Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc4ajUtZ2NtZi12cWM4
Cross-Site Scripting (XSS) in Verdaccio
Impact
What kind of vulnerability is it? Who is impacted?
Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials.
Patches
Has the problem been patched? What versions should users upgrade to?
Users that still using v3
must upgrade to >3.12.0 or those have no problem to migrate to a major version >=4.0.0 also fix the issue.
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
No, the users must update.
References
Are there any links users can visit to find out more?
https://www.npmjs.com/advisories/832
https://www.npmjs.com/advisories/833
The issue was reported by the NPMJS Security Team
For more information
If you have any questions or comments about this advisory:
- Read the Security Policy to find the ways to be in contact with us.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTc4ajUtZ2NtZi12cWM4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 5 years ago
Updated: almost 2 years ago
CVSS Score: 6.1
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00087
EPSS Percentile: 0.38522
Identifiers: GHSA-78j5-gcmf-vqc8, CVE-2019-14772
References:
- https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8
- https://www.npmjs.com/advisories/833
- https://www.npmjs.com/advisories/832
- https://nvd.nist.gov/vuln/detail/CVE-2019-14772
- https://github.com/advisories/GHSA-78j5-gcmf-vqc8
Blast Radius: 22.1
Affected Packages
npm:verdaccio
Dependent packages: 225Dependent repositories: 4,188
Downloads: 890,807 last month
Affected Version Ranges: < 3.12.0
Fixed in: 3.12.0
All affected versions: 0.1.7, 1.4.0, 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.5, 2.2.6, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.6, 2.4.0, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.1.1, 3.1.2, 3.2.0, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, 3.7.0, 3.7.1, 3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.9.0, 3.10.0, 3.10.1, 3.10.2, 3.11.0, 3.11.1, 3.11.2, 3.11.3, 3.11.4, 3.11.5, 3.11.6, 3.11.7
All unaffected versions: 3.12.0, 3.12.1, 3.12.2, 3.12.3, 3.13.0, 3.13.1, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1.0, 4.2.0, 4.2.1, 4.2.2, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.3.4, 4.3.5, 4.4.0, 4.4.1, 4.4.2, 4.4.3, 4.4.4, 4.5.0, 4.5.1, 4.6.0, 4.6.1, 4.6.2, 4.7.0, 4.7.1, 4.7.2, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.10.0, 4.11.0, 4.11.1, 4.11.2, 4.11.3, 4.12.0, 4.12.1, 4.12.2, 4.13.0, 4.13.2, 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.5, 5.1.6, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.3.0, 5.3.1, 5.3.2, 5.4.0, 5.5.0, 5.5.1, 5.5.2, 5.6.0, 5.6.1, 5.6.2, 5.7.0, 5.7.1, 5.8.0, 5.9.0, 5.10.0, 5.10.1, 5.10.2, 5.10.3, 5.11.0, 5.12.0, 5.13.0, 5.13.1, 5.13.2, 5.13.3, 5.14.0, 5.15.0, 5.15.1, 5.15.2, 5.15.3, 5.15.4, 5.16.0, 5.16.1, 5.16.3, 5.17.0, 5.18.0, 5.19.0, 5.19.1, 5.20.1, 5.21.0, 5.21.1, 5.21.2, 5.22.0, 5.22.1, 5.23.0, 5.23.1, 5.23.2, 5.24.0, 5.24.1, 5.25.0, 5.26.0, 5.26.1, 5.26.2, 5.26.3, 5.27.0, 5.27.1, 5.28.0, 5.29.0, 5.29.1, 5.29.2, 5.30.0, 5.30.1, 5.30.2, 5.30.3, 5.31.0, 5.31.1, 5.32.0, 5.32.1, 5.32.2, 5.33.0, 6.0.0, 6.0.1, 6.0.2