Skip to content

Commit 1391ac7

Browse files
authored
Add severity to JSON feed (#1374)
* vuln/core: fix bad refs * vuln/core: add severity * vuln/core: CR fixes * vuln/core: CR fixes 2
1 parent 4c60f4c commit 1391ac7

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

149 files changed

+901
-307
lines changed

__mocks__/mockVuln/pass/core/1.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,5 +7,6 @@
77
"patched": "^8.1.4 || ^7.10.1 || ^4.8.4 || ^6.11.1",
88
"description": "mocked core vulnerability overview",
99
"overview": "mocked core vulnerability overview",
10-
"affectedEnvironments": ["all"]
10+
"affectedEnvironments": ["all"],
11+
"severity": "medium"
1112
}

tools/vuln_valid/vulnValidate.js

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,10 @@ const coreModel = joi.object().keys({
3737
// See: https://nodejs.org/api/os.html#osplatform
3838
.items(joi.string().valid("all", "aix", "darwin", "freebsd", "linux", "openbsd", "sunos", "win32", "android"))
3939
.min(1)
40+
.required(),
41+
severity: joi
42+
.string()
43+
.regex(/^(unknown)|(low)|(medium)|(high)|(critical)$/)
4044
.required()
4145
});
4246

vuln/core/1.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,5 +7,8 @@
77
"patched": "^8.1.4 || ^7.10.1 || ^4.8.4 || ^6.11.1",
88
"description": "memory overread when parsing invalid NAPTR responses",
99
"overview": "The c-ares function ares_parse_naptr_reply(), which is used for parsing NAPTR\nresponses, could be triggered to read memory outside of the given input buffer\nif the passed in DNS response packet was crafted in a particular way.\n\n",
10-
"affectedEnvironments": ["all"]
10+
"affectedEnvironments": [
11+
"all"
12+
],
13+
"severity": "unknown"
1114
}

vuln/core/10.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,5 +6,8 @@
66
"patched": "^6.9.0",
77
"ref": "https://nodejs.org/en/blog/vulnerability/october-2016-security-releases/",
88
"overview": "The V8 parser mishandled scopes, potentially allowing an attacker to obtain\nsensitive information from arbitrary memory locations via crafted JavaScript\ncode. This vulnerability would require an attacker to be able to execute\narbitrary JavaScript code in a Node.js process.\n\n",
9-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "unknown"
1013
}

vuln/core/100.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
{
2-
"cve": ["CVE-2022-35256"],
2+
"cve": [
3+
"CVE-2022-35256"
4+
],
35
"vulnerable": "14.x || 16.x || 18.x",
46
"patched": "^14.20.1 || ^16.17.1 || ^18.9.1",
57
"ref": "https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/",
68
"overview": "The llhttp parser in the http module in Node.js v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.",
7-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "medium"
813
}

vuln/core/101.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
{
2-
"cve": ["CVE-2022-35255"],
2+
"cve": [
3+
"CVE-2022-35255"
4+
],
35
"vulnerable": "18.x",
46
"patched": "^18.9.1",
57
"ref": "https://nodejs.org/en/blog/vulnerability/september-2022-security-releases/",
68
"overview": "Node.js made calls to EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. However, it does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail.",
7-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "high"
813
}

vuln/core/102.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
{
2-
"cve": ["CVE-2022-43548"],
2+
"cve": [
3+
"CVE-2022-43548"
4+
],
35
"vulnerable": "14.x || 16.x || 18.x || 19.x",
46
"patched": "^14.21.1 || ^16.18.1 || ^18.12.1 || ^19.0.1",
57
"ref": "https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/",
68
"overview": "The Node.js rebinding protector for --inspect still allows invalid IP address, specifically, the octal format.",
7-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "medium"
813
}

vuln/core/103.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
{
2-
"cve": ["CVE-2023-23918"],
2+
"cve": [
3+
"CVE-2023-23918"
4+
],
35
"vulnerable": "14.x || 16.x || 18.x || 19.x",
46
"patched": "^14.21.3 || ^16.19.1 || ^18.14.1 || ^19.6.1",
57
"ref": "https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/",
68
"overview": "It was possible to bypass Permissions and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.",
7-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "high"
813
}

vuln/core/104.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
{
2-
"cve": ["CVE-2023-23919"],
2+
"cve": [
3+
"CVE-2023-23919"
4+
],
35
"vulnerable": "14.x || 16.x || 18.x || 19.x",
46
"patched": "^14.21.3 || ^16.19.1 || ^18.14.1 || ^19.2.0",
57
"ref": "https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/",
68
"overview": "In some cases Node.js did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.",
7-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "medium"
813
}

vuln/core/105.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,13 @@
11
{
2-
"cve": ["CVE-2023-23936"],
2+
"cve": [
3+
"CVE-2023-23936"
4+
],
35
"vulnerable": "14.x || 16.x || 18.x || 19.x",
46
"patched": "^14.21.3 || ^16.19.1 || ^18.14.1 || ^19.6.1",
57
"ref": "https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/",
68
"overview": "The fetch API in Node.js did not prevent CRLF injection in the 'host' header potentially allowing attacks such as HTTP response splitting and HTTP header injection.",
7-
"affectedEnvironments": ["all"]
9+
"affectedEnvironments": [
10+
"all"
11+
],
12+
"severity": "medium"
813
}

0 commit comments

Comments
 (0)