Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

同学,您这个项目引入了22个开源组件,存在3个漏洞,辛苦升级一下 #32

Closed
dependasec bot opened this issue Mar 15, 2022 · 1 comment

Comments

@dependasec
Copy link

dependasec bot commented Mar 15, 2022

检测到 emn178/js-sha256 一共引入了22个开源组件,存在3个漏洞

漏洞标题:Growl命令执行漏洞
缺陷组件:growl@1.8.1
漏洞编号:CVE-2017-16042
漏洞描述:Growl是一套支持Node.js的通知系统。
Growl 1.10.2之前版本中存在安全漏洞,该漏洞源于在将输入传递到shell命令之前,程序未能正确的对其进行过滤。攻击者可利用该漏洞执行任意命令。
国家漏洞库信息:https://www.cnvd.org.cn/flaw/show/CNVD-2018-24664
影响范围:(∞, 1.10.0)
最小修复版本:1.10.0
缺陷组件引入路径:js-sha256@0.8.0->mocha@2.3.4->growl@1.8.1

另外还有3个漏洞,详细报告:https://mofeisec.com/jr?p=i17ed6

emn178 added a commit that referenced this issue Aug 30, 2023
### Fixed
- Chrome bug by workaround. #40
- deprecated `new Buffer`, replace with `Buffer.from`. #34
- dependencies and security issues. #32, #36

### Changed
- TypeScript interface, secretKey can be bytes like message. #23, #25
- remove `eval` and use `require` directly. #18, #26
@emn178
Copy link
Owner

emn178 commented Aug 30, 2023

done in v0.10.0

@emn178 emn178 closed this as completed Sep 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant