server-up-ndot 1.3.4 → 1.3.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/readme.md +115 -0
package/package.json
CHANGED
package/readme.md
CHANGED
|
@@ -2,8 +2,11 @@
|
|
|
2
2
|
## axios
|
|
3
3
|
axios <=1.14.0
|
|
4
4
|
Severity: **critical**
|
|
5
|
+
|
|
5
6
|
Axios has a NO_PROXY Hostname Normalization Bypass Leads to SSRF - https://github.com/advisories/GHSA-3p68-rc4w-qgx5
|
|
7
|
+
|
|
6
8
|
Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain - https://github.com/advisories/GHSA-fvcv-3m26-pcqx
|
|
9
|
+
|
|
7
10
|
fix available via `npm audit fix`
|
|
8
11
|
|
|
9
12
|
*Pay attention to security!*
|
|
@@ -71,6 +74,9 @@ npx server-up-ndot create myserver
|
|
|
71
74
|
|
|
72
75
|
## 1.3.x
|
|
73
76
|
|
|
77
|
+
### 1.3.5
|
|
78
|
+
- sicu report updated
|
|
79
|
+
|
|
74
80
|
### 1.3.4
|
|
75
81
|
- sicu news updated
|
|
76
82
|
|
|
@@ -154,3 +160,112 @@ npx server-up-ndot build
|
|
|
154
160
|
- Fix security issues
|
|
155
161
|
- deleted package `body-parser`
|
|
156
162
|
- Fix license
|
|
163
|
+
|
|
164
|
+
# 🔐 Today Security Report (Critical npm Vulnerabilities)
|
|
165
|
+
|
|
166
|
+
## Overview
|
|
167
|
+
This document provides a concise security report of recently identified **critical vulnerabilities in widely used npm packages and Node.js environments**.
|
|
168
|
+
The focus is on high-impact issues that may lead to **Remote Code Execution (RCE), Server-Side Request Forgery (SSRF), Denial of Service (DoS), and Supply Chain Attacks**.
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
## 🚨 Critical Findings
|
|
173
|
+
|
|
174
|
+
### 1. axios (High Risk – Supply Chain + Multiple CVEs)
|
|
175
|
+
|
|
176
|
+
**Affected Versions**
|
|
177
|
+
- `<= 1.13.x`
|
|
178
|
+
- Compromised releases: `1.14.1`, `0.30.4`
|
|
179
|
+
|
|
180
|
+
**Severity**
|
|
181
|
+
- 🔥 CRITICAL
|
|
182
|
+
|
|
183
|
+
**Vulnerability Types**
|
|
184
|
+
- Server-Side Request Forgery (SSRF)
|
|
185
|
+
- Denial of Service (DoS)
|
|
186
|
+
- Prototype Pollution
|
|
187
|
+
- Memory Exhaustion
|
|
188
|
+
- Supply Chain Attack (Backdoor / RAT)
|
|
189
|
+
|
|
190
|
+
**Description**
|
|
191
|
+
Axios, one of the most widely used HTTP clients in Node.js, has been affected by multiple critical vulnerabilities.
|
|
192
|
+
Recent incidents include a **supply chain compromise**, where malicious code was injected into official package releases, enabling remote access (RAT) on affected systems.
|
|
193
|
+
|
|
194
|
+
**Impact**
|
|
195
|
+
- Remote attackers may gain system access
|
|
196
|
+
- Internal network exposure via SSRF
|
|
197
|
+
- Full server crash through memory exhaustion
|
|
198
|
+
- Execution of malicious payloads
|
|
199
|
+
|
|
200
|
+
**Recommendation**
|
|
201
|
+
- Upgrade to a secure version immediately (`>= 1.13.5`)
|
|
202
|
+
- Avoid compromised versions:
|
|
203
|
+
- `1.14.1`
|
|
204
|
+
- `0.30.4`
|
|
205
|
+
- Lock dependencies using `package-lock.json` or `pnpm-lock.yaml`
|
|
206
|
+
- Perform integrity checks on installed packages
|
|
207
|
+
|
|
208
|
+
---
|
|
209
|
+
|
|
210
|
+
### 2. Node.js Runtime (Critical Environment Vulnerability)
|
|
211
|
+
|
|
212
|
+
**Severity**
|
|
213
|
+
- 🔥 CRITICAL
|
|
214
|
+
|
|
215
|
+
**Vulnerability Type**
|
|
216
|
+
- Stack Overflow / Denial of Service
|
|
217
|
+
|
|
218
|
+
**Description**
|
|
219
|
+
A vulnerability in Node.js related to `async_hooks` can be exploited to trigger a **stack overflow**, leading to application crashes.
|
|
220
|
+
Since this affects the runtime itself, all applications using vulnerable versions are at risk.
|
|
221
|
+
|
|
222
|
+
**Impact**
|
|
223
|
+
- Application crash (DoS)
|
|
224
|
+
- Potential service-wide outage
|
|
225
|
+
|
|
226
|
+
**Recommendation**
|
|
227
|
+
- Update Node.js to the latest LTS version
|
|
228
|
+
- Avoid unsafe usage of `async_hooks`
|
|
229
|
+
- Monitor runtime-level advisories regularly
|
|
230
|
+
|
|
231
|
+
---
|
|
232
|
+
|
|
233
|
+
### 3. form-data (Transitive Dependency Risk)
|
|
234
|
+
|
|
235
|
+
**Severity**
|
|
236
|
+
- 🟠 HIGH
|
|
237
|
+
|
|
238
|
+
**Vulnerability Type**
|
|
239
|
+
- Predictable multipart boundary
|
|
240
|
+
- Request manipulation
|
|
241
|
+
|
|
242
|
+
**Description**
|
|
243
|
+
The `form-data` package, often used indirectly via axios, contains weaknesses in boundary generation, which may allow attackers to manipulate HTTP requests.
|
|
244
|
+
|
|
245
|
+
**Impact**
|
|
246
|
+
- Request tampering
|
|
247
|
+
- Potential injection vectors
|
|
248
|
+
|
|
249
|
+
**Recommendation**
|
|
250
|
+
- Update dependencies
|
|
251
|
+
- Audit indirect dependencies (`npm ls`)
|
|
252
|
+
- Use secure alternatives where possible
|
|
253
|
+
|
|
254
|
+
---
|
|
255
|
+
|
|
256
|
+
## 📊 Risk Prioritization
|
|
257
|
+
|
|
258
|
+
| Priority | Component | Risk Level | Notes |
|
|
259
|
+
|----------|------------|-----------|------------------------------|
|
|
260
|
+
| 1 | axios | CRITICAL | Supply chain + multiple CVEs |
|
|
261
|
+
| 2 | Node.js | CRITICAL | Runtime-level vulnerability |
|
|
262
|
+
| 3 | form-data | HIGH | Transitive dependency risk |
|
|
263
|
+
|
|
264
|
+
---
|
|
265
|
+
|
|
266
|
+
## 🛡️ Mitigation Strategy
|
|
267
|
+
|
|
268
|
+
### Immediate Actions
|
|
269
|
+
```bash
|
|
270
|
+
npm audit
|
|
271
|
+
npm audit fix
|