org.webjars.npm:axios@0.18.1 vulnerabilities

  • latest version

    1.7.7

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    2 months ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:axios package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Server-side Request Forgery (SSRF)

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through unexpected behavior where requests for path-relative URLs get processed as protocol-relative URLs. An attacker can manipulate the server to make unauthorized requests by exploiting this behavior.

How to fix Server-side Request Forgery (SSRF)?

Upgrade org.webjars.npm:axios to version 1.7.4 or higher.

[,1.7.4)
  • H
Prototype Pollution

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Prototype Pollution via the formDataToJSON function.

How to fix Prototype Pollution?

Upgrade org.webjars.npm:axios to version 1.6.5 or higher.

[,1.6.5)
  • M
Regular Expression Denial of Service (ReDoS)

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can deplete system resources by providing a manipulated string as input to the format method, causing the regular expression to exhibit a time complexity of O(n^2). This makes the server to become unable to provide normal service due to the excessive cost and time wasted in processing vulnerable regular expressions.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.webjars.npm:axios to version 1.6.5 or higher.

[,1.6.5)
  • H
Cross-site Request Forgery (CSRF)

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to inserting the X-XSRF-TOKEN header using the secret XSRF-TOKEN cookie value in all requests to any server when the XSRF-TOKEN0 cookie is available, and the withCredentials setting is turned on. If a malicious user manages to obtain this value, it can potentially lead to the XSRF defence mechanism bypass.

How to fix Cross-site Request Forgery (CSRF)?

Upgrade org.webjars.npm:axios to version 1.6.0, 0.28.0 or higher.

[1.0.0,1.6.0) [0.8.1,0.28.0)
  • H
Regular Expression Denial of Service (ReDoS)

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the trim function.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade org.webjars.npm:axios to version 0.21.4 or higher.

[,0.21.4)
  • M
Server-Side Request Forgery (SSRF)

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). An attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.

How to fix Server-Side Request Forgery (SSRF)?

Upgrade org.webjars.npm:axios to version 0.21.1 or higher.

[0,0.21.1)
  • M
Denial of Service (DoS)

org.webjars.npm:axios is a promise-based HTTP client for the browser and Node.js.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to content continuing to be accepted from requests after maxContentLength is exceeded.

How to fix Denial of Service (DoS)?

Upgrade org.webjars.npm:axios to version 0.19.0 or higher.

[,0.19.0)