valine@1.3.0 vulnerabilities

A simple comment system based on Leancloud.

  • latest version

    1.5.2

  • first published

    7 years ago

  • latest version published

    4 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the valine package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via a crafted POST request.

    How to fix Cross-site Scripting (XSS)?

    Upgrade valine to version 1.5.0 or higher.

    <1.5.0
    • M
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the nick parameter, which makes it possible for an attacker to embed an arbitrary HTML/JavaScript in the comment.

    How to fix Cross-site Scripting (XSS)?

    Upgrade valine to version 1.4.15 or higher.

    <1.4.15
    • H
    Denial of Service (DoS)

    Affected versions of this package are vulnerable to Denial of Service (DoS). It allows remote attackers to supply a User-Agent value that only specifies the product and version.

    How to fix Denial of Service (DoS)?

    There is no fixed version for valine.

    *
    • M
    HTML Injection

    valine is a fast, simple & powerful comment system.

    Affected versions of this package are vulnerable to HTML Injection. While uploading a PDF file, An attacker could inject a java script code.

    How to fix HTML Injection?

    Upgrade to version 1.3.4 or higher.

    <1.3.4