valine@1.2.8 vulnerabilities

A simple comment system based on Leancloud.

Direct Vulnerabilities

Known vulnerabilities in the valine package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via a crafted POST request.

How to fix Cross-site Scripting (XSS)?

Upgrade valine to version 1.5.0 or higher.

<1.5.0
  • M
Cross-site Scripting (XSS)

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the nick parameter, which makes it possible for an attacker to embed an arbitrary HTML/JavaScript in the comment.

How to fix Cross-site Scripting (XSS)?

Upgrade valine to version 1.4.15 or higher.

<1.4.15
  • H
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS). It allows remote attackers to supply a User-Agent value that only specifies the product and version.

How to fix Denial of Service (DoS)?

There is no fixed version for valine.

*
  • M
HTML Injection

valine is a fast, simple & powerful comment system.

Affected versions of this package are vulnerable to HTML Injection. While uploading a PDF file, An attacker could inject a java script code.

How to fix HTML Injection?

Upgrade to version 1.3.4 or higher.

<1.3.4