UNPKG

npm-audit-sarif

Version:

A tool for converting npm-audit json output to sarif format

175 lines (174 loc) 4.53 kB
{ "auditReportVersion": 2, "vulnerabilities": { "@nestjs/core": { "name": "@nestjs/core", "severity": "moderate", "isDirect": false, "via": [ "@nestjs/websockets", { "source": 1091325, "name": "@nestjs/core", "dependency": "@nestjs/core", "title": "@nestjs/core vulnerable to Information Exposure via StreamableFile pipe", "url": "https://github.com/advisories/GHSA-4jpv-8r57-pv7j", "severity": "moderate", "cwe": [ "CWE-200" ], "cvss": { "score": 5.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, "range": "<9.0.5" } ], "effects": [ "@nestjs/websockets" ], "range": "<=9.0.4", "nodes": [ "node_modules/@nestjs/core" ], "fixAvailable": { "name": "@nestjs/websockets", "version": "9.4.2", "isSemVerMajor": true } }, "@nestjs/websockets": { "name": "@nestjs/websockets", "severity": "moderate", "isDirect": true, "via": [ "@nestjs/core" ], "effects": [ "@nestjs/core" ], "range": "<=9.0.0-next.2", "nodes": [ "node_modules/@nestjs/websockets" ], "fixAvailable": { "name": "@nestjs/websockets", "version": "9.4.2", "isSemVerMajor": true } }, "jsonwebtoken": { "name": "jsonwebtoken", "severity": "moderate", "isDirect": true, "via": [ { "source": 1089434, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken unrestricted key type could lead to legacy keys usage ", "url": "https://github.com/advisories/GHSA-8cf7-32gw-wr33", "severity": "moderate", "cwe": [ "CWE-327" ], "cvss": { "score": 0, "vectorString": null }, "range": "<=8.5.1" }, { "source": 1091087, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC", "url": "https://github.com/advisories/GHSA-hjrf-2m68-5959", "severity": "moderate", "cwe": [ "CWE-287" ], "cvss": { "score": 5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" }, "range": "<=8.5.1" }, { "source": 1091170, "name": "jsonwebtoken", "dependency": "jsonwebtoken", "title": "jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()", "url": "https://github.com/advisories/GHSA-qwph-4952-7xr6", "severity": "moderate", "cwe": [ "CWE-287", "CWE-327" ], "cvss": { "score": 6.4, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" }, "range": "<9.0.0" } ], "effects": [], "range": "<=8.5.1", "nodes": [ "node_modules/jsonwebtoken" ], "fixAvailable": { "name": "jsonwebtoken", "version": "9.0.0", "isSemVerMajor": true } }, "morgan": { "name": "morgan", "severity": "moderate", "isDirect": true, "via": [ { "source": 1087563, "name": "morgan", "dependency": "morgan", "title": "Code Injection in morgan", "url": "https://github.com/advisories/GHSA-gwg9-rgvj-4h5j", "severity": "moderate", "cwe": [ "CWE-94" ], "cvss": { "score": 0, "vectorString": null }, "range": "<1.9.1" } ], "effects": [], "range": "<1.9.1", "nodes": [ "node_modules/morgan" ], "fixAvailable": true } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 4, "high": 0, "critical": 0, "total": 4 }, "dependencies": { "prod": 22, "dev": 0, "optional": 0, "peer": 29, "peerOptional": 0, "total": 50 } } }