The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
References
Link | Resource |
---|---|
https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444 | Exploit Third Party Advisory |
https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575 | Patch Third Party Advisory |
https://github.com/ai/nanoid/pull/328 | Exploit Issue Tracking Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-NANOID-2332193 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: snyk
Published: 2022-01-14T00:00:00
Updated: 2022-02-02T18:10:58
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23566
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-14T20:15:10.093
Modified: 2022-07-12T17:42:04.277
Link: CVE-2021-23566
JSON object: View
Redhat Information
No data.
CWE