server-up-ndot 1.3.4 → 1.3.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/package.json +1 -1
  2. package/readme.md +115 -0
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "server-up-ndot",
3
- "version": "1.3.4",
3
+ "version": "1.3.5",
4
4
  "description": "server toolkit",
5
5
  "main": "index.js",
6
6
  "bin": {
package/readme.md CHANGED
@@ -2,8 +2,11 @@
2
2
  ## axios
3
3
  axios <=1.14.0
4
4
  Severity: **critical**
5
+
5
6
  Axios has a NO_PROXY Hostname Normalization Bypass Leads to SSRF - https://github.com/advisories/GHSA-3p68-rc4w-qgx5
7
+
6
8
  Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain - https://github.com/advisories/GHSA-fvcv-3m26-pcqx
9
+
7
10
  fix available via `npm audit fix`
8
11
 
9
12
  *Pay attention to security!*
@@ -71,6 +74,9 @@ npx server-up-ndot create myserver
71
74
 
72
75
  ## 1.3.x
73
76
 
77
+ ### 1.3.5
78
+ - sicu report updated
79
+
74
80
  ### 1.3.4
75
81
  - sicu news updated
76
82
 
@@ -154,3 +160,112 @@ npx server-up-ndot build
154
160
  - Fix security issues
155
161
  - deleted package `body-parser`
156
162
  - Fix license
163
+
164
+ # 🔐 Today Security Report (Critical npm Vulnerabilities)
165
+
166
+ ## Overview
167
+ This document provides a concise security report of recently identified **critical vulnerabilities in widely used npm packages and Node.js environments**.
168
+ The focus is on high-impact issues that may lead to **Remote Code Execution (RCE), Server-Side Request Forgery (SSRF), Denial of Service (DoS), and Supply Chain Attacks**.
169
+
170
+ ---
171
+
172
+ ## 🚨 Critical Findings
173
+
174
+ ### 1. axios (High Risk – Supply Chain + Multiple CVEs)
175
+
176
+ **Affected Versions**
177
+ - `<= 1.13.x`
178
+ - Compromised releases: `1.14.1`, `0.30.4`
179
+
180
+ **Severity**
181
+ - 🔥 CRITICAL
182
+
183
+ **Vulnerability Types**
184
+ - Server-Side Request Forgery (SSRF)
185
+ - Denial of Service (DoS)
186
+ - Prototype Pollution
187
+ - Memory Exhaustion
188
+ - Supply Chain Attack (Backdoor / RAT)
189
+
190
+ **Description**
191
+ Axios, one of the most widely used HTTP clients in Node.js, has been affected by multiple critical vulnerabilities.
192
+ Recent incidents include a **supply chain compromise**, where malicious code was injected into official package releases, enabling remote access (RAT) on affected systems.
193
+
194
+ **Impact**
195
+ - Remote attackers may gain system access
196
+ - Internal network exposure via SSRF
197
+ - Full server crash through memory exhaustion
198
+ - Execution of malicious payloads
199
+
200
+ **Recommendation**
201
+ - Upgrade to a secure version immediately (`>= 1.13.5`)
202
+ - Avoid compromised versions:
203
+ - `1.14.1`
204
+ - `0.30.4`
205
+ - Lock dependencies using `package-lock.json` or `pnpm-lock.yaml`
206
+ - Perform integrity checks on installed packages
207
+
208
+ ---
209
+
210
+ ### 2. Node.js Runtime (Critical Environment Vulnerability)
211
+
212
+ **Severity**
213
+ - 🔥 CRITICAL
214
+
215
+ **Vulnerability Type**
216
+ - Stack Overflow / Denial of Service
217
+
218
+ **Description**
219
+ A vulnerability in Node.js related to `async_hooks` can be exploited to trigger a **stack overflow**, leading to application crashes.
220
+ Since this affects the runtime itself, all applications using vulnerable versions are at risk.
221
+
222
+ **Impact**
223
+ - Application crash (DoS)
224
+ - Potential service-wide outage
225
+
226
+ **Recommendation**
227
+ - Update Node.js to the latest LTS version
228
+ - Avoid unsafe usage of `async_hooks`
229
+ - Monitor runtime-level advisories regularly
230
+
231
+ ---
232
+
233
+ ### 3. form-data (Transitive Dependency Risk)
234
+
235
+ **Severity**
236
+ - 🟠 HIGH
237
+
238
+ **Vulnerability Type**
239
+ - Predictable multipart boundary
240
+ - Request manipulation
241
+
242
+ **Description**
243
+ The `form-data` package, often used indirectly via axios, contains weaknesses in boundary generation, which may allow attackers to manipulate HTTP requests.
244
+
245
+ **Impact**
246
+ - Request tampering
247
+ - Potential injection vectors
248
+
249
+ **Recommendation**
250
+ - Update dependencies
251
+ - Audit indirect dependencies (`npm ls`)
252
+ - Use secure alternatives where possible
253
+
254
+ ---
255
+
256
+ ## 📊 Risk Prioritization
257
+
258
+ | Priority | Component | Risk Level | Notes |
259
+ |----------|------------|-----------|------------------------------|
260
+ | 1 | axios | CRITICAL | Supply chain + multiple CVEs |
261
+ | 2 | Node.js | CRITICAL | Runtime-level vulnerability |
262
+ | 3 | form-data | HIGH | Transitive dependency risk |
263
+
264
+ ---
265
+
266
+ ## 🛡️ Mitigation Strategy
267
+
268
+ ### Immediate Actions
269
+ ```bash
270
+ npm audit
271
+ npm audit fix