE-2021-43138
CVSS 3 Score Details (7.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-43138
Release Date: 2022-04-06
Fix Resolution (async): 2.6.4
Direct dependency fix Resolution (ejs): 3.1.6
:rescue_worker_helmet: Automatic Remediation is available for this issue
CVE-2022-3517
Vulnerable Library - minimatch-3.0.4.tgz
a glob matcher in javascript
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/minimatch/package.json
Dependency Hierarchy:
- ejs-3.1.5.tgz (Root Library)
- jake-10.8.2.tgz
- :x: minimatch-3.0.4.tgz (Vulnerable Library)
- jake-10.8.2.tgz
Found in HEAD commit: 12d9d9cff8f6e8b898c87aaa8bb77a3df3741f83
Found in base branch: main
Vulnerability Details
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
Publish Date: 2022-10-17
URL: CVE-2022-3517
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2022-10-17
Fix Resolution: minimatch - 3.0.5
:rescue_worker_helmet: Automatic Remediation is available for this issue.