Open mend-bolt-for-github[bot] opened 2 years ago
nanoid-3.1.20.tgz
A tiny (108 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.20.tgz
Path to dependency file: /APM-Final/package.json
Path to vulnerable library: /APM-Final/node_modules/nanoid/package.json
Dependency Hierarchy: - build-angular-0.1102.3.tgz (Root Library) - postcss-8.2.4.tgz - :x: **nanoid-3.1.20.tgz** (Vulnerable Library)
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.22.tgz
Path to dependency file: /APM-Start/package.json
Path to vulnerable library: /APM-Start/node_modules/nanoid/package.json
Dependency Hierarchy: - build-angular-0.1102.12.tgz (Root Library) - postcss-8.2.13.tgz - :x: **nanoid-3.1.22.tgz** (Vulnerable Library)
Found in base branch: main
The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
Publish Date: 2022-01-14
URL: CVE-2021-23566
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
Type: Upgrade version
Release Date: 2022-01-14
Fix Resolution (nanoid): 3.1.31
Direct dependency fix Resolution (@angular-devkit/build-angular): 0.1102.4
Direct dependency fix Resolution (@angular-devkit/build-angular): 0.1102.13
Step up your Open Source Security Game with Mend here
CVE-2021-23566 - Medium Severity Vulnerability
Vulnerable Libraries - nanoid-3.1.20.tgz, nanoid-3.1.22.tgz
nanoid-3.1.20.tgz
A tiny (108 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.20.tgz
Path to dependency file: /APM-Final/package.json
Path to vulnerable library: /APM-Final/node_modules/nanoid/package.json
Dependency Hierarchy: - build-angular-0.1102.3.tgz (Root Library) - postcss-8.2.4.tgz - :x: **nanoid-3.1.20.tgz** (Vulnerable Library)
nanoid-3.1.22.tgz
A tiny (108 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.22.tgz
Path to dependency file: /APM-Start/package.json
Path to vulnerable library: /APM-Start/node_modules/nanoid/package.json
Dependency Hierarchy: - build-angular-0.1102.12.tgz (Root Library) - postcss-8.2.13.tgz - :x: **nanoid-3.1.22.tgz** (Vulnerable Library)
Found in base branch: main
Vulnerability Details
The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
Publish Date: 2022-01-14
URL: CVE-2021-23566
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2022-01-14
Fix Resolution (nanoid): 3.1.31
Direct dependency fix Resolution (@angular-devkit/build-angular): 0.1102.4
Fix Resolution (nanoid): 3.1.31
Direct dependency fix Resolution (@angular-devkit/build-angular): 0.1102.13
Step up your Open Source Security Game with Mend here