Node.Security

Security Audit of Ghost

ISGroup SRL performed an automated Code Review (not a real Static Analysis, more a grep-on-steroid) of this NodeJS project in order to identify potential security vulnerabilities. We do not guarantee that all the findings are valid, and for sure there are plenty of false-positives and false-negatives (undetected issues) but it's free and your project could benefit from this security analisys. The following data is also available in JSON format!

Possible Security Issues
Issue Description Line File
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 113 core/test/integration/model/base/listeners_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 154 core/test/integration/model/base/listeners_spec.js
Server Side Injection(SSI) - setInterval() User controlled data in 'setInterval()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 88 core/test/utils/fork.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 51 core/test/unit/migration_spec.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 52 core/test/unit/migration_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 107 core/test/unit/scheduling/SchedulingDefault_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 145 core/test/unit/scheduling/SchedulingDefault_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 189 core/test/unit/scheduling/SchedulingDefault_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 221 core/test/unit/scheduling/SchedulingDefault_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 255 core/test/unit/scheduling/SchedulingDefault_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 287 core/test/unit/scheduling/SchedulingDefault_spec.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 329 core/test/unit/scheduling/SchedulingDefault_spec.js
Username Hardcoded A hardcoded username in plain text was identified. Store it properly in a config file. 42 core/test/unit/middleware/oauth_spec.js
Password Hardcoded A hardcoded password in plain text was identified. Store it properly in a config file. 43 core/test/unit/middleware/oauth_spec.js
Username Hardcoded A hardcoded username in plain text was identified. Store it properly in a config file. 88 core/test/unit/middleware/oauth_spec.js
Password Hardcoded A hardcoded password in plain text was identified. Store it properly in a config file. 89 core/test/unit/middleware/oauth_spec.js
Username Hardcoded A hardcoded username in plain text was identified. Store it properly in a config file. 110 core/test/unit/middleware/oauth_spec.js
Password Hardcoded A hardcoded password in plain text was identified. Store it properly in a config file. 111 core/test/unit/middleware/oauth_spec.js
Remote OS Command Execution User controlled data in 'child_process.exec()' can result in Remote OS Command Execution. 24 core/server/update-check.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 122 core/server/update-check.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 167 core/server/update-check.js
Key Hardcoded A hardcoded key in plain text was identified. 9 core/server/i18n.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 56 core/server/scheduling/SchedulingDefault.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 141 core/server/scheduling/SchedulingDefault.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 207 core/server/scheduling/SchedulingDefault.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 68 core/server/data/xml/rss/index.js
Key Hardcoded A hardcoded key in plain text was identified. 9 core/server/data/migration/fixtures/006/01-transform-dates-into-utc.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 38 core/server/helpers/author.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 68 core/server/helpers/body_class.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 12 core/server/helpers/encode.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 67 core/server/helpers/tags.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 40 core/server/helpers/input_email.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 24 core/server/helpers/plural.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 26 core/server/helpers/plural.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 28 core/server/helpers/plural.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 25 core/server/helpers/content.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 30 core/server/helpers/content.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 35 core/server/helpers/content.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 32 core/server/helpers/input_password.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 20 core/server/helpers/asset.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 20 core/server/helpers/excerpt.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 24 core/server/helpers/ghost_foot.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 33 core/server/helpers/post_class.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 23 core/server/helpers/template.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 10 core/server/helpers/title.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 89 core/server/utils/image-size-from-url.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 8 core/server/utils/gravatar.js
Server Side Injection(SSI) - setTimeout() User controlled data in 'setTimeout()' can result in Server Side Injection (SSI) or Remote Code Execution (RCE). 36 core/server/utils/gravatar.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 32 core/server/apps/amp/lib/helpers/amp_components.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 102 core/server/apps/amp/lib/helpers/amp_content.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 42 core/server/apps/subscribers/index.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 43 core/server/apps/subscribers/index.js
Handlebars Unescaped String Handlebars SafeString will not escape the data passed through it. Untrusted user input passing through SafeString can cause XSS. 68 core/server/apps/subscribers/index.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 36 core/server/middleware/serve-shared-file.js
Weak Hash used - MD5 MD5 is a a weak hash which is known to have collision. Use a strong hashing function. 174 core/server/config/index.js
Missing Security Features
Issue Description
Missing Security Header - X-Frame-Options (XFO) X-Frame-Options (XFO) header provides protection against Clickjacking attacks.
Missing Security Header - Content-Security-Policy (CSP) Content Security Policy (CSP), a mechanism web applications can use to mitigate a broad class of content injection vulnerabilities, such as cross-site scripting (XSS). CSP Header was not found.
Missing Security Header - Strict-Transport-Security (HSTS) Strict-Transport-Security (HSTS) header enforces secure (HTTP over SSL/TLS) connections to the server.
Missing 'httpOnly' in Cookie JavaScript can access Cookies if they are not marked httpOnly.
Infromation Disclosure - X-Powered-By Remove the X-Powered-By header to prevent information gathering.
Missing Security Header - X-Content-Type-Options X-Content-Type-Options header prevents Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type.
Missing Security Header - X-Download-Options: noopen X-Download-Options header set to noopen prevents IE users from directly opening and executing downloads in your site's context.
Missing Security Header - X-XSS-Protection:1 X-XSS-Protection header set to 1 enables the Cross-site scripting (XSS) filter built into most recent web browsers.
Missing Security Header - Public-Key-Pins (HPKP) Public-Key-Pins (HPKP) ensures that certificate is Pinned.
Outdated Libraries
File Library Reference