10.9.0
12 years ago
3 days ago
Known vulnerabilities in the pnpm package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
pnpm is a Fast, disk space efficient package manager Affected versions of this package are vulnerable to Use of Weak Hash for path shortening. An attacker can cause collisions in file paths, leading to the overwriting of indirect package dependencies by manipulating package names and versions to generate the same hash value. Note: This is only exploitable if the package names and versions are specifically crafted to exceed 120 characters and share the same hash output. How to fix Use of Weak Hash? Upgrade | <10.0.0-alpha.0 |
pnpm is a Fast, disk space efficient package manager Affected versions of this package are vulnerable to Untrusted Search Path due to mishandling of overrides and global cache settings even when How to fix Untrusted Search Path? Upgrade | <9.14.4 |
pnpm is a Fast, disk space efficient package manager Affected versions of this package are vulnerable to Access Control Bypass. It is possible to construct a tarball that, when installed via npm or parsed by the registry is safe, but when installed via pnpm is malicious, due to how pnpm parses tar archives. This can result in a package that appears safe on the npm registry or when installed via npm being replaced with a compromised or malicious version when installed via pnpm. How to fix Access Control Bypass? Upgrade | <7.33.4>=8.0.0 <8.6.8 |
pnpm is a Fast, disk space efficient package manager Affected versions of this package are vulnerable to Improper Input Validation via an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. How to fix Improper Input Validation? Upgrade | <6.15.1 |