Skip to content

Commit 11155e0

Browse files
Auto-update jsrepository (#562)
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
1 parent 3abb67c commit 11155e0

7 files changed

Lines changed: 961 additions & 24 deletions

repository/jsrepository-master.json

Lines changed: 163 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11160,7 +11160,36 @@
1116011160
]
1116111161
},
1116211162
"video.js": {
11163-
"vulnerabilities": [],
11163+
"vulnerabilities": [
11164+
{
11165+
"ranges": [
11166+
{
11167+
"atOrAbove": "0",
11168+
"below": "7.14.3"
11169+
}
11170+
],
11171+
"summary": "This affects the package video.js before 7.14.3.\n The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.\n\n",
11172+
"identifiers": {
11173+
"githubID": "GHSA-pp7m-6j83-m7r6",
11174+
"CVE": [
11175+
"CVE-2021-23414"
11176+
]
11177+
},
11178+
"severity": "medium",
11179+
"cwe": [
11180+
"CWE-79"
11181+
],
11182+
"info": [
11183+
"https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2",
11184+
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2",
11185+
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV",
11186+
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB",
11187+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588",
11188+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587",
11189+
"https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429"
11190+
]
11191+
}
11192+
],
1116411193
"extractors": {
1116511194
"uri": [
1116611195
"/video\\.js[@/](§§version§§)/"
@@ -11180,21 +11209,150 @@
1118011209
},
1118111210
"quill": {
1118211211
"npmname": "quill",
11183-
"vulnerabilities": [],
11212+
"vulnerabilities": [
11213+
{
11214+
"ranges": [
11215+
{
11216+
"atOrAbove": "0",
11217+
"below": "1.3.8"
11218+
}
11219+
],
11220+
"summary": "A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned.\n\nThis CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364).",
11221+
"identifiers": {
11222+
"githubID": "GHSA-4943-9vgg-gr5r",
11223+
"CVE": [
11224+
"CVE-2021-3163"
11225+
]
11226+
},
11227+
"severity": "medium",
11228+
"cwe": [
11229+
"CWE-79"
11230+
],
11231+
"info": [
11232+
"https://github.com/quilljs/quill/issues/3273",
11233+
"https://github.com/quilljs/quill/issues/3359",
11234+
"https://github.com/quilljs/quill/issues/3364",
11235+
"https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html",
11236+
"https://quilljs.com"
11237+
]
11238+
},
11239+
{
11240+
"ranges": [
11241+
{
11242+
"atOrAbove": "0",
11243+
"below": "1.3.7"
11244+
}
11245+
],
11246+
"summary": "Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.\n\n\n## Recommendation\n\nNo fix is currently available. Consider using an alternative package until a fix is made available.",
11247+
"identifiers": {
11248+
"githubID": "GHSA-588m-9qg5-35pq"
11249+
},
11250+
"severity": "medium",
11251+
"cwe": [
11252+
"CWE-1022"
11253+
],
11254+
"info": [
11255+
"https://github.com/quilljs/quill/issues/2438",
11256+
"https://github.com/quilljs/quill/pull/2674",
11257+
"https://www.npmjs.com/advisories/1039"
11258+
]
11259+
},
11260+
{
11261+
"ranges": [
11262+
{
11263+
"atOrAbove": "2.0.3",
11264+
"below": "2.0.4"
11265+
}
11266+
],
11267+
"summary": "A lack of data validation vulnerability in the HTML export feature in Quill in allows Cross-Site Scripting (XSS).\n\nThis issue affects Quill: 2.0.3.",
11268+
"identifiers": {
11269+
"githubID": "GHSA-v3m3-f69x-jf25",
11270+
"CVE": [
11271+
"CVE-2025-15056"
11272+
]
11273+
},
11274+
"severity": "low",
11275+
"cwe": [
11276+
"CWE-74",
11277+
"CWE-79"
11278+
],
11279+
"info": [
11280+
"https://fluidattacks.com/advisories/diomedes"
11281+
]
11282+
}
11283+
],
1118411284
"extractors": {
11185-
"filename": ["quill-(§§version§§)(?:\\.min)?\\.js"],
11285+
"filename": [
11286+
"quill-(§§version§§)(?:\\.min)?\\.js"
11287+
],
1118611288
"filecontent": [
1118711289
"Quill Editor v(§§version§§)",
1118811290
"static version=\"(§§version§§)\";static imports=\\{delta:[^,]{1,20},parchment:"
1118911291
],
11190-
"uri": ["/(§§version§§)/quill(?:\\.min)?\\.js"]
11292+
"uri": [
11293+
"/(§§version§§)/quill(?:\\.min)?\\.js"
11294+
]
1119111295
},
1119211296
"licenses": [
1119311297
"BSD-3-Clause >=0"
1119411298
]
1119511299
},
1119611300
"swiper": {
11197-
"vulnerabilities": [],
11301+
"vulnerabilities": [
11302+
{
11303+
"ranges": [
11304+
{
11305+
"atOrAbove": "6.5.1",
11306+
"below": "12.1.2"
11307+
}
11308+
],
11309+
"summary": "### Summary\nA prototype pollution vulnerability exists in the the npm package swiper (>=6.5.1, < 12.1.2). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute `Object.prototype` via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. This issue is fixed in version 12.1.2\n\n### Details\nThe vulnerability resides in line 94 of shared/utils.mjs where indexOf() function is used to check whether user provided input contain forbidden strings.\n\n### PoC\n#### Steps to reproduce\n1. Install latest version of swiper using npm install \n2. Run the following code snippet:\n```javascript\nvar swiper = require('swiper');\nArray.prototype.indexOf = () => -1; \nlet obj = {};\nvar malicious_payload = '{\"__proto__\":{\"polluted\":\"yes\"}}';\nconsole.log({}.polluted);\nswiper.default.extendDefaults(JSON.parse(malicious_payload));\nconsole.log({}.polluted); // prints yes -> indicating that the patch was bypassed and prototype pollution occurred\n```\n\n#### Expected behavior\nPrototype pollution should be prevented and {} should not gain new properties.\nThis should be printed on the console:\n```\nundefined\nundefined OR throw an Error\n```\n\n#### Actual behavior\nObject.prototype is polluted\nThis is printed on the console:\n```\nundefined \nyes\n```\n\n### Impact\nThis is a prototype pollution vulnerability, which can have severe security implications depending on how swiper is used by downstream applications. Any application that processes attacker-controlled input using this package may be affected.\nIt could potentially lead to the following problems:\n1. Authentication bypass\n2. Denial of service - Even if an attacker is not able to exploit prototype pollution in swiper, if there is a prototype pollution within the project from other dependencies, modifying global `Array.prototype.indexOf` property can result in crash when swiper.default.extendDefaults is called because swiper makes use of this global property. This can lead to Denial of Service. \n3. Remote code execution (if polluted property is passed to sinks like eval or child_process)\n\n### Related CVEs\n[CVE-2026-25521](https://github.com/advisories/GHSA-rxrv-835q-v5mh)\n[CVE-2026-25047](https://github.com/advisories/GHSA-2733-6c58-pf27)\n[CVE-2026-26021](https://github.com/advisories/GHSA-2c4m-g7rx-63q7)",
11310+
"identifiers": {
11311+
"githubID": "GHSA-hmx5-qpq5-p643",
11312+
"CVE": [
11313+
"CVE-2026-27212"
11314+
]
11315+
},
11316+
"severity": "critical",
11317+
"cwe": [
11318+
"CWE-1321"
11319+
],
11320+
"info": [
11321+
"https://github.com/nolimits4web/swiper/security/advisories/GHSA-hmx5-qpq5-p643",
11322+
"https://github.com/nolimits4web/swiper/commit/d3e663322a13043ca63aaba235d8cf3900e0c8cf",
11323+
"https://github.com/nolimits4web/swiper/releases/tag/v12.1.2"
11324+
]
11325+
},
11326+
{
11327+
"ranges": [
11328+
{
11329+
"atOrAbove": "0",
11330+
"below": "6.5.1"
11331+
}
11332+
],
11333+
"summary": "Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.",
11334+
"identifiers": {
11335+
"githubID": "GHSA-p3hc-fv2j-rp68",
11336+
"CVE": [
11337+
"CVE-2021-23370"
11338+
]
11339+
},
11340+
"severity": "critical",
11341+
"cwe": [
11342+
"CWE-1321"
11343+
],
11344+
"info": [
11345+
"https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad",
11346+
"https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178",
11347+
"https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29",
11348+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698",
11349+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699",
11350+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697",
11351+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696",
11352+
"https://snyk.io/vuln/SNYK-JS-SWIPER-1088062"
11353+
]
11354+
}
11355+
],
1119811356
"extractors": {
1119911357
"uri": [
1120011358
"/[Ss]wiper[@/](§§version§§)/swiper"
@@ -11210,7 +11368,6 @@
1121011368
"MIT >=0"
1121111369
]
1121211370
},
11213-
1121411371
"dont check": {
1121511372
"vulnerabilities": [],
1121611373
"extractors": {

repository/jsrepository-v2.json

Lines changed: 133 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12927,7 +12927,32 @@
1292712927
}
1292812928
},
1292912929
"video.js": {
12930-
"vulnerabilities": [],
12930+
"vulnerabilities": [
12931+
{
12932+
"atOrAbove": "0",
12933+
"below": "7.14.3",
12934+
"severity": "medium",
12935+
"cwe": [
12936+
"CWE-79"
12937+
],
12938+
"identifiers": {
12939+
"summary": "This affects the package video.js before 7.14.3.\n The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.\n\n",
12940+
"githubID": "GHSA-pp7m-6j83-m7r6",
12941+
"CVE": [
12942+
"CVE-2021-23414"
12943+
]
12944+
},
12945+
"info": [
12946+
"https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2",
12947+
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2",
12948+
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV",
12949+
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB",
12950+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588",
12951+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587",
12952+
"https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429"
12953+
]
12954+
}
12955+
],
1293112956
"extractors": {
1293212957
"uri": [
1293312958
"/video\\.js[@/](§§version§§)/"
@@ -12944,7 +12969,66 @@
1294412969
},
1294512970
"quill": {
1294612971
"npmname": "quill",
12947-
"vulnerabilities": [],
12972+
"vulnerabilities": [
12973+
{
12974+
"atOrAbove": "0",
12975+
"below": "1.3.7",
12976+
"severity": "medium",
12977+
"cwe": [
12978+
"CWE-1022"
12979+
],
12980+
"identifiers": {
12981+
"summary": "Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.\n\n\n## Recommendation\n\nNo fix is currently available. Consider using an alternative package until a fix is made available.",
12982+
"githubID": "GHSA-588m-9qg5-35pq"
12983+
},
12984+
"info": [
12985+
"https://github.com/quilljs/quill/issues/2438",
12986+
"https://github.com/quilljs/quill/pull/2674",
12987+
"https://www.npmjs.com/advisories/1039"
12988+
]
12989+
},
12990+
{
12991+
"atOrAbove": "0",
12992+
"below": "1.3.8",
12993+
"severity": "medium",
12994+
"cwe": [
12995+
"CWE-79"
12996+
],
12997+
"identifiers": {
12998+
"summary": "A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned.\n\nThis CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364).",
12999+
"githubID": "GHSA-4943-9vgg-gr5r",
13000+
"CVE": [
13001+
"CVE-2021-3163"
13002+
]
13003+
},
13004+
"info": [
13005+
"https://github.com/quilljs/quill/issues/3273",
13006+
"https://github.com/quilljs/quill/issues/3359",
13007+
"https://github.com/quilljs/quill/issues/3364",
13008+
"https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html",
13009+
"https://quilljs.com"
13010+
]
13011+
},
13012+
{
13013+
"atOrAbove": "2.0.3",
13014+
"below": "2.0.4",
13015+
"severity": "low",
13016+
"cwe": [
13017+
"CWE-74",
13018+
"CWE-79"
13019+
],
13020+
"identifiers": {
13021+
"summary": "A lack of data validation vulnerability in the HTML export feature in Quill in allows Cross-Site Scripting (XSS).\n\nThis issue affects Quill: 2.0.3.",
13022+
"githubID": "GHSA-v3m3-f69x-jf25",
13023+
"CVE": [
13024+
"CVE-2025-15056"
13025+
]
13026+
},
13027+
"info": [
13028+
"https://fluidattacks.com/advisories/diomedes"
13029+
]
13030+
}
13031+
],
1294813032
"extractors": {
1294913033
"filename": [
1295013034
"quill-(§§version§§)(?:\\.min)?\\.js"
@@ -12959,7 +13043,53 @@
1295913043
}
1296013044
},
1296113045
"swiper": {
12962-
"vulnerabilities": [],
13046+
"vulnerabilities": [
13047+
{
13048+
"atOrAbove": "0",
13049+
"below": "6.5.1",
13050+
"severity": "critical",
13051+
"cwe": [
13052+
"CWE-1321"
13053+
],
13054+
"identifiers": {
13055+
"summary": "Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.",
13056+
"githubID": "GHSA-p3hc-fv2j-rp68",
13057+
"CVE": [
13058+
"CVE-2021-23370"
13059+
]
13060+
},
13061+
"info": [
13062+
"https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad",
13063+
"https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178",
13064+
"https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29",
13065+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698",
13066+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699",
13067+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697",
13068+
"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696",
13069+
"https://snyk.io/vuln/SNYK-JS-SWIPER-1088062"
13070+
]
13071+
},
13072+
{
13073+
"atOrAbove": "6.5.1",
13074+
"below": "12.1.2",
13075+
"severity": "critical",
13076+
"cwe": [
13077+
"CWE-1321"
13078+
],
13079+
"identifiers": {
13080+
"summary": "### Summary\nA prototype pollution vulnerability exists in the the npm package swiper (>=6.5.1, < 12.1.2). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute `Object.prototype` via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. This issue is fixed in version 12.1.2\n\n### Details\nThe vulnerability resides in line 94 of shared/utils.mjs where indexOf() function is used to check whether user provided input contain forbidden strings.\n\n### PoC\n#### Steps to reproduce\n1. Install latest version of swiper using npm install \n2. Run the following code snippet:\n```javascript\nvar swiper = require('swiper');\nArray.prototype.indexOf = () => -1; \nlet obj = {};\nvar malicious_payload = '{\"__proto__\":{\"polluted\":\"yes\"}}';\nconsole.log({}.polluted);\nswiper.default.extendDefaults(JSON.parse(malicious_payload));\nconsole.log({}.polluted); // prints yes -> indicating that the patch was bypassed and prototype pollution occurred\n```\n\n#### Expected behavior\nPrototype pollution should be prevented and {} should not gain new properties.\nThis should be printed on the console:\n```\nundefined\nundefined OR throw an Error\n```\n\n#### Actual behavior\nObject.prototype is polluted\nThis is printed on the console:\n```\nundefined \nyes\n```\n\n### Impact\nThis is a prototype pollution vulnerability, which can have severe security implications depending on how swiper is used by downstream applications. Any application that processes attacker-controlled input using this package may be affected.\nIt could potentially lead to the following problems:\n1. Authentication bypass\n2. Denial of service - Even if an attacker is not able to exploit prototype pollution in swiper, if there is a prototype pollution within the project from other dependencies, modifying global `Array.prototype.indexOf` property can result in crash when swiper.default.extendDefaults is called because swiper makes use of this global property. This can lead to Denial of Service. \n3. Remote code execution (if polluted property is passed to sinks like eval or child_process)\n\n### Related CVEs\n[CVE-2026-25521](https://github.com/advisories/GHSA-rxrv-835q-v5mh)\n[CVE-2026-25047](https://github.com/advisories/GHSA-2733-6c58-pf27)\n[CVE-2026-26021](https://github.com/advisories/GHSA-2c4m-g7rx-63q7)",
13081+
"githubID": "GHSA-hmx5-qpq5-p643",
13082+
"CVE": [
13083+
"CVE-2026-27212"
13084+
]
13085+
},
13086+
"info": [
13087+
"https://github.com/nolimits4web/swiper/security/advisories/GHSA-hmx5-qpq5-p643",
13088+
"https://github.com/nolimits4web/swiper/commit/d3e663322a13043ca63aaba235d8cf3900e0c8cf",
13089+
"https://github.com/nolimits4web/swiper/releases/tag/v12.1.2"
13090+
]
13091+
}
13092+
],
1296313093
"extractors": {
1296413094
"uri": [
1296513095
"/[Ss]wiper[@/](§§version§§)/swiper"

0 commit comments

Comments
 (0)