question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

High Vulnerabilities

See original GitHub issue

This is connected to the issue critical vulnerabilities #851.

The latest OWASP scan considering version 1.0.2 reports 12 high vulnerabilities. The critical vulnerabilities were successfully accounted for with the previous issue and corresponding pull request. All of the high issues pertain to npm. The security team in my organization requires critical and high vulnerabilities to be non-existent for the approved use.

pkg:npm/ini@1.3.5 HIGH CWE-471: Modification of Assumed-Immutable Data (MAID) https://ossindex.sonatype.org/vulnerability/c08153de-a0ad-4212-963d-3de92eaab509?component-type=npm&component-name=ini&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 The software does not properly protect an assumed-immutable element from being modified by an attacker.

pkg:npm/lodash@4.17.15 HIGH CVE-2021-23337 https://ossindex.sonatype.org/vulnerability/22d2fa1f-0b1d-4240-a4c0-9954a5dc9082?component-type=npm&component-name=lodash&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

pkg:npm/lodash@4.17.15 high 1673 lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

pkg:npm/lodash@4.17.15 HIGH CVE-2020-8203 https://ossindex.sonatype.org/vulnerability/8740216c-fea2-4998-a7c0-a687c35a2f92?component-type=npm&component-name=lodash&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 Prototype pollution attack when using _.zipObjectDeep in lodash <= 4.17.15.

pkg:npm/lodash@4.17.15 HIGH CWE-770: Allocation of Resources Without Limits or Throttling https://ossindex.sonatype.org/vulnerability/eeedfb1c-6a5e-428c-bb17-c64b66f9eced?component-type=npm&component-name=lodash&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 “The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on how many resources can be allocated, in violation of the intended security policy for that actor.”

pkg:npm/lodash@4.17.20 HIGH CVE-2021-23337 https://ossindex.sonatype.org/vulnerability/22d2fa1f-0b1d-4240-a4c0-9954a5dc9082?component-type=npm&component-name=lodash&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

pkg:npm/lodash@4.17.20 high 1673 lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.

pkg:npm/markdown@0.5.0 HIGH CWE-400: Uncontrolled Resource Consumption (‘Resource Exhaustion’) https://ossindex.sonatype.org/vulnerability/696b3c22-8fb1-4dde-8042-4691ae4107d6?component-type=npm&component-name=markdown&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 “The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.”

pkg:npm/minimist@0.0.10 HIGH CWE-94: Improper Control of Generation of Code (‘Code Injection’) https://ossindex.sonatype.org/vulnerability/a0172c09-270c-4d3c-9816-564f20f372db?component-type=npm&component-name=minimist&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 “The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.”

pkg:npm/prismjs@1.19.0 HIGH CWE-400: Uncontrolled Resource Consumption (‘Resource Exhaustion’) https://ossindex.sonatype.org/vulnerability/80928575-5fee-4f94-8bc6-48b2461442df?component-type=npm&component-name=prismjs&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 “The software does not properly restrict the size or amount of resources that are requested or influenced by an actor, which can be used to consume more resources than intended.”

pkg:npm/y18n@3.2.1 high 1654 “y18n before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to prototype pollution.\n\n## POC\n\n\nconst y18n = require('y18n')();\n \ny18n.setLocale('__proto__');\ny18n.updateLocale({polluted: true});\n\nconsole.log(polluted); \/\/ true\n

pkg:npm/y18n@3.2.1 HIGH CWE-20: Improper Input Validation https://ossindex.sonatype.org/vulnerability/ef4add6f-4439-4eb8-bd0e-d040ff4ba76b?component-type=npm&component-name=y18n&utm_source=dependency-check&utm_medium=integration&utm_content=6.1.0 The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Issue Analytics

  • State:closed
  • Created 2 years ago
  • Comments:8 (1 by maintainers)

github_iconTop GitHub Comments

1reaction
dalekubecommented, Aug 24, 2021

@dalekube hey!

took another round updating vulnerable packages. please, take a look on the progress. everything must be clear now

@nicholasrq , thank you! I completed another scan. All that remains are 9 medium vulnerabilities. We are good to go on our end now considering that the critical and high vulnerabilities were properly accounted for. Thanks again for the updates! We will wait until the next release and then upgrade our instance with pip—and then begin to use the instance.

0reactions
nicholasrqcommented, Aug 24, 2021

@dalekube hey!

took another round updating vulnerable packages. please, take a look on the progress. everything must be clear now

Read more comments on GitHub >

github_iconTop Results From Across the Web

Vulnerability Severity Levels - Invicti
A High severity vulnerability means that your website can be hacked and can lead hackers to find other vulnerabilities which have a bigger...
Read more >
Known Exploited Vulnerabilities Catalog | CISA
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK ......
Read more >
Vulnerability Metrics - NVD
NVD Vulnerability Severity Ratings. NVD provides qualitative severity ratings of "Low", "Medium", and "High" for CVSS v2.0 base score ranges in addition to ......
Read more >
Chromium Docs - Severity Guidelines for Security Issues
High severity vulnerabilities allow an attacker to execute code in the context of, or otherwise impersonate other origins or read cross-origin data.
Read more >
High risk, critical vulnerabilities found in 25% of all software ...
Across systems, one-fifth had high risk vulnerabilities and just under 5% were considered critical. Researchers conducted 4,400 tests on ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found