Open mend-for-github-com[bot] opened 2 years ago
nanoid-3.1.20.tgz
A tiny (108 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.20.tgz
Path to dependency file: /src/node/desktop/package.json
Path to vulnerable library: /src/node/desktop/node_modules/nanoid/package.json
Dependency Hierarchy: - mocha-8.4.0.tgz (Root Library) - :x: **nanoid-3.1.20.tgz** (Vulnerable Library)
A tiny (130 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.30.tgz
Dependency Hierarchy: - css-loader-6.5.1.tgz (Root Library) - postcss-8.3.11.tgz - :x: **nanoid-3.1.30.tgz** (Vulnerable Library)
Found in base branch: main
The package nanoid before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
Publish Date: 2022-01-14
URL: CVE-2021-23566
Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23566
Release Date: 2022-01-14
Fix Resolution: nanoid - 3.1.31
CVE-2021-23566 - Medium Severity Vulnerability
Vulnerable Libraries - nanoid-3.1.20.tgz, nanoid-3.1.30.tgz
nanoid-3.1.20.tgz
A tiny (108 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.20.tgz
Path to dependency file: /src/node/desktop/package.json
Path to vulnerable library: /src/node/desktop/node_modules/nanoid/package.json
Dependency Hierarchy: - mocha-8.4.0.tgz (Root Library) - :x: **nanoid-3.1.20.tgz** (Vulnerable Library)
nanoid-3.1.30.tgz
A tiny (130 bytes), secure URL-friendly unique string ID generator
Library home page: https://registry.npmjs.org/nanoid/-/nanoid-3.1.30.tgz
Path to dependency file: /src/node/desktop/package.json
Path to vulnerable library: /src/node/desktop/node_modules/nanoid/package.json
Dependency Hierarchy: - css-loader-6.5.1.tgz (Root Library) - postcss-8.3.11.tgz - :x: **nanoid-3.1.30.tgz** (Vulnerable Library)
Found in base branch: main
Vulnerability Details
The package nanoid before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
Publish Date: 2022-01-14
URL: CVE-2021-23566
CVSS 3 Score Details (5.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: N/A - Attack Complexity: N/A - Privileges Required: N/A - User Interaction: N/A - Scope: N/A - Impact Metrics: - Confidentiality Impact: N/A - Integrity Impact: N/A - Availability Impact: N/A
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23566
Release Date: 2022-01-14
Fix Resolution: nanoid - 3.1.31