Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJoM2gtdnc4ci04MnJw
Weak JSON Web Token in yapi-vendor
Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.
Permalink: https://github.com/advisories/GHSA-2h3h-vw8r-82rpJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTJoM2gtdnc4ci04MnJw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: about 1 year ago
CVSS Score: 5.1
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-2h3h-vw8r-82rp, CVE-2021-27884
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-27884
- https://github.com/YMFE/yapi/issues/2117
- https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi
- https://github.com/YMFE/yapi/issues/2263
- https://github.com/advisories/GHSA-2h3h-vw8r-82rp
Blast Radius: 0.0
Affected Packages
npm:yapi-vendor
Dependent packages: 0Dependent repositories: 1
Downloads: 775 last month
Affected Version Ranges: <= 1.9.2
Fixed in: 1.9.3
All affected versions: 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.5.7, 1.5.8, 1.5.10, 1.5.11, 1.5.12, 1.5.13, 1.5.14, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.8.5, 1.8.7, 1.8.8, 1.9.0, 1.9.1, 1.9.2
All unaffected versions: 1.10.1, 1.10.2, 1.12.0