Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/33366?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33366?format=api",
    "vulnerability_id": "VCID-x5j5-g553-hudp",
    "summary": "CSRF Vulnerability in jquery-ujs\nVersions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains.\n\nWhen an attacker controls the href attribute of an anchor tag, or\nthe action attribute of a form tag triggering a POST action, the attacker can set the\nhref or action to \" https://attacker.com\". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain.\n\n\n## Recommendation\n\nUpgrade jquery-ujs to version 1.0.4 or later.",
    "aliases": [
        {
            "alias": "GHSA-6qqj-rx4w-r3cj"
        },
        {
            "alias": "GMS-2020-740"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/21144?format=api",
            "purl": "pkg:npm/jquery-ujs@1.0.4",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jquery-ujs@1.0.4"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/152483?format=api",
            "purl": "pkg:npm/jquery-ujs@1.0.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k1jn-jwbx-qya1"
                },
                {
                    "vulnerability": "VCID-x5j5-g553-hudp"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jquery-ujs@1.0.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/152484?format=api",
            "purl": "pkg:npm/jquery-ujs@1.0.2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-k1jn-jwbx-qya1"
                },
                {
                    "vulnerability": "VCID-x5j5-g553-hudp"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jquery-ujs@1.0.2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/142448?format=api",
            "purl": "pkg:npm/jquery-ujs@1.0.3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-356q-csk2-8ug5"
                },
                {
                    "vulnerability": "VCID-x5j5-g553-hudp"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jquery-ujs@1.0.3"
        }
    ],
    "references": [
        {
            "reference_url": "https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J"
        },
        {
            "reference_url": "https://hackerone.com/reports/49935",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://hackerone.com/reports/49935"
        },
        {
            "reference_url": "https://snyk.io/vuln/npm:jquery-ujs:20150624",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://snyk.io/vuln/npm:jquery-ujs:20150624"
        },
        {
            "reference_url": "https://www.npmjs.com/advisories/15",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://www.npmjs.com/advisories/15"
        },
        {
            "reference_url": "https://github.com/advisories/GHSA-6qqj-rx4w-r3cj",
            "reference_id": "GHSA-6qqj-rx4w-r3cj",
            "reference_type": "",
            "scores": [
                {
                    "value": "MODERATE",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-6qqj-rx4w-r3cj"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 352,
            "name": "Cross-Site Request Forgery (CSRF)",
            "description": "The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request."
        },
        {
            "cwe_id": 1035,
            "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."
        },
        {
            "cwe_id": 937,
            "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 6.9",
    "exploitability": "0.5",
    "weighted_severity": "6.2",
    "risk_score": 3.1,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5j5-g553-hudp"
}