hellojs@1.3.2 vulnerabilities

A clientside Javascript library for standardizing requests to OAuth2 web services (and OAuth1 - with a shim)

  • latest version

    1.20.0

  • latest non vulnerable version

  • first published

    10 years ago

  • latest version published

    1 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the hellojs package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Prototype Pollution

    hellojs is a Javascript RESTFUL API library for connecting with OAuth2 services.

    Affected versions of this package are vulnerable to Prototype Pollution via the hello.utils.extend function due to improper input sanitization.

    How to fix Prototype Pollution?

    Upgrade hellojs to version 1.18.8 or higher.

    <1.18.8
    • C
    Cross-site Scripting (XSS)

    hellojs is a Javascript RESTFUL API library for connecting with OAuth2 services.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The code gets the param oauth_redirect from url and passes it to location.assign without any sanitisation. So an attack can pass js payloads into the url param oauth_redirect, such as javascript:alert(1).

    How to fix Cross-site Scripting (XSS)?

    Upgrade hellojs to version 1.18.6 or higher.

    <1.18.6
    • M
    Cross-site Scripting (XSS)

    hellojs is a Javascript RESTFUL API library for connecting with OAuth2 services.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the state.page_uri query parameter.

    How to fix Cross-site Scripting (XSS)?

    Upgrade hellojs to version 1.18.2 or higher.

    <1.18.2