1.3.1
5 years ago
13 days ago
Known vulnerabilities in the @frangoteam/fuxa package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Use of Hard-coded Cryptographic Key in the authentication process when a static fallback JWT signing secret is used if no custom secret is configured. An attacker can gain unauthorized access by forging valid JWT tokens using the known default secret. How to fix Use of Hard-coded Cryptographic Key? Upgrade | <1.3.0 |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the How to fix Missing Authentication for Critical Function? Upgrade | <1.2.10 |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Directory Traversal due to the improper sanitization of nested traversal sequences (e.g., How to fix Directory Traversal? A fix was pushed into the | * |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Insecure Default Initialization of Resource due to the use of a hardcoded JWT secret in the default configuration. An attacker can gain administrative access and execute arbitrary code by forging authentication tokens and interacting with administrative APIs. How to fix Insecure Default Initialization of Resource? Upgrade | <1.2.10 |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Improper Authentication via the authentication process. An attacker can gain administrative access and execute arbitrary code by bypassing authentication mechanisms and interacting with administrative APIs. Note: This is only exploitable if How to fix Improper Authentication? Upgrade | <1.2.10 |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to SQL Injection via the How to fix SQL Injection? There is no fixed version for | * |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? There is no fixed version for | * |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to SQL Injection via the How to fix SQL Injection? There is no fixed version for | * |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Remote Code Execution (RCE) via the How to fix Remote Code Execution (RCE)? There is no fixed version for | >=0.0.0 |
@frangoteam/fuxa is a Web-based Process Visualization (SCADA/HMI/Dashboard) software Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) which allows attackers to obtain sensitive information from the server's internal environment and services. How to fix Server-side Request Forgery (SSRF)? There is no fixed version for | * |