truffle-provider@0.0.8

Vulnerabilities

2 via 2 paths

Dependencies

7

Source

npm

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
  • 1
Status
  • 2
  • 0
  • 0

high severity

Insecure Randomness

  • Vulnerable module: crypto-js
  • Introduced through: web3@0.20.6

Detailed paths

  • Introduced through: truffle-provider@0.0.8 web3@0.20.6 crypto-js@3.3.0
    Remediation: Upgrade to truffle-provider@0.1.0.

Overview

crypto-js is a library of crypto standards.

Affected versions of this package are vulnerable to Insecure Randomness. The secureRandom() method is supposed to return a cryptographically strong pseudo-random data string, but it is biased to certain digits. An attacker could be able to guess the created digits.

Remediation

Upgrade crypto-js to version 4.0.0, 3.2.1 or higher.

References

low severity

Insecure Credential Storage

  • Vulnerable module: web3
  • Introduced through: web3@0.20.6

Detailed paths

  • Introduced through: truffle-provider@0.0.8 web3@0.20.6

Overview

web3 is a JavaScript API which connects to the Generic JSON RPC spec.

Affected versions of this package are vulnerable to Insecure Credential Storage. The current implementation of web3.js could result in wallet decryption under certain circumstances. When a wallet is saved and encrypted into local storage, a private key is needed to load the wallet. However, this private key is available via LocalStorage and is readable in plaintext on a webpage after a wallet is loaded.

This implementation could be abused by an attacker through client-side attacks such as Cross-site Scripting (XSS) and could result in theft of a user's wallet private key.

Remediation

There is no fixed version for web3.

References