auth0-extensions / auth0-authentication-api-debugger-extension

MIT License
5 stars 14 forks source link

Preparations for node8 #9

Closed zxan1285 closed 6 years ago

auth0extensions commented 6 years ago

MD5: 0e6bce6899fae841f79024afbdf7db1d

NSP - Security Report

This is an automated security audit of this project. Please do not modify its contents

Vulnerabilities found: 19 Affected Modules: hoek, hoek, hoek, hoek, superagent, superagent, superagent, superagent, mime, mime, mime, mime, mime, superagent, superagent, uglify-js, uglify-js, debug, fresh Summary:

Detailed report

Prototype pollution attack

Affected Module: hoek Installed version: 2.16.3 Patched versions: > 4.2.0 < 5.0.0 || >= 5.0.3 Advisory: https://nodesecurity.io/advisories/566 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-express-tools@1.1.5 > webtask-tools@3.2.1 > boom@2.10.1 > hoek@2.16.3


Prototype pollution attack

Affected Module: hoek Installed version: 2.16.3 Patched versions: > 4.2.0 < 5.0.0 || >= 5.0.3 Advisory: https://nodesecurity.io/advisories/566 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-tools@1.3.1 > jsonwebtoken@7.4.3 > joi@6.10.1 > hoek@2.16.3


Prototype pollution attack

Affected Module: hoek Installed version: 2.16.3 Patched versions: > 4.2.0 < 5.0.0 || >= 5.0.3 Advisory: https://nodesecurity.io/advisories/566 Path: auth0-authentication-api-debugger-extension@1.1.1 > jsonwebtoken@7.4.3 > joi@6.10.1 > hoek@2.16.3


Prototype pollution attack

Affected Module: hoek Installed version: 2.16.3 Patched versions: > 4.2.0 < 5.0.0 || >= 5.0.3 Advisory: https://nodesecurity.io/advisories/566 Path: auth0-authentication-api-debugger-extension@1.1.1 > webtask-tools@3.2.1 > boom@2.10.1 > hoek@2.16.3


Large gzip Denial of Service

Affected Module: superagent Installed version: 1.8.5 Patched versions: >=3.7.0 Advisory: https://nodesecurity.io/advisories/479 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-express-tools@1.1.5 > webtask-tools@3.2.1 > superagent@1.8.5


Large gzip Denial of Service

Affected Module: superagent Installed version: 1.8.5 Patched versions: >=3.7.0 Advisory: https://nodesecurity.io/advisories/479 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-tools@1.3.1 > webtask-tools@2.2.0 > superagent@1.8.5


Large gzip Denial of Service

Affected Module: superagent Installed version: 1.8.5 Patched versions: >=3.7.0 Advisory: https://nodesecurity.io/advisories/479 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-oauth2-express@1.2.0 > superagent@1.8.5


Large gzip Denial of Service

Affected Module: superagent Installed version: 1.8.5 Patched versions: >=3.7.0 Advisory: https://nodesecurity.io/advisories/479 Path: auth0-authentication-api-debugger-extension@1.1.1 > webtask-tools@3.2.1 > superagent@1.8.5


Regular Expression Denial of Service

Affected Module: mime Installed version: 1.3.4 Patched versions: >= 1.4.1 < 2.0.0 || >= 2.0.3 Advisory: https://nodesecurity.io/advisories/535 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-express-tools@1.1.5 > webtask-tools@3.2.1 > superagent@1.8.5 > mime@1.3.4


Regular Expression Denial of Service

Affected Module: mime Installed version: 1.3.4 Patched versions: >= 1.4.1 < 2.0.0 || >= 2.0.3 Advisory: https://nodesecurity.io/advisories/535 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-tools@1.3.1 > webtask-tools@2.2.0 > superagent@1.8.5 > mime@1.3.4


Regular Expression Denial of Service

Affected Module: mime Installed version: 1.3.4 Patched versions: >= 1.4.1 < 2.0.0 || >= 2.0.3 Advisory: https://nodesecurity.io/advisories/535 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-oauth2-express@1.2.0 > superagent@1.8.5 > mime@1.3.4


Regular Expression Denial of Service

Affected Module: mime Installed version: 1.3.4 Patched versions: >= 1.4.1 < 2.0.0 || >= 2.0.3 Advisory: https://nodesecurity.io/advisories/535 Path: auth0-authentication-api-debugger-extension@1.1.1 > express@4.14.0 > send@0.14.1 > mime@1.3.4


Regular Expression Denial of Service

Affected Module: mime Installed version: 1.3.4 Patched versions: >= 1.4.1 < 2.0.0 || >= 2.0.3 Advisory: https://nodesecurity.io/advisories/535 Path: auth0-authentication-api-debugger-extension@1.1.1 > webtask-tools@3.2.1 > superagent@1.8.5 > mime@1.3.4


Large gzip Denial of Service

Affected Module: superagent Installed version: 2.3.0 Patched versions: >=3.7.0 Advisory: https://nodesecurity.io/advisories/479 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-express-tools@1.1.5 > auth0-extension-tools@1.3.1 > superagent@2.3.0


Large gzip Denial of Service

Affected Module: superagent Installed version: 2.3.0 Patched versions: >=3.7.0 Advisory: https://nodesecurity.io/advisories/479 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-extension-tools@1.3.1 > superagent@2.3.0


Regular Expression Denial of Service

Affected Module: uglify-js Installed version: 2.2.5 Patched versions: >=2.6.0 Advisory: https://nodesecurity.io/advisories/48 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-oauth2-express@1.2.0 > jade@1.11.0 > transformers@2.1.0 > uglify-js@2.2.5


Incorrect Handling of Non-Boolean Comparisons During Minification

Affected Module: uglify-js Installed version: 2.2.5 Patched versions: >= 2.4.24 Advisory: https://nodesecurity.io/advisories/39 Path: auth0-authentication-api-debugger-extension@1.1.1 > auth0-oauth2-express@1.2.0 > jade@1.11.0 > transformers@2.1.0 > uglify-js@2.2.5


Regular Expression Denial of Service

Affected Module: debug Installed version: 2.2.0 Patched versions: >= 2.6.9 < 3.0.0 || >= 3.1.0 Advisory: https://nodesecurity.io/advisories/534 Path: auth0-authentication-api-debugger-extension@1.1.1 > express@4.14.0 > debug@2.2.0


Regular Expression Denial of Service

Affected Module: fresh Installed version: 0.3.0 Patched versions: >= 0.5.2 Advisory: https://nodesecurity.io/advisories/526 Path: auth0-authentication-api-debugger-extension@1.1.1 > express@4.14.0 > fresh@0.3.0


stale[bot] commented 6 years ago

Is this still relevant? If so, what is blocking it? Is there anything you can do to help move it forward?