Skip to content

CVEs found in scan #2433

Open
Open
@freemansoft

Description

@freemansoft

Is there an existing issue for this?

  • I have searched the existing issues and didn't find mine.

Steps to reproduce

We ran two scanners against Maestro while getting approval to run in our environment. They found a couple of critical CVE.

Actual results

Package Vulnerability ID Description Severity Installed Fixed
pkg:npm/[email protected] CVE-2023-28154 webpack: avoid cross-realm objects  Critical 5.75.0 5.76.0
pkg:npm/%40babel/traverse@ 7.20.5 CVE-2023-45133 babel: arbitrary code execution  Critical 7.20.5 7.23.2, 8.0.0- alpha.4
pkg:npm/http-proxy [email protected] CVE-2024-21536 http-proxy-middleware: Denial of Service  High 2.0.6 2.0.7, 3.0.3
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections  High 1.29 1.31
pkg:npm/[email protected] CVE-2022-46175 json5: Prototype Pollution in JSON5 via Parse Method  High 1.0.1 2.2.2, 1.0.2
pkg:npm/[email protected] CVE-2024-45590 body-parser: Denial of Service Vulnerability in body-parser  High 1.20.1 1.20.3
pkg:npm/[email protected] CVE-2024-37890 nodejs-ws: denial of service when handling a request with many HTTP headers  High 7.5.9 5.2.4, 6.2.3, 7.5.10, 8.17.1
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-1471 SnakeYaml: Constructor Deserialization Remote Code Execution  High 1.29 2
pkg:npm/path-to [email protected] CVE-2024-52798 path-to-regexp: path-to-regexp Unpatched path-to-regexp ReDoS in 0.1.x  High 0.1.7 0.1.12
pkg:npm/path-to [email protected] CVE-2024-45296 path-to-regexp: Backtracking regular expressions cause ReDoS  High 0.1.7 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0
pkg:npm/[email protected] CVE-2024-47068 rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS  High 2.79.1 3.29.5, 4.22.4, 2.79.2
pkg:npm/[email protected] CVE-2021-3803 nodejs-nth-check: inefficient regular expression complexity  High 1.0.2 2.0.1
pkg:npm/[email protected] CVE-2023-2251 Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-5.  High 2.2.1 2.2.2
Package Vulnerability ID Description Severity Installed Fixed
pkg:maven/io.gitlab.arturb osch.detekt/detekt [email protected] CVE-2022-0272 XML External Entity Reference in detekt  High 1.19.0 1.20.0
pkg:npm/http-proxy [email protected] CVE-2025-32996 http-proxy-middleware can call writeBody twice because "else if" is not used  Medium 2.0.6 2.0.8, 3.0.4
pkg:npm/[email protected] CVE-2023-44270 PostCSS: Improper input validation in PostCSS  Medium 7.0.39 8.4.31
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-38752 snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCo de  Medium 1.29 1.32
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-38749 snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer .composeSequenceNode  Medium 1.29 1.31
pkg:npm/[email protected] CVE-2023-26115 word-wrap: ReDoS  Medium 1.2.3 1.2.4
pkg:npm/%40adobe/css [email protected] CVE-2023-26364 css-tools: Improper Input Validation causes Denial of Service via Regular Expression  Medium 4.0.1 4.3.1
pkg:npm/%40adobe/css [email protected] CVE-2023-48631 css-tools: regular expression denial of service (ReDoS) when parsing CSS  Medium 4.0.1 4.3.2
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-38751 snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Qu es.match  Medium 1.29 1.31
pkg:maven/org.jetbrains.ko tlin/[email protected] CVE-2022-24329 kotlin: Not possible to lock dependencies for Multiplatform Gradle Projects  Medium 1.5.31 1.6.0
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-41854 dev-java/snakeyaml: DoS via stack overflow  Medium 1.29 1.32
pkg:npm/http-proxy [email protected] CVE-2025-32997 http-proxy-middleware allows fixRequestBody to proceed even if bodyParser has failed  Medium 2.0.6 2.0.9, 3.0.5
pkg:npm/follow [email protected] CVE-2024-28849 follow-redirects: Possible credential leak  Medium 1.15.2 1.15.6
pkg:maven/org.yaml/snakeya [email protected] CVE-2022-38750 snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseC onstructor.constructObject  Medium 1.29 1.31
Package Vulnerability ID Description Severity Installed Fixed
pkg:npm/[email protected] CVE-2024-29041 express: cause malformed URLs to be evaluated  Medium 4.18.2 4.19.2, 5.0.0- beta.3
pkg:npm/serialize [email protected] CVE-2024-11831 npm-serialize-javascript: Cross-site Scripting (XSS) in serialize javascript  Medium 6.0.0 6.0.2
pkg:npm/[email protected] CVE-2024-55565 nanoid: nanoid mishandles non integer values  Medium 3.3.4 5.0.9, 3.3.8
pkg:npm/follow [email protected] CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()  Medium 1.15.2 1.15.4
pkg:npm/[email protected] CVE-2024-43788 webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule  Medium 5.75.0 5.94.0
pkg:npm/[email protected] CVE-2024-33883 The ejs (aka Embedded JavaScript templates) package before 3.1.10 for ...  Medium 3.1.8 3.1.10
pkg:npm/[email protected] CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore  Medium 4.1.2 4.1.3
pkg:npm/%40babel/helpers@7 .20.6 CVE-2025-27789 Babel is a compiler for writing next generation JavaScript. When using ...  Medium 7.20.6 7.26.10, 8.0.0- alpha.17
pkg:npm/serve [email protected] CVE-2024-43800 serve-static: Improper Sanitization in serve-static  Low 1.15.0 1.16.0, 2.1.0
pkg:npm/[email protected] CVE-2024-43796 express: Improper Input Handling in Express Redirects  Low 4.18.2 4.20.0, 5.0.0
pkg:npm/[email protected] CVE-2024-43799 send: Code Execution Vulnerability in Send Library  Low 0.18.0 0.19.0
pkg:npm/[email protected] CVE-2024-47764 cookie: cookie accepts cookie name, path, and domain with out of bounds characters  Low 0.5.0 0.7.0
pkg:npm/ip CVE-2024-29415 ip SSRF improper categorization in isPublic  High 2.0.0 N/A
Package Vulnerability ID Description Severity Installed Fixed
pkg:npm/cross-spawn CVE-2024-21538 Regular Expression Denial of Service (ReDoS) in cross-spawn  High 6.0.5 7.0.5
pkg:npm/trim CVE-2020-7753 Regular Expression Denial of Service in trim  High 0.0.1 0.0.3
pkg:npm/trim-newlines CVE-2021-33623 Uncontrolled Resource Consumption in trim-newlines  High 1.0.0 3.0.1
pkg:npm/semver CVE-2022-25883 semver vulnerable to Regular Expression Denial of Service  High 5.7.1 7.5.2
pkg:npm/browserify-sign CVE-2023-46234 browserify-sign upper bound check issue in dsaVerify leads to a signature forgery attack  High 4.2.1 4.2.2
pkg:npm/webpack-dev middleware CVE-2024-29180 Path traversal in webpack-dev middleware  High 3.7.3 7.1.0
pkg:npm/braces CVE-2024-4068 Uncontrolled resource consumption in braces  High 2.3.2 3.0.3
pkg:npm/elliptic CVE-2024-48949 Elliptic's verify function omits uniqueness validation  Medium 6.5.4 6.5.6
pkg:npm/micromatch CVE-2024-4067 Regular Expression Denial of Service (ReDoS) in micromatch  Medium 3.1.10 4.0.8
pkg:npm/store2 CVE-2024-57556 Cross Site Scripting vulnerability in store2  Medium 2.14.2 2.14.4
pkg:npm/elliptic CVE-2024-42459 Elliptic's EDDSA missing signature length check  Medium 6.5.4 6.5.7
pkg:npm/elliptic CVE-2024-48948 Valid ECDSA signatures erroneously rejected in Elliptic  Medium 6.5.4 6.6.0
pkg:npm/elliptic CVE-2024-42460 Elliptic's ECDSA missing check for whether leading bit of r and s is zero  Medium 6.5.4 6.5.7
Package Vulnerability ID Description Severity Installed Fixed
pkg:npm/graphql CVE-2023-26144 graphql Uncontrolled Resource Consumption vulnerability  Medium 16.8.0 16.8.1
pkg:npm/elliptic CVE-2024-42461 Elliptic allows BER-encoded signatures  Medium 6.5.4 6.5.7
pkg:npm/tar CVE-2024-28863 Denial of service while parsing a tar file due to lack of folders count validation  Medium 6.1.12 6.2.1
pkg:npm/ip CVE-2023-42282 NPM IP package incorrectly identifies some private IP addresses as public  N/A 2.0.0 2.0.1
pkg:npm/elliptic GHSA-vjh7-7g9h fjfh Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string)  N/A 6.5.4 6.6.1

Expected results

No Critical or High CVE

About app

This was part of onboarding or validating we could run Maestro in our environment.

About environment

N/A

Logs

N/A

Maestro version

1.40.0

How did you install Maestro?

install script (https://get.maestro.mobile.dev)

Anything else?

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions