nci-ats/fs-middlelayer-api

View on GitHub
npm-shrinkwrap.json

Summary

Maintainability
Test Coverage

debug Regular Expression Denial of Service
Open

    "debug": {
      "version": "2.6.7",
      "from": "debug@2.6.7",
      "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.7.tgz"
    },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.

Recommendation:

Upgrade to version 2.6.9 or greater if you are on the 2.6.x series or 3.1.0 or greater.

pg Remote Code Execution
Open

    "pg": {
      "version": "6.2.3",
      "from": "pg@>=6.2.2 <7.0.0",
      "resolved": "https://registry.npmjs.org/pg/-/pg-6.2.3.tgz"
    },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Remote Code Execution

Overview:

A remote code execution vulnerability was found within the pg module when the remote database or query specifies a specially crafted column name.

The announcement from node-postgres mentions 2 likely scenarios in which you would likely be vulnerable.

  1. You are executing unsafe, user-supplied sql which contains a malicious column name like the one in the proof of concept below.
  2. You are connecting to an untrusted database and executing a query which returns results where any of the column names are malicious.

Proof of concept ``` const { Client } = require('pg') const client = new Client() client.connect()

const sql = SELECT 1 AS "\\'/*", 2 AS "\\'*/\n + console.log(process.env)] = null;\n//"

client.query(sql, (err, res) => { client.end() }) ```

Recommendation:

Upgrade to one of these versions listed below.

marked Regular Expression Denial of Service
Open

    "marked": {
      "version": "0.3.6",
      "from": "marked@>=0.3.6 <0.4.0",
      "resolved": "https://registry.npmjs.org/marked/-/marked-0.3.6.tgz"
    },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The marked module is vulnerable to a regular expression denial of service. Based on the information published in the public issue, 1k characters can block for around 6 seconds.

Recommendation:

Consider another markdown parser until the issue can be addressed.

minimatch Regular Expression Denial of Service
Open

        "minimatch": {
          "version": "0.2.14",
          "from": "minimatch@>=0.2.11 <0.3.0",
          "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-0.2.14.tgz"
        }
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

// utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

var exploit = “[!” + genstr(1000000, “\”) + “A”;

// minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

Recommendation:

Updated to version 3.0.2 or greater

tough-cookie Regular Expression Denial of Service
Open

    "tough-cookie": {
      "version": "2.3.2",
      "from": "tough-cookie@>=2.3.0 <2.4.0",
      "resolved": "https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.3.2.tgz",
      "dependencies": {
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The tough-cookie module is vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds.

Unless node was compiled using the -DHTTPMAXHEADER_SIZE= option the default header max length is 80kb so the impact of the ReDoS is limited to around 7.3 seconds of blocking.

At the time of writing all version <=2.3.2 are vulnerable

Recommendation:

Please update to version 2.3.3 or greater

fresh Regular Expression Denial of Service
Open

    "fresh": {
      "version": "0.5.0",
      "from": "fresh@0.5.0",
      "resolved": "https://registry.npmjs.org/fresh/-/fresh-0.5.0.tgz"
    },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

Fresh is a module used by the Express.js framework for 'HTTP response freshness testing'. It is vulnerable to a regular expression denial of service when it is passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.

Recommendation:

If you are using this module via express, upgrade to Express version 4.15.5 or greater.

Upgrade to 0.5.2 or greater

mime Regular Expression Denial of Service
Open

        "mime": {
          "version": "1.3.4",
          "from": "mime@1.3.4",
          "resolved": "https://registry.npmjs.org/mime/-/mime-1.3.4.tgz"
        }
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.

Recommendation:

Upgrade to version 2.0.3 or greater.

debug Regular Expression Denial of Service
Open

        "debug": {
          "version": "2.6.8",
          "from": "debug@2.6.8",
          "resolved": "https://registry.npmjs.org/debug/-/debug-2.6.8.tgz"
        }
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The debug module is vulnerable to regular expression denial of service when untrusted user input is passed into the o formatter. It takes around 50k characters to block for 2 seconds making this a low severity issue.

Recommendation:

Upgrade to version 2.6.9 or greater if you are on the 2.6.x series or 3.1.0 or greater.

minimatch Regular Expression Denial of Service
Open

        "minimatch": {
          "version": "2.0.10",
          "from": "minimatch@>=2.0.1 <3.0.0",
          "resolved": "https://registry.npmjs.org/minimatch/-/minimatch-2.0.10.tgz"
        },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript RegExp objects. The primary function, minimatch(path, pattern) is vulnerable to ReDoS in the pattern parameter. This is because of the regular expression on line 521 of minimatch.js: /((?:\\{2})*)(\\?)\|/g,. The problematic portion of the regex is ((?:\\{2})*) which matches against \\.

A proof of concept is as follows: ``` var minimatch = require(“minimatch”);

// utility function for generating long strings var genstr = function (len, chr) { var result = “”; for (i=0; i<=len; i++) { result = result + chr; } return result; }

var exploit = “[!” + genstr(1000000, “\”) + “A”;

// minimatch exploit. console.log(“starting minimatch”); minimatch(“foo”, exploit); console.log(“finishing minimatch”); ```

Recommendation:

Updated to version 3.0.2 or greater

forwarded Regular Expression Denial of Service
Open

    "forwarded": {
      "version": "0.1.0",
      "from": "forwarded@>=0.1.0 <0.2.0",
      "resolved": "https://registry.npmjs.org/forwarded/-/forwarded-0.1.0.tgz"
    },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The forwarded module is used by the Express.js framework to handle the X-Forwarded-For header. It is vulnerable to a regular expression denial of service when it's passed specially crafted input to parse. This causes the event loop to be blocked causing a denial of service condition.

Recommendation:

If you are using this module via express, upgrade to Express version 4.15.5 or greater.

Upgrade to 0.1.2 or greater

mime Regular Expression Denial of Service
Open

    "mime": {
      "version": "1.2.11",
      "from": "mime@>=1.2.11 <1.3.0",
      "resolved": "https://registry.npmjs.org/mime/-/mime-1.2.11.tgz"
    },
Severity: Minor
Found in npm-shrinkwrap.json by nodesecurity

Regular Expression Denial of Service

Overview:

The mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.

Recommendation:

Upgrade to version 2.0.3 or greater.

There are no issues that match your filters.

Category
Status