Vulnerabilities

2 via 2 paths

Dependencies

164

Source

npm

Find, fix and prevent vulnerabilities in your code.

Severity
  • 2
Status
  • 2
  • 0
  • 0

medium severity
new

Information Exposure

  • Vulnerable module: node-fetch
  • Introduced through: @expo/config-plugins@1.0.33

Detailed paths

  • Introduced through: expo-ads-admob@9.0.0 @expo/config-plugins@1.0.33 @expo/image-utils@0.3.14 node-fetch@2.6.7

Overview

node-fetch is a light-weight module that brings window.fetch to node.js

Affected versions of this package are vulnerable to Information Exposure when fetching a remote url with Cookie, if it get a Location response header, it will follow that url and try to fetch that url with provided cookie. This can lead to forwarding secure headers to 3th party.

Remediation

Upgrade node-fetch to version 3.1.1 or higher.

References

medium severity

Improper Input Validation

  • Vulnerable module: xmldom
  • Introduced through: @expo/config-plugins@1.0.33

Detailed paths

  • Introduced through: expo-ads-admob@9.0.0 @expo/config-plugins@1.0.33 @expo/plist@0.0.13 xmldom@0.5.0

Overview

xmldom is an A pure JavaScript W3C standard-based (XML DOM Level 2 Core) DOMParser and XMLSerializer module.

Affected versions of this package are vulnerable to Improper Input Validation. It does not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications.

Remediation

A fix was pushed into the master branch but not yet published.

References