yapi-vendor@1.6.3 vulnerabilities

YAPI

Direct Vulnerabilities

Known vulnerabilities in the yapi-vendor package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Cross-site Scripting

yapi-vendor is a YAPI

Affected versions of this package are vulnerable to Cross-site Scripting due to the Advanced Expectation - Response module. An attacker can execute arbitrary web scripts or HTML by injecting a crafted payload into the body field.

How to fix Cross-site Scripting?

There is no fixed version for yapi-vendor.

*
  • M
Cross-site Scripting (XSS)

yapi-vendor is a YAPI

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the remark module on the /interface/api edit page.

Note: CVE-2021-33237 is a duplicate of CVE-2021-36686.

How to fix Cross-site Scripting (XSS)?

There is no fixed version for yapi-vendor.

>=0.0.0
  • M
Insecure Randomness

yapi-vendor is a YAPI

Affected versions of this package are vulnerable to Insecure Randomness. Weak JSON Web Token (JWT) signing secret generation in YMFE YApi allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used.

How to fix Insecure Randomness?

Upgrade yapi-vendor to version 1.10.1 or higher.

<1.10.1