jingo@1.8.0 vulnerabilities

A nodejs based wiki engine

Direct Vulnerabilities

Known vulnerabilities in the jingo package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

jingo is a git based wiki engine written for node.js, with a decent design, a search capability and a good typography.

Affected versions of this package are vulnerable to Arbitrary Code Execution due to the default usage of the function yaml.load() of the package js-yaml instead of its secure replacement , yaml.safeLoad().

How to fix Arbitrary Code Execution?

Upgrade jingo to version 1.9.6 or higher.

<1.9.6
  • M
Cross-site Scripting (XSS)

jingo is a git based wiki engine written for node.js, with a decent design, a search capability and a good typography.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). If a malicious input such as <script>alert(1)</script> is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text.

How to fix Cross-site Scripting (XSS)?

Upgrade jingo to version 1.9.2 or higher.

<1.9.2