@theia/mini-browser/.../mini-browser@0.10.0-next.d059f9ed vulnerabilities

Theia - Mini-Browser Extension

  • latest version

    1.56.0

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    16 days ago

  • licenses detected

    • >=0.3.12 <0.4.0-next.30302288; >=0.4.0-next.37497648 <0.4.0-next.70567252; >=0.4.0-next.80121840 <0.4.0-next.0452f917; >=0.4.0-next.04887acb <0.4.0-next.05b8a1fe; >=0.4.0-next.07a449af <0.4.0-next.089eacb1; >=0.4.0-next.09095b06 <0.4.0-next.0a3cf52b; >=0.4.0-next.0a6abc41 <0.4.0-next.0af15439; >=0.4.0-next.0c4794d1 <0.4.0-next.0ce7265a; >=0.4.0-next.0cf80336 <0.4.0-next.0e8227b1; >=0.4.0-next.0ea61827 <0.4.0-next.11e5c508; >=0.4.0-next.11f9f570 <0.4.0-next.190734a5; >=0.4.0-next.19a8cfef <0.4.0-next.1a3d9ace; >=0.4.0-next.1c202843 <0.4.0-next.1c6a289d; >=0.4.0-next.1ca7db0a <0.4.0-next.2751e6aa; >=0.4.0-next.28692d8d <0.4.0-next.2bec2948; >=0.4.0-next.2c9cbbe2 <0.4.0-next.317ec35d; >=0.4.0-next.31c19d22 <0.4.0-next.3216adc8; >=0.4.0-next.322e9307 <0.4.0-next.3241dd5f; >=0.4.0-next.3302096b <0.4.0-next.33548c4b; >=0.4.0-next.337c62d5 <0.4.0-next.3ad1b934; >=0.4.0-next.3b4c459b <0.4.0-next.3cc63739; >=0.4.0-next.3ce6b1a0 <0.4.0-next.3fa31f9f; >=0.4.0-next.3fbd5e55 <0.4.0-next.421041cf; >=0.4.0-next.4303a25f <0.4.0-next.448cbac3; >=0.4.0-next.4572886d <0.4.0-next.48a4697f; >=0.4.0-next.48aeff5a <0.4.0-next.4996f9be; >=0.4.0-next.49db4e46 <0.4.0-next.4ce7eca4; >=0.4.0-next.4deb67ed <0.4.0-next.4df0bc53; >=0.4.0-next.4e1bc9eb <0.4.0-next.4e6c39f1; >=0.4.0-next.4eb37604 <0.4.0-next.4f42f169; >=0.4.0-next.4f67b025 <0.4.0-next.50e1faa0; >=0.4.0-next.51010edc <0.4.0-next.51e75fbe; >=0.4.0-next.523426dd <0.4.0-next.531db028; >=0.4.0-next.5336443c <0.4.0-next.5508eba5; >=0.4.0-next.558d4b53 <0.4.0-next.56b94e68; >=0.4.0-next.57b8add5 <0.4.0-next.588f4e0e; >=0.4.0-next.5928c2d4 <0.4.0-next.59a1a3aa; >=0.4.0-next.5a60919f <0.4.0-next.5c83d58f; >=0.4.0-next.5d429ebf <0.4.0-next.6c696aeb; >=0.4.0-next.6cb7b7e5 <0.4.0-next.7039ddf6; >=0.4.0-next.705a376b <0.4.0-next.73aee16d; >=0.4.0-next.73d23a46 <0.4.0-next.750ffc54; >=0.4.0-next.75422c87 <0.4.0-next.77fd859f; >=0.4.0-next.7979da88 <0.4.0-next.7b3e0122; >=0.4.0-next.7bc62190 <0.4.0-next.7caa4c87; >=0.4.0-next.7cf3ca76 <0.4.0-next.7da249dd; >=0.4.0-next.7df95eb5 <0.4.0-next.7e9b2085; >=0.4.0-next.7f0b33d9 <0.4.0-next.8384ef22; >=0.4.0-next.842196b5 <0.4.0-next.8509100c; >=0.4.0-next.85890fd3 <0.4.0-next.86654a02; >=0.4.0-next.86a6c9ee <0.4.0-next.8712381a; >=0.4.0-next.8748b355 <0.4.0-next.8a5132e5; >=0.4.0-next.8a8bf17e <0.4.0-next.8ab83bde; >=0.4.0-next.8adf4a6d <0.4.0-next.8cc44ca2; >=0.4.0-next.8d151a6d <0.4.0-next.8e00cb0d; >=0.4.0-next.8ecf40e1 <0.4.0-next.9694094c; >=0.4.0-next.96ed159b <0.4.0-next.96f90b8c; >=0.4.0-next.971b4219 <0.4.0-next.9b95d4f0; >=0.4.0-next.9c293b46 <0.4.0-next.9fc35c5a; >=0.4.0-next.a09db28d <0.4.0-next.a1b99b91; >=0.4.0-next.a2119bc9 <0.4.0-next.a2df2faf; >=0.4.0-next.a2fa9040 <0.4.0-next.a34acb83; >=0.4.0-next.a37b81d0 <0.4.0-next.a52fab7d; >=0.4.0-next.a5a1683c <0.4.0-next.a7a0c72a; >=0.4.0-next.a821f30a <0.4.0-next.a831a03c; >=0.4.0-next.a83fb710 <0.4.0-next.a84e6fe1; >=0.4.0-next.a88cb19a <0.4.0-next.a9a0fc30; >=0.4.0-next.a9cf7d8d <0.4.0-next.aa7754c9; >=0.4.0-next.aa9a92d2 <0.4.0-next.b3b6681a; >=0.4.0-next.b3b678fb <0.4.0-next.b3f2b347; >=0.4.0-next.b4397500 <0.4.0-next.b531e562; >=0.4.0-next.b56b7acd <0.4.0-next.c1867413; >=0.4.0-next.c1adcdfe <0.4.0-next.c45b1f60; >=0.4.0-next.c5554c8a <0.4.0-next.ca5e7962; >=0.4.0-next.cb9fc532 <0.4.0-next.d4a0b0aa; >=0.4.0-next.d563b31a <0.4.0-next.db9ee3eb; >=0.4.0-next.dc12d6db <0.4.0-next.dc6ac888; >=0.4.0-next.dcc328c2 <0.4.0-next.de618c7d; >=0.4.0-next.ded32dc6 <0.4.0-next.e20742c8; >=0.4.0-next.e25aa8d6 <0.4.0-next.e2e8d9d7; >=0.4.0-next.e2f3ec66 <0.4.0-next.e7eb69fc; >=0.4.0-next.e8646eac <0.4.0-next.ea95903c; >=0.4.0-next.eab60a0e <0.4.0-next.ec5f7b16; >=0.4.0-next.ecd79892 <0.4.0-next.ef000bd1; >=0.4.0-next.f030da0c <0.4.0-next.f6e320d8; >=0.4.0-next.f6ee123d <0.4.0-next.f98eb08f; >=0.4.0-next.f9ae69d1 <1.39.0-next.16
  • Direct Vulnerabilities

    Known vulnerabilities in the @theia/mini-browser package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Execution

    @theia/mini-browser is a Theia - Mini-Browser Extension

    Affected versions of this package are vulnerable to Arbitrary Code Execution. In Eclipse Theia, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.

    How to fix Arbitrary Code Execution?

    Upgrade @theia/mini-browser to version 1.9.0 or higher.

    >=0.3.9 <1.9.0
    • H
    Information Exposure

    @theia/mini-browser is a Theia - Mini-Browser Extension

    Affected versions of this package are vulnerable to Information Exposure. This extension exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without restrictions on the requester's origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.

    How to fix Information Exposure?

    Upgrade @theia/mini-browser to version 0.16.0 or higher.

    >=0.3.9 <0.16.0