Vulnerabilities

3 via 4 paths

Dependencies

379

Source

GitHub

Commit

427bb3d9

Find, fix and prevent vulnerabilities in your code.

Severity
  • 2
  • 1
Status
  • 3
  • 0
  • 0

high severity

Infinite loop

  • Vulnerable module: markdown-it
  • Introduced through: graphiql@2.0.8

Detailed paths

  • Introduced through: parse-dashboard@parse-community/parse-dashboard#427bb3d98b48a2de461119ac6f5b8d261f741d22 graphiql@2.0.8 markdown-it@12.3.2
    Remediation: Upgrade to graphiql@3.2.0.
  • Introduced through: parse-dashboard@parse-community/parse-dashboard#427bb3d98b48a2de461119ac6f5b8d261f741d22 graphiql@2.0.8 @graphiql/react@0.13.7 markdown-it@12.3.2
    Remediation: Upgrade to graphiql@3.2.0.

Overview

markdown-it is a modern pluggable markdown parser.

Affected versions of this package are vulnerable to Infinite loop in linkify inline rule when using malformed input.

Remediation

Upgrade markdown-it to version 13.0.2 or higher.

References

high severity

Use of Weak Hash

  • Vulnerable module: crypto-js
  • Introduced through: parse@3.4.2

Detailed paths

  • Introduced through: parse-dashboard@parse-community/parse-dashboard#427bb3d98b48a2de461119ac6f5b8d261f741d22 parse@3.4.2 crypto-js@4.1.1
    Remediation: Upgrade to parse@4.3.1.

Overview

crypto-js is a library of crypto standards.

Affected versions of this package are vulnerable to Use of Weak Hash due to inadequate security settings in the PBKDF2 configuration, which uses insecure SHA1 and has a low iteration count of 1. These insecure settings allow attackers to perform brute-force attacks when PBKDF2 is used with the default parameters.

No information is directly exposed when a hash is generated, regardless of whether the PBKDF2 function is in the vulnerable configuration or not. However, it may be possible to recover the original data, more or less easily depending on the configured parameters, using a brute force attack. This is a low impact on the confidentiality of the protected data, which are in a different scope than the vulnerable package.

The attacker similarly may be able to modify some data which is meant to be protected by the vulnerable package - most commonly when it is used for signature verification. This would require a subsequent exploitation, such as forcing a hash collision via length extension attack. The integrity of the data is therefore compromised, but the quantity and targeting of that data is not fully in the attacker's control, yielding a low integrity impact.

Notes

  • This vulnerability is related to https://security.snyk.io/vuln/SNYK-JS-CRYPTOES-6032390 in crypto-es.

  • According to the crypto-js maintainer: "Active development of CryptoJS has been discontinued. This library is no longer maintained." It is recommended to use the Node.js native crypto module.

Workaround

This vulnerability can be avoided by setting PBKDF2 to use SHA-256 instead of SHA-1 and increasing the number of iterations to a sufficiently high value depending on the intended use. See, for example, the OWASP PBKDF2 Cheat Sheet for recommendations.

Changelog:

2023-10-24 - Initial publication

2023-10-25 - Added fixed version, updated references, separated crypto-es, description changes, updated CVSS, added CVE ID

2023-11-07 - Re-assessed CVSS following a CVSS publication on NVD. No changes made to CVSS.

2024-01-11 - Revised CVSS and description after additional deeper investigation, to reflect the details of the severity assessment

Remediation

Upgrade crypto-js to version 4.2.0 or higher.

References

medium severity

Session Fixation

  • Vulnerable module: passport
  • Introduced through: passport@0.5.3

Detailed paths

  • Introduced through: parse-dashboard@parse-community/parse-dashboard#427bb3d98b48a2de461119ac6f5b8d261f741d22 passport@0.5.3
    Remediation: Upgrade to passport@0.6.0.

Overview

passport is a Simple, unobtrusive authentication for Node.js.

Affected versions of this package are vulnerable to Session Fixation. When a user logs in or logs out, the session is regenerated instead of being closed.

Remediation

Upgrade passport to version 0.6.0 or higher.

References