Severity
5.5MEDIUMNVD
EPSS
0.0%
top 92.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14
Latest updateJan 21

Description

The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages5 packages

CVEListV5nanoid_project/nanoidunspecified3.1.31
NVDnanoid_project/nanoid3.0.03.1.31
npmnanoid_project/nanoid3.0.03.1.31
debiandebian/node-mocha< node-mocha 9.1.4+ds1+~cs28.2.8-1 (bookworm)
debiandebian/node-postcss< node-mocha 9.1.4+ds1+~cs28.2.8-1 (bookworm)

Patches

🔴Vulnerability Details

3
OSV
Exposure of Sensitive Information to an Unauthorized Actor in nanoid2022-01-21
GHSA
Exposure of Sensitive Information to an Unauthorized Actor in nanoid2022-01-21
OSV
CVE-2021-23566: The package nanoid from 32022-01-14

📋Vendor Advisories

2
Red Hat
nanoid: Information disclosure via valueOf() function2022-01-21
Debian
CVE-2021-23566: node-mocha - The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Ex...2021