@advanced-rest-client/arc-headers@0.0.1

Vulnerabilities

2 via 4 paths

Dependencies

225

Source

npm

Find, fix and prevent vulnerabilities in your code.

Severity
  • 2
Status
  • 2
  • 0
  • 0

medium severity

Denial of Service

  • Vulnerable module: node-fetch
  • Introduced through: @advanced-rest-client/arc-types@0.1.10 and @advanced-rest-client/arc-events@0.1.7

Detailed paths

  • Introduced through: @advanced-rest-client/arc-headers@0.0.1 @advanced-rest-client/arc-types@0.1.10 @advanced-rest-client/arc-models@4.3.2 pouchdb@7.2.2 node-fetch@2.6.0
  • Introduced through: @advanced-rest-client/arc-headers@0.0.1 @advanced-rest-client/arc-events@0.1.7 @advanced-rest-client/arc-types@0.1.10 @advanced-rest-client/arc-models@4.3.2 pouchdb@7.2.2 node-fetch@2.6.0

Overview

node-fetch is an A light-weight module that brings window.fetch to node.js

Affected versions of this package are vulnerable to Denial of Service. Node Fetch did not honor the size option after following a redirect, which means that when a content size was over the limit, a FetchError would never get thrown and the process would end without failure.

Remediation

Upgrade node-fetch to version 2.6.1, 3.0.0-beta.9 or higher.

References

medium severity

Arbitrary Code Injection

  • Vulnerable module: underscore
  • Introduced through: @advanced-rest-client/arc-types@0.1.10 and @advanced-rest-client/arc-events@0.1.7

Detailed paths

  • Introduced through: @advanced-rest-client/arc-headers@0.0.1 @advanced-rest-client/arc-types@0.1.10 @advanced-rest-client/arc-models@4.3.2 @advanced-rest-client/body-editor@0.1.14 @advanced-rest-client/code-mirror-linter@3.0.2 jsonlint@1.6.3 nomnom@1.8.1 underscore@1.6.0
  • Introduced through: @advanced-rest-client/arc-headers@0.0.1 @advanced-rest-client/arc-events@0.1.7 @advanced-rest-client/arc-types@0.1.10 @advanced-rest-client/arc-models@4.3.2 @advanced-rest-client/body-editor@0.1.14 @advanced-rest-client/code-mirror-linter@3.0.2 jsonlint@1.6.3 nomnom@1.8.1 underscore@1.6.0

Overview

underscore is a JavaScript's functional programming helper library.

Affected versions of this package are vulnerable to Arbitrary Code Injection via the template function, particularly when the variable option is taken from _.templateSettings as it is not sanitized.

PoC

const _ = require('underscore');
_.templateSettings.variable = "a = this.process.mainModule.require('child_process').execSync('touch HELLO')";
const t = _.template("")();

Remediation

Upgrade underscore to version 1.13.0-2, 1.12.1 or higher.

References