Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJoM2gtdnc4ci04MnJw

Weak JSON Web Token in yapi-vendor

Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.

Permalink: https://github.com/advisories/GHSA-2h3h-vw8r-82rp
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJoM2gtdnc4ci04MnJw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: about 1 year ago


CVSS Score: 5.1
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Identifiers: GHSA-2h3h-vw8r-82rp, CVE-2021-27884
References: Repository: https://github.com/YMFE/yapi
Blast Radius: 0.0

Affected Packages

npm:yapi-vendor
Dependent packages: 0
Dependent repositories: 1
Downloads: 775 last month
Affected Version Ranges: <= 1.9.2
Fixed in: 1.9.3
All affected versions: 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.5.7, 1.5.8, 1.5.10, 1.5.11, 1.5.12, 1.5.13, 1.5.14, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.8.5, 1.8.7, 1.8.8, 1.9.0, 1.9.1, 1.9.2
All unaffected versions: 1.10.1, 1.10.2, 1.12.0