All the vulnerabilities related to the version 5.0.0 of the package
Sensitive information exposure through logs in npm-registry-fetch
Affected versions of npm-registry-fetch
are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like <protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>
. The password value is not redacted and is printed to stdout and also to any generated log files.
NPM IP package incorrectly identifies some private IP addresses as public
The isPublic()
function in the NPM package ip
doesn't correctly identify certain private IP addresses in uncommon formats such as 0x7F.1
as private. Instead, it reports them as public by returning true
. This can lead to security issues such as Server-Side Request Forgery (SSRF) if isPublic()
is used to protect sensitive code paths when passed user input. Versions 1.1.9 and 2.0.1 fix the issue.
ip SSRF improper categorization in isPublic
The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
http-cache-semantics vulnerable to Regular Expression Denial of Service
http-cache semantics contains an Inefficient Regular Expression Complexity , leading to Denial of Service. This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.