Skip to content

Commit 14e5f8c

Browse files
1 parent c138e9b commit 14e5f8c

4 files changed

Lines changed: 164 additions & 10 deletions

File tree

advisories/unreviewed/2026/03/GHSA-9pcj-m5rr-p28g/GHSA-9pcj-m5rr-p28g.json renamed to advisories/github-reviewed/2026/03/GHSA-9pcj-m5rr-p28g/GHSA-9pcj-m5rr-p28g.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,47 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9pcj-m5rr-p28g",
4-
"modified": "2026-03-28T03:31:25Z",
4+
"modified": "2026-03-31T23:24:42Z",
55
"published": "2026-03-25T18:31:47Z",
66
"aliases": [
77
"CVE-2026-26831"
88
],
9+
"summary": "textract is vulnerable to OS Command Injection",
910
"details": "textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "textract"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.5.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26831"
2142
},
2243
{
23-
"type": "WEB",
44+
"type": "PACKAGE",
2445
"url": "https://github.com/dbashford/textract"
2546
},
2647
{
@@ -50,8 +71,8 @@
5071
"CWE-94"
5172
],
5273
"severity": "CRITICAL",
53-
"github_reviewed": false,
54-
"github_reviewed_at": null,
74+
"github_reviewed": true,
75+
"github_reviewed_at": "2026-03-31T23:24:42Z",
5576
"nvd_published_at": "2026-03-25T16:16:21Z"
5677
}
5778
}
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-c7xp-q6q8-hg76",
4+
"modified": "2026-03-31T23:25:53Z",
5+
"published": "2026-03-31T23:25:53Z",
6+
"aliases": [
7+
"CVE-2026-34404"
8+
],
9+
"summary": "Nuxt OG Image is vulnerable to Denial of Service via unbounded image dimensions",
10+
"details": "**Product:** Nuxt OG Image \n**Version:** 6.1.2\n**CWE-ID:** [CWE-404](https://cwe.mitre.org/data/definitions/404.html): Improper Resource Shutdown or Release\n**Description:** Failure to limit the length and width of the generated image results in a denial of service.\n**Impact:** Denial of service\n**Exploitation condition:** An external user\n**Mitigation:** Implement a limitation on the width and length of the generated image.\n**Researcher:** Dmitry Prokhorov (Positive Technologies)\n\n## Research \nDuring the analysis of the nuxt-og-image package, which is shipped with the nuxt-seo package, a zero‑day vulnerability was discovered.\nThis research revealed that the image‑generation component by the URI: `/_og/d/` (and, in older versions, `/og-image/`) contains a Denial of Service (DoS) vulnerability. The issue arises because there is no restriction on the width and height parameters of the generated image. The vulnerability was reproduced using the standard configuration and the default templates.\n\n_Listing 1. The content of the configuration file `nuxt.config.ts`_ \n```\nexport default defineNuxtConfig({\n modules: ['nuxt-og-image'],\n devServer: {\n host: 'web-test.local',\n port: 3000\n },\n site: {\n url: 'http://web-test.local:3000',\n },\n ogImage: {\n fonts: [\n 'Inter:400', \n 'Inter:700'\n ],\n }\n})\n```\n\n## Vulnerability reproduction\nTo demonstrate the proof‑of‑concept, a request should be sent with the increased `width` and `height` parameters. This will cause a delay and exhaust the server’s resources during image generation.\n\n_Listing 2. HTTP-request example_\n```\nGET /_og/d/og.png?width=20000&height=20000 HTTP/1.1\nHost: web-test.local:3000\n```\n\n_Figure 1. HTTP-response: denial-of-service error_\n<img width=\"974\" height=\"663\" alt=\"image\" src=\"https://github.com/user-attachments/assets/ff625249-2e0d-4a03-a734-3a77fd0cbb81\" />\n\nAfter sending a HTTP-request, the test server's memory was exhausted.\n\n_Figure 2. Video memory exhausted error_\n<img width=\"863\" height=\"1033\" alt=\"image\" src=\"https://github.com/user-attachments/assets/66b5919a-f039-468e-812e-1f709c468287\" />\n\n\n## Credits\nResearcher: Dmitry Prokhorov (Positive Technologies)",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "nuxt-og-image"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "6.2.5"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/nuxt-modules/og-image/security/advisories/GHSA-c7xp-q6q8-hg76"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/nuxt-modules/og-image"
46+
}
47+
],
48+
"database_specific": {
49+
"cwe_ids": [
50+
"CWE-404"
51+
],
52+
"severity": "MODERATE",
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2026-03-31T23:25:53Z",
55+
"nvd_published_at": null
56+
}
57+
}

advisories/unreviewed/2026/03/GHSA-mvhf-547c-h55r/GHSA-mvhf-547c-h55r.json renamed to advisories/github-reviewed/2026/03/GHSA-mvhf-547c-h55r/GHSA-mvhf-547c-h55r.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,47 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mvhf-547c-h55r",
4-
"modified": "2026-03-28T03:31:25Z",
4+
"modified": "2026-03-31T23:24:12Z",
55
"published": "2026-03-25T18:31:47Z",
66
"aliases": [
77
"CVE-2026-26833"
88
],
9+
"summary": "thumbler allows OS Command Injection",
910
"details": "thumbler through 1.1.2 allows OS command injection via the input, output, time, or size parameter in the thumbnail() function because user input is concatenated into a shell command string passed to child_process.exec() without proper sanitization or escaping.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "thumbler"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "1.1.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26833"
2142
},
2243
{
23-
"type": "WEB",
44+
"type": "PACKAGE",
2445
"url": "https://github.com/mmahrous/thumbler"
2546
},
2647
{
@@ -42,8 +63,8 @@
4263
"CWE-94"
4364
],
4465
"severity": "CRITICAL",
45-
"github_reviewed": false,
46-
"github_reviewed_at": null,
66+
"github_reviewed": true,
67+
"github_reviewed_at": "2026-03-31T23:24:12Z",
4768
"nvd_published_at": "2026-03-25T16:16:21Z"
4869
}
4970
}
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-pqhr-mp3f-hrpp",
4+
"modified": "2026-03-31T23:26:29Z",
5+
"published": "2026-03-31T23:26:29Z",
6+
"aliases": [],
7+
"summary": "Nuxt OG Image vulnerable to Server-Side Request Forgery via user-controlled parameters",
8+
"details": "**Product:** Nuxt OG Image\n**Version:** < 6.2.5\n**CWE-ID:** [CWE-918](https://cwe.mitre.org/data/definitions/918.html): Server-Side Request Forgery\n\n## Description\n\nThe image generation endpoint (`/_og/d/`) accepts user-controlled parameters that are passed to the server-side renderer without proper validation or filtering. An attacker can trigger server-side requests to internal network addresses through multiple vectors.\n\n## Impact\n\n- Scanning internal ports and services inaccessible from the outside\n- Reading sensitive data from cloud infrastructure metadata services (tokens, credentials) when verbose error output is enabled\n\n## Attack Vectors\n\nThree distinct vectors were identified, all exploiting the same underlying lack of URL validation:\n\n### Vector 1: CSS `background-image` injection via `style` parameter\n\n```\nGET /_og/d/og.png?style=background-image:+url('http://127.0.0.1:8888/secret')\n```\n\n### Vector 2: `<img src>` injection via `html` parameter\n\n```\nGET /_og/d/og.png?html=<img src=\"http://127.0.0.1:8888/secret\">\n```\n\nWhen verbose errors are enabled, the response content is leaked in base64-encoded error messages.\n\n### Vector 3: SVG `<image href>` injection via `html` parameter\n\n```\nGET /_og/d/og.png?html=<svg><image href=\"http://127.0.0.1:8888/secret\"></svg>\n```\n\n## Mitigation\n\nFixed in v6.2.5. The image source plugin now blocks requests to private IP ranges (IPv4/IPv6), loopback addresses, link-local addresses, and cloud metadata endpoints. Decimal/hexadecimal IP encoding bypasses are also handled.\n\n## Credits\n\nResearcher: Dmitry Prokhorov (Positive Technologies)",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "npm",
19+
"name": "nuxt-og-image"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "6.2.5"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/nuxt-modules/og-image/security/advisories/GHSA-pqhr-mp3f-hrpp"
40+
},
41+
{
42+
"type": "PACKAGE",
43+
"url": "https://github.com/nuxt-modules/og-image"
44+
}
45+
],
46+
"database_specific": {
47+
"cwe_ids": [
48+
"CWE-918"
49+
],
50+
"severity": "MODERATE",
51+
"github_reviewed": true,
52+
"github_reviewed_at": "2026-03-31T23:26:29Z",
53+
"nvd_published_at": null
54+
}
55+
}

0 commit comments

Comments
 (0)