diff --git "a/go_project_vulnerabilities.json" "b/go_project_vulnerabilities.json" new file mode 100644--- /dev/null +++ "b/go_project_vulnerabilities.json" @@ -0,0 +1,23987 @@ +[ + { + "id": "CVE-2024-23827", + "published": "2024-01-29T16:15:09", + "modified": "2025-01-14T12:11:56.492172", + "details": "Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2024-22197", + "published": "2024-01-11T18:15:45", + "modified": "2025-01-15T05:07:00.916200", + "details": "Nginx-ui is online statistics for Server Indicators\u200b\u200b Monitor CPU usage, memory usage, load average, and disk usage in real-time. The `Home > Preference` page exposes a small list of nginx settings such as `Nginx Access Log Path` and `Nginx Error Log Path`. However, the API also exposes `test_config_cmd`, `reload_cmd` and `restart_cmd`. While the UI doesn't allow users to modify any of these settings, it is possible to do so by sending a request to the API. This issue may lead to authenticated Remote Code Execution, Privilege Escalation, and Information Disclosure. This issue has been patched in version 2.0.0.beta.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2024-22198", + "published": "2024-01-11T20:15:45", + "modified": "2025-01-15T05:07:06.192794", + "details": "Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2024-22196", + "published": "2024-01-11T20:15:44", + "modified": "2025-01-15T05:06:59.257600", + "details": "Nginx-UI is an online statistics for Server Indicators\u200b\u200b Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using `DefaultQuery`, the `\"desc\"` and `\"id\"` values are used as default values if the query parameters are not set. Thus, the `order` and `sort_by` query parameter are user-controlled and are being appended to the `order` variable without any sanitization. This issue has been patched in version 2.0.0.beta.9.\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2024-49367", + "published": "2024-10-21T17:15:03", + "modified": "2024-11-07T23:57:17.678334", + "details": "Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2024-49368", + "published": "2024-10-21T17:15:03", + "modified": "2024-11-07T06:57:09.884468", + "details": "Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, when Nginx UI configures logrotate, it does not verify the input and directly passes it to exec.Command, causing arbitrary command execution. Version 2.0.0-beta.36 fixes this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2024-49366", + "published": "2024-10-21T17:15:03", + "modified": "2024-11-07T23:57:17.762776", + "details": "Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/0xjacky/nginx-ui", + "cwes": [], + "commits": [ + "02fb07f6b4885c599e84077078e095a1007dae61" + ] + }, + { + "id": "CVE-2023-22478", + "published": "2023-01-14T01:15:14", + "modified": "2025-01-15T04:41:08.774311", + "details": "KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/1panel-dev/kubepi", + "cwes": [], + "commits": [ + "da784f5532ea2495b92708cacb32703bff3a45a3" + ] + }, + { + "id": "CVE-2023-22463", + "published": "2023-01-04T16:15:09", + "modified": "2025-01-15T04:41:05.928974", + "details": "KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/1panel-dev/kubepi", + "cwes": [], + "commits": [ + "da784f5532ea2495b92708cacb32703bff3a45a3" + ] + }, + { + "id": "CVE-2024-36814", + "published": "2024-10-08T19:15:13", + "modified": "2025-02-19T03:37:40.162492", + "details": "An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory.", + "repo_url": "https://github.com/adguardteam/adguardhome", + "cwes": [], + "commits": [ + "f68f6c9b37cea1f33cb6fa791e6678b9df3a237b" + ] + }, + { + "id": "CVE-2021-27935", + "published": "2021-03-03T20:15:12", + "modified": "2025-02-19T03:17:56.091915", + "details": "An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/adguardteam/adguardhome", + "cwes": [], + "commits": [ + "f68f6c9b37cea1f33cb6fa791e6678b9df3a237b" + ] + }, + { + "id": "CVE-2019-16060", + "published": "2019-09-06T19:15:11", + "modified": "2025-01-14T07:47:12.597146", + "details": "The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/airbrake/airbrake-ruby", + "cwes": [], + "commits": [ + "2b63f98566e514f440dba8b107ddc3adc22cba66" + ] + }, + { + "id": "CVE-2024-29192", + "published": "2024-04-04T18:15:14", + "modified": "2025-01-15T05:11:31.570211", + "details": "gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to Cross-Site Request Forgery. The `/api/config` endpoint allows one to modify the existing configuration with user-supplied values. While the API is only allowing localhost to interact without authentication, an attacker may be able to achieve that depending on how go2rtc is set up on the upstream application, and given that this endpoint is not protected against CSRF, it allows requests from any origin (e.g. a \"drive-by\" attack) . The `exec` handler allows for any stream to execute arbitrary commands. An attacker may add a custom stream through `api/config`, which may lead to arbitrary command execution. In the event of a victim visiting the server in question, their browser will execute the requests against the go2rtc instance. Commit 8793c3636493c5efdda08f3b5ed5c6e1ea594fd9 adds a warning about secure API access.", + "repo_url": "https://github.com/alexxit/go2rtc", + "cwes": [], + "commits": [ + "ccec41a10f2636676befea50aa4cee2aa9d1d75a" + ] + }, + { + "id": "CVE-2024-29191", + "published": "2024-04-04T15:15:39", + "modified": "2025-01-15T05:11:29.073327", + "details": "gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (`links.html`) appends the `src` GET parameter (`[0]`) in all of its links for 1-click previews. The context in which `src` is being appended is `innerHTML` (`[1]`), which will insert the text as HTML. Commit 3b3d5b033aac3a019af64f83dec84f70ed2c8aba contains a patch for the issue.", + "repo_url": "https://github.com/alexxit/go2rtc", + "cwes": [], + "commits": [ + "ccec41a10f2636676befea50aa4cee2aa9d1d75a" + ] + }, + { + "id": "CVE-2024-47067", + "published": "2024-09-30T16:15:09", + "modified": "2025-02-19T03:38:38.186655", + "details": "AList is a file list program that supports multiple storages. AList contains a reflected cross-site scripting vulnerability in helper.go. The endpoint /i/:link_name takes in a user-provided value and reflects it back in the response. The endpoint returns an application/xml response, opening it up to HTML tags via XHTML and thus leading to a XSS vulnerability. This vulnerability is fixed in 3.29.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/alistgo/alist", + "cwes": [], + "commits": [ + "a64dd4885ece1709e5287e07dbb4d6832fd1d3b1" + ] + }, + { + "id": "CVE-2020-21485", + "published": "2023-06-20T15:15:11", + "modified": "2025-01-14T08:37:58.264245", + "details": "Cross Site Scripting vulnerability in Alluxio v.1.8.1 allows a remote attacker to executea arbitrary code via the path parameter in the browse board component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/alluxio/alluxio", + "cwes": [], + "commits": [ + "79c6fb4e11e84c08f7866aef97d4e1798f937782" + ] + }, + { + "id": "CVE-2023-38889", + "published": "2023-08-15T17:15:11", + "modified": "2025-01-14T11:53:18.572454", + "details": "An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/alluxio/alluxio", + "cwes": [], + "commits": [ + "79c6fb4e11e84c08f7866aef97d4e1798f937782" + ] + }, + { + "id": "CVE-2022-23848", + "published": "2022-02-20T19:15:09", + "modified": "2025-01-14T10:49:34.680272", + "details": "In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/alluxio/alluxio", + "cwes": [], + "commits": [ + "79c6fb4e11e84c08f7866aef97d4e1798f937782" + ] + }, + { + "id": "CVE-2024-47182", + "published": "2024-09-27T14:15:04", + "modified": "2024-10-09T20:59:08.152131", + "details": "Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/amir20/dozzle", + "cwes": [], + "commits": [ + "3c15ac225c5d85701ecbfdae71aad419cf23101d" + ] + }, + { + "id": "CVE-2023-24827", + "published": "2023-02-07T01:15:09", + "modified": "2025-01-15T04:44:26.181157", + "details": "syft is a a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. The `SYFT_ATTEST_PASSWORD` environment variable is for the `syft attest` command to generate attested SBOMs for the given container image. This environment variable is used to decrypt the private key (provided with `syft attest --key `) during the signing process while generating an SBOM attestation. This vulnerability affects users running syft that have the `SYFT_ATTEST_PASSWORD` environment variable set with credentials (regardless of if the attest command is being used or not). Users that do not have the environment variable `SYFT_ATTEST_PASSWORD` set are not affected by this issue. The credentials are leaked in two ways: in the syft logs when `-vv` or `-vvv` are used in the syft command (which is any log level >= `DEBUG`) and in the attestation or SBOM only when the `syft-json` format is used. Note that as of v0.69.0 any generated attestations by the `syft attest` command are uploaded to the OCI registry (if you have write access to that registry) in the same way `cosign attach` is done. This means that any attestations generated for the affected versions of syft when the `SYFT_ATTEST_PASSWORD` environment variable was set would leak credentials in the attestation payload uploaded to the OCI registry. This issue has been patched in commit `9995950c70` and has been released as v0.70.0. There are no workarounds for this vulnerability. Users are advised to upgrade.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/anchore/syft", + "cwes": [], + "commits": [ + "1530ef354ffaf59cef6a02c949f2cdb82353954f" + ] + }, + { + "id": "CVE-2021-32721", + "published": "2021-06-29T19:15:09", + "modified": "2025-01-14T09:14:44.520045", + "details": "PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. The issue is resolved in v1.1.1. There are no existing workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/andrewburian/powermux", + "cwes": [], + "commits": [ + "d905ec837601bedbff48f47b476c6e16f232721d" + ] + }, + { + "id": "CVE-2023-39059", + "published": "2023-08-28T22:15:08", + "modified": "2025-02-19T03:33:59.662567", + "details": "An issue in ansible semaphore v.2.8.90 allows a remote attacker to execute arbitrary code via a crafted payload to the extra variables parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/ansible-semaphore/semaphore", + "cwes": [], + "commits": [ + "b94cb98ca69e3cf13ac8a830c6fb59e433cd9261" + ] + }, + { + "id": "CVE-2020-25635", + "published": "2020-10-05T14:15:13", + "modified": "2025-02-19T03:09:29.286292", + "details": "A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/ansible/ansible", + "cwes": [], + "commits": [ + "0e68601002de5e4e0b06dde6a8f737ebd3312349" + ] + }, + { + "id": "CVE-2020-25636", + "published": "2020-10-05T13:15:13", + "modified": "2025-02-19T03:09:29.066662", + "details": "A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/ansible/ansible", + "cwes": [], + "commits": [ + "0e68601002de5e4e0b06dde6a8f737ebd3312349" + ] + }, + { + "id": "CVE-2023-1238", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:03.838068", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1538", + "published": "2023-03-21T05:15:09", + "modified": "2025-01-15T04:40:03.446320", + "details": "Observable Timing Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1541", + "published": "2023-03-21T05:15:10", + "modified": "2025-01-15T04:39:58.827060", + "details": "Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1240", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:05.361558", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1535", + "published": "2023-03-21T05:15:08", + "modified": "2025-01-15T04:39:50.097479", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1245", + "published": "2023-03-07T08:15:10", + "modified": "2025-01-15T04:39:10.254331", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1542", + "published": "2023-03-21T05:15:10", + "modified": "2025-01-15T04:39:58.979387", + "details": "Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1543", + "published": "2023-03-21T05:15:10", + "modified": "2025-01-15T04:40:01.589772", + "details": "Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1540", + "published": "2023-03-21T05:15:09", + "modified": "2025-01-15T04:39:59.455006", + "details": "Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1536", + "published": "2023-03-21T05:15:09", + "modified": "2025-01-15T04:39:51.668117", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1244", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:01.406269", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1537", + "published": "2023-03-21T05:15:09", + "modified": "2025-01-15T04:39:54.444626", + "details": "Authentication Bypass by Capture-replay in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1243", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:04.879803", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1239", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:12.191260", + "details": "Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1241", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:10.757987", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1242", + "published": "2023-03-07T08:15:09", + "modified": "2025-01-15T04:39:01.260098", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1237", + "published": "2023-03-07T08:15:08", + "modified": "2025-01-15T04:39:03.349819", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1539", + "published": "2023-03-21T05:15:09", + "modified": "2025-01-15T04:39:53.428663", + "details": "Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1975", + "published": "2023-04-11T10:15:18", + "modified": "2025-01-15T04:40:45.424521", + "details": "Insertion of Sensitive Information Into Sent Data in GitHub repository answerdev/answer prior to 1.0.8.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1976", + "published": "2023-04-11T11:15:08", + "modified": "2025-01-15T04:40:57.059996", + "details": "Password Aging with Long Expiration in GitHub repository answerdev/answer prior to 1.0.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-1974", + "published": "2023-04-11T10:15:17", + "modified": "2025-01-15T04:40:44.950887", + "details": "Exposure of Sensitive Information Through Metadata in GitHub repository answerdev/answer prior to 1.0.8.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-4127", + "published": "2023-08-03T04:15:11", + "modified": "2025-01-15T04:57:48.860168", + "details": "Race Condition within a Thread in GitHub repository answerdev/answer prior to v1.1.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-4125", + "published": "2023-08-03T04:15:11", + "modified": "2025-01-15T04:57:51.490731", + "details": "Weak Password Requirements in GitHub repository answerdev/answer prior to v1.1.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-4124", + "published": "2023-08-03T04:15:11", + "modified": "2025-01-15T04:57:45.774820", + "details": "Missing Authorization in GitHub repository answerdev/answer prior to v1.1.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-4126", + "published": "2023-08-03T04:15:11", + "modified": "2025-01-15T04:57:50.702051", + "details": "Insufficient Session Expiration in GitHub repository answerdev/answer prior to v1.1.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-4815", + "published": "2023-09-07T07:15:08", + "modified": "2025-01-15T05:01:24.289895", + "details": "Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0739", + "published": "2023-02-08T05:15:11", + "modified": "2025-01-15T04:34:49.667529", + "details": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0740", + "published": "2023-02-08T08:15:08", + "modified": "2025-01-15T04:34:29.435741", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0743", + "published": "2023-02-08T08:15:08", + "modified": "2025-01-15T04:34:34.948525", + "details": "Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0934", + "published": "2023-02-21T15:15:12", + "modified": "2025-01-15T04:38:30.328525", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0742", + "published": "2023-02-08T08:15:08", + "modified": "2025-01-15T04:34:39.337402", + "details": "Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0744", + "published": "2023-02-08T08:15:08", + "modified": "2025-01-15T04:34:59.140408", + "details": "Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-0741", + "published": "2023-02-08T08:15:08", + "modified": "2025-01-15T04:34:52.227959", + "details": "Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2023-2590", + "published": "2023-05-09T06:15:08", + "modified": "2025-01-15T04:46:15.979696", + "details": "Missing Authorization in GitHub repository answerdev/answer prior to 1.0.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/answerdev/answer", + "cwes": [], + "commits": [ + "f2046190d6a399a115a214b1d62c4c291ac7d03c" + ] + }, + { + "id": "CVE-2021-33190", + "published": "2021-06-08T15:15:08", + "modified": "2025-01-14T09:16:03.067968", + "details": "In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/apache/apisix-dashboard", + "cwes": [], + "commits": [ + "c574813eea82edcd6d95a2ea0f8857b736049717" + ] + }, + { + "id": "CVE-2021-45232", + "published": "2021-12-27T15:15:07", + "modified": "2025-02-19T03:22:27.483001", + "details": "In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apache/apisix-dashboard", + "cwes": [], + "commits": [ + "c574813eea82edcd6d95a2ea0f8857b736049717" + ] + }, + { + "id": "CVE-2023-26512", + "published": "2023-07-17T08:15:09", + "modified": "2025-02-08T01:53:55.225511", + "details": "CWE-502 Deserialization of Untrusted Data\u00a0at the\u00a0rabbitmq-connector plugin\u00a0module in Apache EventMesh (incubating)\u00a0V1.7.0\\V1.8.0 on windows\\linux\\mac os e.g. platforms allows attackers\u00a0to send controlled message and \n\nremote code execute\u00a0via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, we will release the new version as soon as possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apache/eventmesh", + "cwes": [], + "commits": [ + "63ac4ec808933a64b048a3988f6c91671d2bc41a" + ] + }, + { + "id": "CVE-2023-49619", + "published": "2024-01-10T09:15:44", + "modified": "2025-01-14T12:06:17.335800", + "details": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.2.0.\n\nUnder normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the script can increase the number of collection of the question many times.\n\nUsers are recommended to upgrade to version [1.2.1], which fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-answer", + "cwes": [], + "commits": [ + "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" + ] + }, + { + "id": "CVE-2024-41888", + "published": "2024-08-12T13:38:31", + "modified": "2025-01-14T12:17:10.491121", + "details": "Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.3.5.\n\nThe password reset link remains valid within its expiration period even after it has been used. This could potentially lead to the link being misused or hijacked.\nUsers are recommended to upgrade to version 1.3.6, which fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-answer", + "cwes": [], + "commits": [ + "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" + ] + }, + { + "id": "CVE-2024-41890", + "published": "2024-08-12T13:38:31", + "modified": "2025-01-14T12:18:15.627980", + "details": "Missing Release of Resource after Effective Lifetime vulnerability in Apache Answer.\n\nThis issue affects Apache Answer: through 1.3.5.\n\nUser sends multiple password reset emails, each containing a valid link. Within the link's validity period, this could potentially lead to the link being misused or hijacked.\nUsers are recommended to upgrade to version 1.3.6, which fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-answer", + "cwes": [], + "commits": [ + "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" + ] + }, + { + "id": "CVE-2024-26578", + "published": "2024-02-22T10:15:08", + "modified": "2025-02-13T19:47:28.902943", + "details": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.\n\nRepeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registrations using scripts, it can result in the creation of multiple user accounts simultaneously with the same name.\nUsers are recommended to upgrade to version [1.2.5], which fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-answer", + "cwes": [], + "commits": [ + "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" + ] + }, + { + "id": "CVE-2024-23349", + "published": "2024-02-22T10:15:08", + "modified": "2025-01-15T05:07:49.383911", + "details": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.\n\nXSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such an attack.\n\nUsers are recommended to upgrade to version [1.2.5], which fixes the issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-answer", + "cwes": [], + "commits": [ + "8a3b19fd32fabae4eed98a1f240a01f27bebdf5f" + ] + }, + { + "id": "CVE-2021-24117", + "published": "2021-07-14T14:15:08", + "modified": "2025-01-15T01:47:51.455770", + "details": "In Apache Teaclave Rust SGX SDK 1.1.3, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-teaclave-sgx-sdk", + "cwes": [], + "commits": [ + "bc2d7e245679423312be2deb51701587b4070681" + ] + }, + { + "id": "CVE-2020-5499", + "published": "2020-01-04T07:15:11", + "modified": "2025-01-14T08:47:42.557541", + "details": "Baidu Rust SGX SDK through 1.0.8 has an enclave ID race. There are non-deterministic results in which, sometimes, two global IDs are the same.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apache/incubator-teaclave-sgx-sdk", + "cwes": [], + "commits": [ + "bc2d7e245679423312be2deb51701587b4070681" + ] + }, + { + "id": "CVE-2021-43350", + "published": "2021-11-11T13:15:07", + "modified": "2025-01-14T10:00:35.339901", + "details": "An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apache/incubator-trafficcontrol", + "cwes": [], + "commits": [ + "a52ae6cda73ef477aec691b0d27701326d20e025" + ] + }, + { + "id": "CVE-2022-23206", + "published": "2022-02-06T16:15:07", + "modified": "2025-01-14T10:47:39.253390", + "details": "In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/apache/incubator-trafficcontrol", + "cwes": [], + "commits": [ + "a52ae6cda73ef477aec691b0d27701326d20e025" + ] + }, + { + "id": "CVE-2023-46302", + "published": "2023-11-20T09:15:07", + "modified": "2025-01-14T12:02:36.924593", + "details": "Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .\n\nApache Submarine uses JAXRS to define REST endpoints. In order to\nhandle YAML requests (using application/yaml content-type), it defines\na YamlEntityProvider entity provider that will process all incoming\nYAML requests. In order to unmarshal the request, the readFrom method\nis invoked, passing the entityStream containing the user-supplied data in `submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java`.\n \nWe have now fixed this issue in the new version by replacing to `jackson-dataformat-yaml`.\nThis issue affects Apache Submarine: from 0.7.0 before 0.8.0.\u00a0Users are recommended to upgrade to version 0.8.0, which fixes this issue.\nIf using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apache/submarine", + "cwes": [], + "commits": [ + "e7c6a546b8db2d168c3dfa4a6c99b07601887ec3" + ] + }, + { + "id": "CVE-2023-37924", + "published": "2023-11-22T10:15:07", + "modified": "2025-01-14T11:49:55.641232", + "details": "Apache Software Foundation Apache Submarine has an SQL injection vulnerability when a user logs in. This issue can result in unauthorized login.\nNow we have fixed this issue and now user must have the correct login to access workbench.\nThis issue affects Apache Submarine: from 0.7.0 before 0.8.0.\u00a0We recommend that all submarine users with 0.7.0 upgrade to 0.8.0, which not only fixes the issue, supports the oidc authentication mode, but also removes the case of unauthenticated logins.\nIf using the version lower than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1037 https://github.com/apache/submarine/pull/1054 and rebuild the submarine-server image to fix this.\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apache/submarine", + "cwes": [], + "commits": [ + "e7c6a546b8db2d168c3dfa4a6c99b07601887ec3" + ] + }, + { + "id": "CVE-2023-30549", + "published": "2023-04-25T21:15:10", + "modified": "2025-01-15T05:09:55.730799", + "details": "Apptainer is an open source container platform for Linux. There is an ext4 use-after-free flaw that is exploitable through versions of Apptainer < 1.1.0 and installations that include apptainer-suid < 1.1.8 on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal. Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.\n\nApptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid \"rootless\" mode using fuse2fs.\n\nSome workarounds are possible. Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf. This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts. (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.). Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths, and set `allow container extfs = no` to disallow mounting of extfs overlay files. The latter option by itself does not disallow mounting of extfs overlay partitions inside SIF files, so that's why the former options are also needed.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/apptainer/apptainer", + "cwes": [], + "commits": [ + "744c94b5837d34d12d15cb87298b989b3c77f050" + ] + }, + { + "id": "CVE-2023-38496", + "published": "2023-07-25T22:15:10", + "modified": "2025-01-14T11:50:25.093195", + "details": "Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/apptainer/apptainer", + "cwes": [], + "commits": [ + "744c94b5837d34d12d15cb87298b989b3c77f050" + ] + }, + { + "id": "CVE-2020-15229", + "published": "2020-10-14T19:15:13", + "modified": "2025-01-15T01:43:17.478984", + "details": "Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/apptainer/singularity", + "cwes": [], + "commits": [ + "98ad49a3de9043ea287d65f4d544632ff074e506" + ] + }, + { + "id": "CVE-2023-42374", + "published": "2024-02-13T01:15:07", + "modified": "2025-01-15T05:04:44.918794", + "details": "An issue in mystenlabs Sui Blockchain before v.1.6.3 allow a remote attacker to execute arbitrary code and cause a denial of service via a crafted compressed script to the Sui node component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aptos-labs/aptos-core", + "cwes": [], + "commits": [ + "6b610f4fc36098662dd0742ecc16687b8b535bb3" + ] + }, + { + "id": "CVE-2023-36184", + "published": "2023-09-08T02:15:08", + "modified": "2025-01-15T04:56:09.741847", + "details": "CMysten Labs Sui blockchain v1.2.0 was discovered to contain a stack overflow via the component /spec/openrpc.json.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/aptos-labs/aptos-core", + "cwes": [], + "commits": [ + "6b610f4fc36098662dd0742ecc16687b8b535bb3" + ] + }, + { + "id": "CVE-2024-35192", + "published": "2024-05-20T21:15:09", + "modified": "2025-01-15T05:14:40.531620", + "details": "Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR). These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. Systems are not affected if the default credential provider chain is unable to obtain valid credentials. This vulnerability only applies when scanning container images directly from a registry. This vulnerability is fixed in 0.51.2.", + "repo_url": "https://github.com/aquasecurity/trivy", + "cwes": [], + "commits": [ + "8016b821a260840ccb81ef520f2804b9482f3820" + ] + }, + { + "id": "CVE-2023-43802", + "published": "2023-10-18T21:15:09", + "modified": "2025-01-14T12:00:01.681472", + "details": "Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate their privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/arduino/arduino-create-agent", + "cwes": [], + "commits": [ + "d170a5e8d36292dfb95387d0d345d2b279b6c224" + ] + }, + { + "id": "CVE-2023-43801", + "published": "2023-10-18T22:15:09", + "modified": "2025-01-14T12:00:01.498339", + "details": "Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP DELETE request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this issue.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/arduino/arduino-create-agent", + "cwes": [], + "commits": [ + "d170a5e8d36292dfb95387d0d345d2b279b6c224" + ] + }, + { + "id": "CVE-2023-43800", + "published": "2023-10-18T22:15:09", + "modified": "2025-01-14T11:59:58.705773", + "details": "Arduino Create Agent is a package to help manage Arduino development. The vulnerability affects the endpoint `/v2/pkgs/tools/installed`. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/arduino/arduino-create-agent", + "cwes": [], + "commits": [ + "d170a5e8d36292dfb95387d0d345d2b279b6c224" + ] + }, + { + "id": "CVE-2023-43803", + "published": "2023-10-18T21:15:09", + "modified": "2025-01-14T12:00:00.918887", + "details": "Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/arduino/arduino-create-agent", + "cwes": [], + "commits": [ + "d170a5e8d36292dfb95387d0d345d2b279b6c224" + ] + }, + { + "id": "CVE-2023-49296", + "published": "2023-12-13T20:15:49", + "modified": "2025-01-15T05:01:57.947479", + "details": "The Arduino Create Agent allows users to use the Arduino Create applications to upload code to any USB connected Arduino board directly from the browser. A vulnerability in versions prior to 1.3.6 affects the endpoint `/certificate.crt` and the way the web interface of the ArduinoCreateAgent handles custom error messages. An attacker that is able to persuade a victim into clicking on a malicious link can perform a Reflected Cross-Site Scripting attack on the web interface of the create agent, which would allow the attacker to execute arbitrary browser client side code. Version 1.3.6 contains a fix for the issue.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/arduino/arduino-create-agent", + "cwes": [], + "commits": [ + "d170a5e8d36292dfb95387d0d345d2b279b6c224" + ] + }, + { + "id": "CVE-2022-25856", + "published": "2022-06-17T20:15:10", + "modified": "2025-01-15T02:19:10.176988", + "details": "The package github.com/argoproj/argo-events/sensors/artifacts before 1.7.1 are vulnerable to Directory Traversal in the (g *GitArtifactReader).Read() API in git.go. This could allow arbitrary file reads if the GitArtifactReader is provided a pathname containing a symbolic link or an implicit directory name such as ...", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/argoproj/argo-events", + "cwes": [], + "commits": [ + "6b10ce4d463c312085fb33f6be12cfd137ea19bc" + ] + }, + { + "id": "CVE-2022-31054", + "published": "2022-06-13T20:15:07", + "modified": "2025-01-15T02:21:33.287385", + "details": "Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service. A patch for this vulnerability has been released in Argo Events version 1.7.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/argoproj/argo-events", + "cwes": [], + "commits": [ + "6b10ce4d463c312085fb33f6be12cfd137ea19bc" + ] + }, + { + "id": "CVE-2024-47827", + "published": "2024-10-28T16:15:03", + "modified": "2024-11-05T18:46:49.986249", + "details": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/argoproj/argo-workflows", + "cwes": [], + "commits": [ + "3fff791e4ef5b7e1de82ccb36cae327e8eb726f6" + ] + }, + { + "id": "CVE-2021-37914", + "published": "2021-08-03T00:15:08", + "modified": "2025-01-14T09:29:07.952896", + "details": "In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "repo_url": "https://github.com/argoproj/argo-workflows", + "cwes": [], + "commits": [ + "3fff791e4ef5b7e1de82ccb36cae327e8eb726f6" + ] + }, + { + "id": "CVE-2022-29164", + "published": "2022-05-06T00:15:07", + "modified": "2025-01-15T02:20:25.712782", + "details": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker emails the deep-link to the artifact to their victim. The victim opens the link, the script starts running. As the script has access to the Argo Server API (as the victim), so may read information about the victim\u2019s workflows, or create and delete workflows. Note the attacker must be an insider: they must have access to the same cluster as the victim and must already be able to run their own workflows. The attacker must have an understanding of the victim\u2019s system. We have seen no evidence of this in the wild. We urge all users to upgrade to the fixed versions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/argoproj/argo-workflows", + "cwes": [], + "commits": [ + "3fff791e4ef5b7e1de82ccb36cae327e8eb726f6" + ] + }, + { + "id": "CVE-2023-45821", + "published": "2023-10-19T21:15:08", + "modified": "2025-02-19T03:33:07.655525", + "details": "Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which the `registryIsDockerHub` function was only checking that the registry domain had the `docker.io` suffix. Artifact Hub allows providing some Docker credentials that are used to increase the rate limit applied when interacting with the Docker Hub registry API to read publicly available content. Due to the incorrect check described above, it'd be possible to hijack those credentials by purchasing a domain which ends with `docker.io` and deploying a fake OCI registry on it. uses some credentials that only have permissions to read public content available in the Docker Hub. However, even though credentials for private repositories (disabled on `artifacthub.io`) are handled in a different way, other Artifact Hub deployments could have been using them for a different purpose. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "repo_url": "https://github.com/artifacthub/hub", + "cwes": [], + "commits": [ + "053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b" + ] + }, + { + "id": "CVE-2023-45823", + "published": "2023-10-19T21:15:09", + "modified": "2025-02-19T03:33:12.274242", + "details": "Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which by using symbolic links in certain kinds of repositories loaded into Artifact Hub, it was possible to read internal files. Artifact Hub indexes content from a variety of sources, including git repositories. When processing git based repositories, Artifact Hub clones the repository and, depending on the artifact kind, reads some files from it. During this process, in some cases, no validation was done to check if the file was a symbolic link. This made possible to read arbitrary files in the system, potentially leaking sensitive information. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/artifacthub/hub", + "cwes": [], + "commits": [ + "053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b" + ] + }, + { + "id": "CVE-2023-45822", + "published": "2023-10-19T21:15:08", + "modified": "2025-02-19T03:33:05.618496", + "details": "Artifact Hub is a web-based application that enables finding, installing, and publishing packages and configurations for CNCF projects. During a security audit of Artifact Hub's code base a security researcher identified a bug in which a default unsafe rego built-in was allowed to be used when defining authorization policies. Artifact Hub includes a fine-grained authorization mechanism that allows organizations to define what actions can be performed by their members. It is based on customizable authorization policies that are enforced by the `Open Policy Agent`. Policies are written using `rego` and their data files are expected to be json documents. By default, `rego` allows policies to make HTTP requests, which can be abused to send requests to internal resources and forward the responses to an external entity. In the context of Artifact Hub, this capability should have been disabled. This issue has been resolved in version `1.16.0`. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/artifacthub/hub", + "cwes": [], + "commits": [ + "053763fcbf1b9ceca27e1b8e42bd07e2b44fc32b" + ] + }, + { + "id": "CVE-2022-36006", + "published": "2022-08-15T11:21:40", + "modified": "2025-01-14T11:03:16.103925", + "details": "Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (\u201cWorkbench 1\u201d). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (\u201cWorkbench 2\u201d) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based \"Workbench 1\" app (\"apt-get remove arvados-workbench\") from your installation as a workaround.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/arvados/arvados", + "cwes": [], + "commits": [ + "9393327642b82d15c195a32a7b007a30c9e6d07b" + ] + }, + { + "id": "CVE-2022-39238", + "published": "2022-09-23T08:15:09", + "modified": "2025-01-14T11:06:39.945629", + "details": "Arvados is an open source platform for managing and analyzing biomedical big data. In versions prior to 2.4.3, when using Portable Authentication Modules (PAM) for user authentication, if a user presented valid credentials but the account is disabled or otherwise not allowed to access the host (such as an expired password), it would still be accepted for access to Arvados. Other authentication methods (LDAP, OpenID Connect) supported by Arvados are not affected by this flaw. This issue is patched in version 2.4.3. Workaround for this issue is to migrate to a different authentication method supported by Arvados, such as LDAP.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/arvados/arvados", + "cwes": [], + "commits": [ + "9393327642b82d15c195a32a7b007a30c9e6d07b" + ] + }, + { + "id": "CVE-2019-16355", + "published": "2019-09-16T15:15:10", + "modified": "2025-02-19T02:52:19.248919", + "details": "The File Session Manager in Beego 1.10.0 allows local users to read session files because of weak permissions for individual files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/astaxie/beego", + "cwes": [], + "commits": [ + "a09bafbf2ab483742b17bb352f95dbc0a597e720" + ] + }, + { + "id": "CVE-2019-16354", + "published": "2019-09-16T15:15:10", + "modified": "2025-02-19T02:52:15.645442", + "details": "The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/astaxie/beego", + "cwes": [], + "commits": [ + "a09bafbf2ab483742b17bb352f95dbc0a597e720" + ] + }, + { + "id": "CVE-2021-29456", + "published": "2021-04-21T19:15:35", + "modified": "2025-02-19T03:18:21.882684", + "details": "Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including potentially malicious sites. This security issue does not directly impact the security of the web application itself. As a workaround, one can use a reverse proxy to strip the query parameter from the affected endpoint. There is a patch for version 4.28.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/authelia/authelia", + "cwes": [], + "commits": [ + "6ea62657d90ce480780befdc4284bf0d79be1e07" + ] + }, + { + "id": "CVE-2021-32637", + "published": "2021-05-28T17:15:07", + "modified": "2025-01-15T01:54:17.696804", + "details": "Authelia is a a single sign-on multi-factor portal for web apps. This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, but all of the ones we officially support except nginx do not allow malformed URI paths. The problem is rectified entirely in v4.29.3. As this patch is relatively straightforward we can back port this to any version upon request. Alternatively we are supplying a git patch to 4.25.1 which should be relatively straightforward to apply to any version, the git patches for specific versions can be found in the references. The most relevant workaround is upgrading. You can also add a block which fails requests that contains a malformed URI in the internal location block.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/authelia/authelia", + "cwes": [], + "commits": [ + "6ea62657d90ce480780befdc4284bf0d79be1e07" + ] + }, + { + "id": "CVE-2025-24806", + "published": "2025-02-19T18:15:24", + "modified": "2025-02-20T08:55:15.346912", + "details": "Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It's important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it's effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address.", + "repo_url": "https://github.com/authelia/authelia", + "cwes": [], + "commits": [ + "6ea62657d90ce480780befdc4284bf0d79be1e07" + ] + }, + { + "id": "CVE-2024-27101", + "published": "2024-03-01T21:15:08", + "modified": "2025-01-15T05:10:03.647169", + "details": "SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Integer overflow in chunking helper causes dispatching to miss elements or panic. Any SpiceDB cluster with any schema where a resource being checked has more than 65535 relationships for the same resource and subject type is affected by this problem. The CheckPermission, BulkCheckPermission, and LookupSubjects API methods are affected. This vulnerability is fixed in 1.29.2.", + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2024-32001", + "published": "2024-04-10T23:15:07", + "modified": "2025-01-15T05:12:26.817957", + "details": "SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. As a workaround, avoid using LookupSubjects for negative authorization decisions and/or avoid using the broken schema.\n", + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2024-38361", + "published": "2024-06-20T23:15:52", + "modified": "2025-01-15T05:14:46.359892", + "details": "Spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Use of an exclusion under an arrow that has multiple resources may resolve to `NO_PERMISSION` when permission is expected. If the resource exists under *multiple* folders and the user has access to view more than a single folder, SpiceDB may report the user does not have access due to a failure in the exclusion dispatcher to request that *all* the folders in which the user is a member be returned. Permission is returned as `NO_PERMISSION` when `PERMISSION` is expected on the `CheckPermission` API. This issue has been addressed in version 1.33.1. All users are advised to upgrade. There are no known workarounds for this issue.", + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2024-46989", + "published": "2024-09-18T18:15:07", + "modified": "2024-10-08T04:23:12.974115", + "details": "spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Multiple caveats over the same indirect subject type on the same relation can result in no permission being returned when permission is expected. If the resource has multiple groups, and each group is caveated, it is possible for the returned permission to be \"no permission\" when permission is expected. Permission is returned as NO_PERMISSION when PERMISSION is expected on the CheckPermission API. This issue has been addressed in release version 1.35.3. Users are advised to upgrade. Users unable to upgrade should not use caveats or avoid the use of caveats on an indirect subject type with multiple entries.", + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2024-48909", + "published": "2024-10-14T21:15:12", + "modified": "2024-10-17T18:49:51.159801", + "details": "SpiceDB is an open source database for scalably storing and querying fine-grained authorization data. Starting in version 1.35.0 and prior to version 1.37.1, clients that have enabled `LookupResources2` and have caveats in the evaluation path for their requests can return a permissionship of `CONDITIONAL` with context marked as missing, even then the context was supplied. LookupResources2 is the new default in SpiceDB 1.37.0 and has been opt-in since SpiceDB 1.35.0. The bug is patched as part of SpiceDB 1.37.1. As a workaround, disable LookupResources2 via the `--enable-experimental-lookup-resources` flag by setting it to `false`.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2023-29193", + "published": "2023-04-14T20:15:09", + "modified": "2025-01-15T04:50:27.446310", + "details": "SpiceDB is an open source, Google Zanzibar-inspired, database system for creating and managing security-critical application permissions. The `spicedb serve` command contains a flag named `--grpc-preshared-key` which is used to protect the gRPC API from being accessed by unauthorized requests. The values of this flag are to be considered sensitive, secret data. The `/debug/pprof/cmdline` endpoint served by the metrics service (defaulting running on port `9090`) reveals the command-line flags provided for debugging purposes. If a password is set via the `--grpc-preshared-key` then the key is revealed by this endpoint along with any other flags provided to the SpiceDB binary. This issue has been fixed in version 1.19.1.\n\n### Impact\n\nAll deployments abiding by the recommended best practices for production usage are **NOT affected**:\n- Authzed's SpiceDB Serverless\n- Authzed's SpiceDB Dedicated\n- SpiceDB Operator\n\nUsers configuring SpiceDB via environment variables are **NOT affected**.\n\nUsers **MAY be affected** if they expose their metrics port to an untrusted network and are configuring `--grpc-preshared-key` via command-line flag.\n\n### Patches\n\nTODO\n\n### Workarounds\n\nTo workaround this issue you can do one of the following:\n\n- Configure the preshared key via an environment variable (e.g. `SPICEDB_GRPC_PRESHARED_KEY=yoursecret spicedb serve`)\n- Reconfigure the `--metrics-addr` flag to bind to a trusted network (e.g. `--metrics-addr=localhost:9090`)\n- Disable the metrics service via the flag (e.g. `--metrics-enabled=false`)\n- Adopt one of the recommended deployment models: [Authzed's managed services](https://authzed.com/pricing) or the [SpiceDB Operator](https://github.com/authzed/spicedb-operator)\n\n### References\n\n- [GitHub Security Advisory issued for SpiceDB](https://github.com/authzed/spicedb/security/advisories/GHSA-cjr9-mr35-7xh6)\n- [Go issue #22085](https://github.com/golang/go/issues/22085) for documenting the risks of exposing pprof to the internet\n- [Go issue #42834](https://github.com/golang/go/issues/42834) discusses preventing pprof registration to the default serve mux\n- [semgrep rule go.lang.security.audit.net.pprof.pprof-debug-exposure](https://semgrep.dev/r?q=go.lang.security.audit.net.pprof) checks for a variation of this issue\n\n### Credit\n\nWe'd like to thank Amit Laish, a security researcher at GE Vernova for responsibly disclosing this vulnerability.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2023-35930", + "published": "2023-06-26T20:15:10", + "modified": "2025-02-19T03:32:39.684361", + "details": "SpiceDB is an open source, Google Zanzibar-inspired, database system for creating and managing security-critical application permissions. Any user making a negative authorization decision based on the results of a `LookupResources` request with 1.22.0 is affected. For example, using `LookupResources` to find a list of resources to allow access to be okay: some subjects that should have access to a resource may not. But if using `LookupResources` to find a list of banned resources instead, then some users that shouldn't have access may. Generally, `LookupResources` is not and should not be to gate access in this way - that's what the `Check` API is for. Additionally, version 1.22.0 has included a warning about this bug since its initial release. Users are advised to upgrade to version 1.22.2. Users unable to upgrade should avoid using `LookupResources` for negative authorization decisions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2023-46255", + "published": "2023-10-31T16:15:10", + "modified": "2025-01-15T04:59:53.101322", + "details": "SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Prior to version 1.27.0-rc1, when the provided datastore URI is malformed (e.g. by having a password which contains `:`) the full URI (including the provided password) is printed, so that the password is shown in the logs. Version 1.27.0-rc1 patches this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2022-21646", + "published": "2022-01-11T22:15:07", + "modified": "2025-01-15T02:09:25.201043", + "details": "SpiceDB is a database system for managing security-critical application permissions. Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as \"accessible\" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion. In `v1.3.0`, the wildcard is ignored entirely in lookup's dispatch, resulting in the `banned` wildcard being ignored in the exclusion. Version 1.4.0 contains a patch for this issue. As a workaround, don't make use of wildcards on the right side of intersections or within exclusions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/authzed/spicedb", + "cwes": [], + "commits": [ + "10616c73e4dfcebb282372ec8d4d878cf220ec94" + ] + }, + { + "id": "CVE-2020-10728", + "published": "2022-08-16T21:15:09", + "modified": "2025-01-14T08:13:07.803352", + "details": "A flaw was found in automationbroker/apb container in versions up to and including 2.0.4-1. This container grants all users sudoer permissions allowing an unauthorized user with access to the running container the ability to escalate their own privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/automationbroker/apb", + "cwes": [], + "commits": [ + "77a4cd4036d7713c137ab931537933d226547cdf" + ] + }, + { + "id": "CVE-2024-28056", + "published": "2024-04-15T18:15:10", + "modified": "2025-01-15T05:11:26.661089", + "details": "Amazon AWS Amplify CLI before 12.10.1 incorrectly configures the role trust policy of IAM roles associated with Amplify projects. When the Authentication component is removed from an Amplify project, a Condition property is removed but \"Effect\":\"Allow\" remains present, and consequently sts:AssumeRoleWithWebIdentity would be available to threat actors with no conditions. Thus, if Amplify CLI had been used to remove the Authentication component from a project built between August 2019 and January 2024, an \"assume role\" may have occurred, and may have been leveraged to obtain unauthorized access to an organization's AWS resources. NOTE: the problem could only occur if an authorized AWS user removed an Authentication component. (The vulnerability did not give a threat actor the ability to remove an Authentication component.) However, in realistic situations, an authorized AWS user may have removed an Authentication component, e.g., if the objective were to stop using built-in Cognito resources, or move to a completely different identity provider.", + "repo_url": "https://github.com/aws-amplify/amplify-cli", + "cwes": [], + "commits": [ + "89ae5ad77e7eb79e1d8c6a62b766963c574db49a" + ] + }, + { + "id": "CVE-2022-23511", + "published": "2022-12-12T13:15:12", + "modified": "2025-01-15T02:15:48.691281", + "details": "A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows, software for collecting metrics and logs from Amazon EC2 instances and on-premises servers, in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt as NT AUTHORITY\\SYSTEM. To trigger this issue, the third party must be able to access the affected host and elevate their privileges such that they're able to trigger the agent repair process. They must also be able to install the tools required to trigger the issue. This issue does not affect the CloudWatch Agent for macOS or Linux. Agent users should upgrade to version 1.247355 of the CloudWatch Agent to address this issue. There is no recommended work around. Affected users must update the installed version of the CloudWatch Agent to address this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-cloudwatch-agent", + "cwes": [], + "commits": [ + "06b61c964ca2c3da640308ef1ae4727eaa4e009c" + ] + }, + { + "id": "CVE-2019-13120", + "published": "2019-10-07T22:15:10", + "modified": "2025-01-14T07:44:49.949257", + "details": "Amazon FreeRTOS up to and including v1.4.8 lacks length checking in prvProcessReceivedPublish, resulting in untargetable leakage of arbitrary memory contents on a device to an attacker. If an attacker has the authorization to send a malformed MQTT publish packet to an Amazon IoT Thing, which interacts with an associated vulnerable MQTT message in the application, specific circumstances could trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16601", + "published": "2018-12-06T23:29:01", + "modified": "2025-01-14T07:25:08.291446", + "details": "An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. A crafted IP header triggers a full memory space copy in prvProcessIPPacket, leading to denial of service and possibly remote code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16603", + "published": "2018-12-06T23:29:01", + "modified": "2025-01-14T07:25:08.078205", + "details": "An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds access to TCP source and destination port fields in xProcessReceivedTCPPacket can leak data back to an attacker.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16526", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:09.827480", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to leak information or execute arbitrary code because of a Buffer Overflow during generation of a protocol checksum in usGenerateProtocolChecksum and prvProcessIPPacket.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16598", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:11.101790", + "details": "An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16522", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:08.812333", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1 has an uninitialized pointer free in SOCKETS_SetSockOpt.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16523", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:08.502029", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow division by zero in prvCheckOptions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16524", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:04.897994", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow information disclosure during parsing of TCP options in prvCheckOptions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16528", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:09.368278", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1 allows remote attackers to execute arbitrary code because of mbedTLS context object corruption in prvSetupConnection and GGD_SecureConnect_Connect in AWS TLS connectivity modules.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16600", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:11.344069", + "details": "An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds memory access during parsing of ARP packets in eARPProcessPacket can be used for information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16599", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:11.180096", + "details": "An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds memory access during parsing of NBNS packets in prvTreatNBNS can be used for information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16602", + "published": "2018-12-06T23:29:01", + "modified": "2025-01-14T07:25:08.872541", + "details": "An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds memory access during parsing of DHCP responses in prvProcessDHCPReplies can be used for information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16525", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:08.416935", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to execute arbitrary code or leak information because of a Buffer Overflow during parsing of DNS\\LLMNR packets in prvParseDNSReply.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2018-16527", + "published": "2018-12-06T23:29:00", + "modified": "2025-01-14T07:25:09.876157", + "details": "Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow information disclosure during parsing of ICMP packets in prvProcessICMPPacket.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/aws/amazon-freertos", + "cwes": [], + "commits": [ + "1fc5e966a0f8e541c0942bd02bb3504a4a6be9c6" + ] + }, + { + "id": "CVE-2022-29527", + "published": "2022-04-20T10:15:08", + "modified": "2025-01-15T02:19:56.289989", + "details": "Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/amazon-ssm-agent", + "cwes": [], + "commits": [ + "8cbabacc74e68853bb42f10ddafdae10f2d33e6c" + ] + }, + { + "id": "CVE-2024-45037", + "published": "2024-08-27T19:15:17", + "modified": "2024-10-08T04:23:24.533045", + "details": "The AWS Cloud Development Kit (CDK) is an open-source framework for defining cloud infrastructure using code. Customers use it to create their own applications which are converted to AWS CloudFormation templates during deployment to a customer\u2019s AWS account. CDK contains pre-built components called \"constructs\" that are higher-level abstractions providing defaults and best practices. This approach enables developers to use familiar programming languages to define complex cloud infrastructure more efficiently than writing raw CloudFormation templates. We identified an issue in AWS Cloud Development Kit (CDK) which, under certain conditions, can result in granting authenticated Amazon Cognito users broader than intended access. Specifically, if a CDK application uses the \"RestApi\" construct with \"CognitoUserPoolAuthorizer\" as the authorizer and uses authorization scopes to limit access. This issue does not affect the availability of the specific API resources. Authenticated Cognito users may gain unintended access to protected API resources or methods, leading to potential data disclosure, and modification issues. Impacted versions: >=2.142.0;<=2.148.0. A patch is included in CDK versions >=2.148.1. Users are advised to upgrade their AWS CDK version to 2.148.1 or newer and re-deploy their application(s) to address this issue.", + "repo_url": "https://github.com/aws/aws-cdk", + "cwes": [], + "commits": [ + "ab288785279bf3d70ad3329e27ad1f6d2397942e" + ] + }, + { + "id": "CVE-2023-35165", + "published": "2023-06-23T21:15:09", + "modified": "2025-02-19T03:34:02.906462", + "details": "AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages `aws-cdk-lib` 2.0.0 until 2.80.0 and `@aws-cdk/aws-eks` 1.57.0 until 1.202.0, `eks.Cluster` and `eks.FargateCluster` constructs create two roles, `CreationRole` and `default MastersRole`, that have an overly permissive trust policy. \n \nThe first, referred to as the `CreationRole`, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected.\n \nThe second, referred to as the `default MastersRole`, is provisioned only if the `mastersRole` property isn't provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected.\n\nThe issue has been fixed in `@aws-cdk/aws-eks` v1.202.0 and `aws-cdk-lib` v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the `default MastersRole`, use the `mastersRole` property to explicitly provide a role.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/aws/aws-cdk", + "cwes": [], + "commits": [ + "ab288785279bf3d70ad3329e27ad1f6d2397942e" + ] + }, + { + "id": "CVE-2023-49091", + "published": "2023-11-29T20:15:08", + "modified": "2025-01-22T08:49:46.784026", + "details": "Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/azukaar/cosmos-server", + "cwes": [], + "commits": [ + "281c8c1ea434539a71d4add025ed3cc09657d63c" + ] + }, + { + "id": "CVE-2025-23214", + "published": "2025-01-20T18:15:14", + "modified": "2025-01-21T02:12:05.712913", + "details": "Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. By monitoring the error code returned in the login, it is possible to figure out whether a user exist or not in the database. Patched in 0.17.7.", + "repo_url": "https://github.com/azukaar/cosmos-server", + "cwes": [], + "commits": [ + "281c8c1ea434539a71d4add025ed3cc09657d63c" + ] + }, + { + "id": "CVE-2022-23551", + "published": "2022-12-21T20:15:09", + "modified": "2025-01-15T02:15:45.801133", + "details": "aad-pod-identity assigns Azure Active Directory identities to Kubernetes applications and has now been deprecated as of 24 October 2022. The NMI component in AAD Pod Identity intercepts and validates token requests based on regex. In this case, a token request made with backslash in the request (example: `/metadata/identity\\oauth2\\token/`) would bypass the NMI validation and be sent to IMDS allowing a pod in the cluster to access identities that it shouldn't have access to. This issue has been fixed and has been included in AAD Pod Identity release version 1.8.13. If using the AKS pod-managed identities add-on, no action is required. The clusters should now be running the version 1.8.13 release.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L" + } + ], + "repo_url": "https://github.com/azure/aad-pod-identity", + "cwes": [], + "commits": [ + "7b1eaabf3eb97032264aa7aef38cb9331c973114" + ] + }, + { + "id": "CVE-2020-8567", + "published": "2021-01-21T17:15:14", + "modified": "2025-01-14T08:49:21.508955", + "details": "Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/azure/secrets-store-csi-driver-provider-azure", + "cwes": [], + "commits": [ + "21fe08c62b1ea1ca5b6f265cf7d21c7a2d8f761d" + ] + }, + { + "id": "CVE-2024-29183", + "published": "2024-04-19T16:15:10", + "modified": "2025-01-15T05:11:40.989158", + "details": "OpenRASP is a RASP solution that directly integrates its protection engine into the application server by instrumentation. There exists a reflected XSS in the /login page due to a reflection of the redirect parameter. This allows an attacker to execute arbitrary javascript with the permissions of a user after the user logins with their account.", + "repo_url": "https://github.com/baidu/openrasp", + "cwes": [], + "commits": [ + "a0634d6ea7c170284c262c757e56a7e5a8f242d0" + ] + }, + { + "id": "CVE-2021-32825", + "published": "2021-08-16T19:15:14", + "modified": "2025-01-15T01:54:45.577228", + "details": "bblfshd is an open source self-hosted server for source code parsing. In bblfshd before commit 4265465b9b6fb5663c30ee43806126012066aad4 there is a \"zipslip\" vulnerability. The unsafe handling of symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations outside the designated target folder. This issue may lead to arbitrary file write (with same permissions as the program running the unpack operation) if the attacker can control the archive file. Additionally, if the attacker has read access to the unpacked files, he may be able to read arbitrary system files the parent process has permissions to read. For more details including a PoC see the referenced GHSL-2020-258.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/bblfsh/bblfshd", + "cwes": [], + "commits": [ + "7f9598f689b6a0e9bbc228e056abc08d23604597" + ] + }, + { + "id": "CVE-2024-40465", + "published": "2024-07-31T21:15:17", + "modified": "2024-10-08T04:19:20.589767", + "details": "An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/beego/beego", + "cwes": [], + "commits": [ + "c0d9d883c8005d9b8f231a3497a4ff09636359d4" + ] + }, + { + "id": "CVE-2024-40464", + "published": "2024-07-31T21:15:17", + "modified": "2024-10-08T04:19:18.285864", + "details": "An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the sendMail function located in beego/core/logs/smtp.go file", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/beego/beego", + "cwes": [], + "commits": [ + "c0d9d883c8005d9b8f231a3497a4ff09636359d4" + ] + }, + { + "id": "CVE-2024-55885", + "published": "2024-12-12T20:15:21", + "modified": "2025-01-15T05:16:38.866676", + "details": "beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.", + "repo_url": "https://github.com/beego/beego", + "cwes": [], + "commits": [ + "c0d9d883c8005d9b8f231a3497a4ff09636359d4" + ] + }, + { + "id": "CVE-2021-39391", + "published": "2021-09-14T18:15:08", + "modified": "2025-01-14T09:31:37.533670", + "details": "Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the \"Request Statistics\" page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/beego/beego", + "cwes": [], + "commits": [ + "c0d9d883c8005d9b8f231a3497a4ff09636359d4" + ] + }, + { + "id": "CVE-2021-30080", + "published": "2022-04-05T16:15:12", + "modified": "2025-01-15T01:52:02.704684", + "details": "An issue was discovered in the route lookup process in beego before 1.12.11 that allows attackers to bypass access control.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/beego/beego", + "cwes": [], + "commits": [ + "c0d9d883c8005d9b8f231a3497a4ff09636359d4" + ] + }, + { + "id": "CVE-2022-31836", + "published": "2022-07-05T15:15:08", + "modified": "2025-01-14T10:59:44.803598", + "details": "The leafInfo.match() function in Beego v2.0.3 and below uses path.join() to deal with wildcardvalues which can lead to cross directory risk.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/beego/beego", + "cwes": [], + "commits": [ + "c0d9d883c8005d9b8f231a3497a4ff09636359d4" + ] + }, + { + "id": "CVE-2024-41254", + "published": "2024-07-31T21:15:17", + "modified": "2025-02-19T03:38:14.434344", + "details": "An issue was discovered in litestream v0.3.13. The usage of the ssh.InsecureIgnoreHostKey() disables host key verification, possibly allowing attackers to obtain sensitive information via a man-in-the-middle attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/benbjohnson/litestream", + "cwes": [], + "commits": [ + "977d4a5ee45ae546537324a3cfbf926de3bebc97" + ] + }, + { + "id": "CVE-2022-45933", + "published": "2022-11-27T03:15:11", + "modified": "2025-01-14T11:15:33.816151", + "details": "KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a \"fun side project and a learning exercise,\" and not \"very secure.\"", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/benc-uk/kubeview", + "cwes": [], + "commits": [ + "a00a7d942805047ddeae4b264ce14ac2fe9d9487" + ] + }, + { + "id": "CVE-2024-2912", + "published": "2024-04-16T00:15:11", + "modified": "2025-01-15T05:11:32.531014", + "details": "An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted POST request. By exploiting this vulnerability, attackers can execute arbitrary commands on the server hosting the BentoML application. The vulnerability is triggered when a serialized object, crafted to execute OS commands upon deserialization, is sent to any valid BentoML endpoint. This issue poses a significant security risk, enabling attackers to compromise the server and potentially gain unauthorized access or control.", + "repo_url": "https://github.com/bentoml/bentoml", + "cwes": [], + "commits": [ + "da08bfabb0805f01079f8bd176e22b3658a780eb" + ] + }, + { + "id": "CVE-2020-12118", + "published": "2020-04-23T22:15:12", + "modified": "2025-01-14T08:15:36.071443", + "details": "The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" + } + ], + "repo_url": "https://github.com/binance-chain/tss-lib", + "cwes": [], + "commits": [ + "4fcd04b0ce5527ece51afa70c7852b5fd03b120c" + ] + }, + { + "id": "CVE-2022-31053", + "published": "2022-06-13T20:15:07", + "modified": "2025-01-14T10:58:23.610020", + "details": "Biscuit is an authentication and authorization token for microservices architectures. The Biscuit specification version 1 contains a vulnerable algorithm that allows malicious actors to forge valid \u0393-signatures. Such an attack would allow an attacker to create a token with any access level. The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript all have published versions following the v2 specification. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/biscuit-auth/biscuit-go", + "cwes": [], + "commits": [ + "9762ea334b1c190ee7c769b8741616bca5df546d" + ] + }, + { + "id": "CVE-2024-41111", + "published": "2024-07-18T23:15:02", + "modified": "2025-01-15T05:15:48.056992", + "details": "Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver version 1.6.0 (prerelease) is vulnerable to RCE on the teamserver by a low-privileged \"operator\" user. The RCE is as the system root user. The exploit is pretty fun as we make the Sliver server pwn itself. As described in a past issue (#65), \"there is a clear security boundary between the operator and server, an operator should not inherently be able to run commands or code on the server.\" An operator who exploited this vulnerability would be able to view all console logs, kick all other operators, view and modify files stored on the server, and ultimately delete the server. This issue has not yet be addressed but is expected to be resolved before the full release of version 1.6.0. Users of the 1.6.0 prerelease should avoid using Silver in production.", + "repo_url": "https://github.com/bishopfox/sliver", + "cwes": [], + "commits": [ + "af46878f8520c0c65bbb1e80d813a9658ba09188" + ] + }, + { + "id": "CVE-2023-34758", + "published": "2023-08-28T12:15:09", + "modified": "2025-02-19T03:32:40.929256", + "details": "Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, which allows attackers to execute a man-in-the-middle attack via intercepted and crafted responses.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/bishopfox/sliver", + "cwes": [], + "commits": [ + "af46878f8520c0c65bbb1e80d813a9658ba09188" + ] + }, + { + "id": "CVE-2025-27090", + "published": "2025-02-19T22:15:24", + "modified": "2025-02-20T08:55:24.871543", + "details": "Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on the sliver teamserver without verifying if the operator instructed the implant to do so. The only impact that has been shown is the exposure of the server's IP address to a third party. This issue has been addressed in version 1.5.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "repo_url": "https://github.com/bishopfox/sliver", + "cwes": [], + "commits": [ + "af46878f8520c0c65bbb1e80d813a9658ba09188" + ] + }, + { + "id": "CVE-2017-1000070", + "published": "2017-07-17T13:18:18", + "modified": "2025-01-14T06:55:52.695042", + "details": "The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/bitly/oauth2_proxy", + "cwes": [], + "commits": [ + "a66f7c50eac53b23d10657b64cc133364d452aea" + ] + }, + { + "id": "CVE-2017-1000069", + "published": "2017-07-17T13:18:18", + "modified": "2025-01-14T06:55:50.797193", + "details": "CSRF in Bitly oauth2_proxy 2.1 during authentication flow", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/bitly/oauth2_proxy", + "cwes": [], + "commits": [ + "a66f7c50eac53b23d10657b64cc133364d452aea" + ] + }, + { + "id": "CVE-2023-0247", + "published": "2023-01-12T17:15:09", + "modified": "2025-01-15T04:37:01.639377", + "details": "Uncontrolled Search Path Element in GitHub repository bits-and-blooms/bloom prior to 3.3.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/bits-and-blooms/bloom", + "cwes": [], + "commits": [ + "cb9965b1435d69b572099401455a1308db0478da" + ] + }, + { + "id": "CVE-2022-0071", + "published": "2022-04-19T23:15:13", + "modified": "2025-01-14T09:08:47.336879", + "details": "Incomplete fix for CVE-2021-3101. Hotdog, prior to v1.0.2, did not mimic the resource limits, device restrictions, or syscall filters of the target JVM process. This would allow a container to exhaust the resources of the host, modify devices, or make syscalls that would otherwise be blocked.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/bottlerocket-os/hotdog", + "cwes": [], + "commits": [ + "c32a7572e104d88e96ce2e6fbfb168387d289c80" + ] + }, + { + "id": "CVE-2021-3101", + "published": "2022-04-19T23:15:13", + "modified": "2025-01-14T09:12:06.532801", + "details": "Hotdog, prior to v1.0.1, did not mimic the capabilities or the SELinux label of the target JVM process. This would allow a container to gain full privileges on the host, bypassing restrictions set on the container.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/bottlerocket-os/hotdog", + "cwes": [], + "commits": [ + "c32a7572e104d88e96ce2e6fbfb168387d289c80" + ] + }, + { + "id": "CVE-2022-39304", + "published": "2022-12-20T20:15:10", + "modified": "2025-01-15T02:34:49.227573", + "details": "ghinstallation provides transport, which implements http.RoundTripper to provide authentication as an installation for GitHub Apps. In ghinstallation version 1, when the request to refresh an installation token failed, the HTTP request and response would be returned for debugging. The request contained the bearer JWT for the App, and was returned back to clients. This token is short lived (10 minute maximum). This issue has been patched and is available in version 2.0.0.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/bradleyfalzon/ghinstallation", + "cwes": [], + "commits": [ + "24e56b3fb7669f209134a01eff731d7e2ef72a5c" + ] + }, + { + "id": "CVE-2019-3818", + "published": "2019-02-05T17:29:00", + "modified": "2025-01-14T08:00:54.419204", + "details": "The kube-rbac-proxy container before version 0.4.1 as used in Red Hat OpenShift Container Platform does not honor TLS configurations, allowing for use of insecure ciphers and TLS 1.0. An attacker could target traffic sent over a TLS connection with a weak configuration and potentially break the encryption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/brancz/kube-rbac-proxy", + "cwes": [], + "commits": [ + "7d54c310ddf7f07a29745eec0665f46977236d0a" + ] + }, + { + "id": "CVE-2022-39219", + "published": "2022-09-26T14:15:10", + "modified": "2025-01-14T11:06:27.388199", + "details": "Bifrost is a middleware package which can synchronize MySQL/MariaDB binlog data to other types of databases. Versions 1.8.6-release and prior are vulnerable to authentication bypass when using HTTP basic authentication. This may allow group members who only have read permissions to write requests when they are normally forbidden from doing so. Version 1.8.7-release contains a patch. There are currently no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/brokercap/bifrost", + "cwes": [], + "commits": [ + "73956dbc64c2c2f068a56b5b5f0ba57df60ad5a3" + ] + }, + { + "id": "CVE-2022-39267", + "published": "2022-10-19T13:15:08", + "modified": "2025-01-14T11:06:46.217358", + "details": "Bifrost is a heterogeneous middleware that synchronizes MySQL, MariaDB to Redis, MongoDB, ClickHouse, MySQL and other services for production environments. Versions prior to 1.8.8-release are subject to authentication bypass in the admin and monitor user groups by deleting the X-Requested-With: XMLHttpRequest field in the request header. This issue has been patched in 1.8.8-release. There are no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/brokercap/bifrost", + "cwes": [], + "commits": [ + "73956dbc64c2c2f068a56b5b5f0ba57df60ad5a3" + ] + }, + { + "id": "CVE-2024-34478", + "published": "2024-05-05T01:15:06", + "modified": "2025-02-19T03:36:21.730303", + "details": "btcd before 0.24.0 does not correctly implement the consensus rules outlined in BIP 68 and BIP 112, making it susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds.", + "repo_url": "https://github.com/btcsuite/btcd", + "cwes": [], + "commits": [ + "0f49e1000633b0af6d7bbef97d69671f4c99e37e" + ] + }, + { + "id": "CVE-2024-38365", + "published": "2024-10-11T20:15:04", + "modified": "2024-10-15T19:12:16.022529", + "details": "btcd is an alternative full node bitcoin implementation written in Go (golang). The btcd Bitcoin client (versions 0.10 to 0.24) did not correctly re-implement Bitcoin Core's \"FindAndDelete()\" functionality. This logic is consensus-critical: the difference in behavior with the other Bitcoin clients can lead to btcd clients accepting an invalid Bitcoin block (or rejecting a valid one). This consensus failure can be leveraged to cause a chain split (accepting an invalid Bitcoin block) or be exploited to DoS the btcd nodes (rejecting a valid Bitcoin block). An attacker can create a standard transaction where FindAndDelete doesn't return a match but removeOpCodeByData does making btcd get a different sighash, leading to a chain split. Importantly, this vulnerability can be exploited remotely by any Bitcoin user and does not require any hash power. This is because the difference in behavior can be triggered by a \"standard\" Bitcoin transaction, that is a transaction which gets relayed through the P2P network before it gets included in a Bitcoin block. `removeOpcodeByData(script []byte, dataToRemove []byte)` removes any data pushes from `script` that contain `dataToRemove`. However, `FindAndDelete` only removes exact matches. So for example, with `script = \" \"` and `dataToRemove = \"data\"` btcd will remove both data pushes but Bitcoin Core's `FindAndDelete` only removes the first `` push. This has been patched in btcd version v0.24.2. Users are advised to upgrade. There are no known workarounds for this issue.", + "repo_url": "https://github.com/btcsuite/btcd", + "cwes": [], + "commits": [ + "0f49e1000633b0af6d7bbef97d69671f4c99e37e" + ] + }, + { + "id": "CVE-2022-39389", + "published": "2022-11-17T22:15:10", + "modified": "2025-02-19T03:29:46.028671", + "details": "Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "repo_url": "https://github.com/btcsuite/btcd", + "cwes": [], + "commits": [ + "0f49e1000633b0af6d7bbef97d69671f4c99e37e" + ] + }, + { + "id": "CVE-2022-44797", + "published": "2022-11-07T04:15:09", + "modified": "2025-02-19T03:28:39.125753", + "details": "btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/btcsuite/btcd", + "cwes": [], + "commits": [ + "0f49e1000633b0af6d7bbef97d69671f4c99e37e" + ] + }, + { + "id": "CVE-2024-25431", + "published": "2024-11-08T17:15:06", + "modified": "2024-11-15T07:49:49.226253", + "details": "An issue in bytecodealliance wasm-micro-runtime before v.b3f728c and fixed in commit 06df58f allows a remote attacker to escalate privileges via a crafted file to the check_was_abi_compatibility function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/bytecodealliance/wasm-micro-runtime", + "cwes": [], + "commits": [ + "fa2f29fd8ab3f72e3efb551d19cb6b214ead91f8" + ] + }, + { + "id": "CVE-2023-48105", + "published": "2023-11-22T23:15:10", + "modified": "2025-01-14T12:04:38.565455", + "details": "An heap overflow vulnerability was discovered in Bytecode alliance wasm-micro-runtime v.1.2.3 allows a remote attacker to cause a denial of service via the wasm_loader_prepare_bytecode function in core/iwasm/interpreter/wasm_loader.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/bytecodealliance/wasm-micro-runtime", + "cwes": [], + "commits": [ + "fa2f29fd8ab3f72e3efb551d19cb6b214ead91f8" + ] + }, + { + "id": "CVE-2023-52284", + "published": "2023-12-31T06:15:08", + "modified": "2025-01-14T12:07:45.733151", + "details": "Bytecode Alliance wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) before 1.3.0 can have an \"double free or corruption\" error for a valid WebAssembly module because push_pop_frame_ref_offset is mishandled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/bytecodealliance/wasm-micro-runtime", + "cwes": [], + "commits": [ + "fa2f29fd8ab3f72e3efb551d19cb6b214ead91f8" + ] + }, + { + "id": "CVE-2019-18923", + "published": "2019-11-13T22:15:12", + "modified": "2025-01-14T07:52:10.209343", + "details": "Insufficient content type validation of proxied resources in go-camo before 2.1.1 allows a remote attacker to serve arbitrary content from go-camo's origin.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cactus/go-camo", + "cwes": [], + "commits": [ + "8e89977547051a4e2f28a2c8aece9ac020423289" + ] + }, + { + "id": "CVE-2019-14255", + "published": "2019-08-08T13:15:12", + "modified": "2025-01-14T07:46:14.435591", + "details": "A Server Side Request Forgery (SSRF) vulnerability in go-camo up to version 1.1.4 allows a remote attacker to perform HTTP requests to internal endpoints.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cactus/go-camo", + "cwes": [], + "commits": [ + "8e89977547051a4e2f28a2c8aece9ac020423289" + ] + }, + { + "id": "CVE-2022-1883", + "published": "2022-05-25T09:15:08", + "modified": "2025-01-15T02:13:38.742811", + "details": "SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/camptocamp/terraboard", + "cwes": [], + "commits": [ + "06ff551cf5ba489bd52712b8f02d98e7add86e26" + ] + }, + { + "id": "CVE-2016-1582", + "published": "2016-06-09T16:59:03", + "modified": "2025-01-14T06:22:48.486353", + "details": "LXD before 2.0.2 does not properly set permissions when switching an unprivileged container into privileged mode, which allows local users to access arbitrary world readable paths in the container directory via unspecified vectors.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/canonical/lxd", + "cwes": [], + "commits": [ + "7d65940b33f106b7baecb64e7bb19509db5cfd0b" + ] + }, + { + "id": "CVE-2016-1581", + "published": "2016-06-09T16:59:01", + "modified": "2025-01-14T06:22:48.365114", + "details": "LXD before 2.0.2 uses world-readable permissions for /var/lib/lxd/zfs.img when setting up a loop based ZFS pool, which allows local users to copy and read data from arbitrary containers via unspecified vectors.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/canonical/lxd", + "cwes": [], + "commits": [ + "7d65940b33f106b7baecb64e7bb19509db5cfd0b" + ] + }, + { + "id": "CVE-2024-3250", + "published": "2024-04-04T15:15:39", + "modified": "2025-02-19T02:50:39.690616", + "details": "It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.", + "repo_url": "https://github.com/canonical/pebble", + "cwes": [], + "commits": [ + "a84efd8950d50e1e7f90952700e8e8ac6b57b32f" + ] + }, + { + "id": "CVE-2024-6714", + "published": "2024-07-23T16:15:06", + "modified": "2025-01-15T05:17:10.748297", + "details": "An issue was discovered in provd before version 0.1.5 with a setuid binary, which allows a local attacker to escalate their privilege.", + "repo_url": "https://github.com/canonical/ubuntu-desktop-provision", + "cwes": [], + "commits": [ + "cce89bc3f5c32441adc632d43595aac511e7942c" + ] + }, + { + "id": "CVE-2023-4564", + "published": "2023-10-03T16:15:10", + "modified": "2025-01-14T12:02:11.110676", + "details": "This vulnerability could allow an attacker to store a malicious JavaScript payload in the broadcast message parameter within the admin panel.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/capensis/canopsis", + "cwes": [], + "commits": [ + "7cd81a363e98107a6fc6c660fa52f2cfdbeb6348" + ] + }, + { + "id": "CVE-2023-3196", + "published": "2023-10-03T16:15:10", + "modified": "2025-01-14T10:43:22.740762", + "details": "This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/capensis/canopsis", + "cwes": [], + "commits": [ + "7cd81a363e98107a6fc6c660fa52f2cfdbeb6348" + ] + }, + { + "id": "CVE-2024-41264", + "published": "2024-08-01T16:15:06", + "modified": "2025-02-19T03:38:18.699679", + "details": "An issue discovered in casdoor v1.636.0 allows attackers to obtain sensitive information via the ssh.InsecureIgnoreHostKey() method.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/casdoor/casdoor", + "cwes": [], + "commits": [ + "051752340d21470db4020b9cf1b46fa50ae908a9" + ] + }, + { + "id": "CVE-2023-34927", + "published": "2023-06-22T13:15:10", + "modified": "2025-02-19T03:32:33.166889", + "details": "Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/casdoor/casdoor", + "cwes": [], + "commits": [ + "051752340d21470db4020b9cf1b46fa50ae908a9" + ] + }, + { + "id": "CVE-2022-24124", + "published": "2022-01-29T23:15:07", + "modified": "2025-02-19T03:24:06.578752", + "details": "The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/casdoor/casdoor", + "cwes": [], + "commits": [ + "051752340d21470db4020b9cf1b46fa50ae908a9" + ] + }, + { + "id": "CVE-2022-38638", + "published": "2022-09-09T20:15:11", + "modified": "2025-02-19T03:29:34.951657", + "details": "Casdoor v1.97.3 was discovered to contain an arbitrary file write vulnerability via the fullFilePath parameter at /api/upload-resource.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/casdoor/casdoor", + "cwes": [], + "commits": [ + "051752340d21470db4020b9cf1b46fa50ae908a9" + ] + }, + { + "id": "CVE-2022-44942", + "published": "2022-12-07T02:15:09", + "modified": "2025-02-19T03:28:32.825984", + "details": "Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the uploadFile function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/casdoor/casdoor", + "cwes": [], + "commits": [ + "051752340d21470db4020b9cf1b46fa50ae908a9" + ] + }, + { + "id": "CVE-2021-3810", + "published": "2021-09-17T07:15:09", + "modified": "2025-02-19T03:20:44.428620", + "details": "code-server is vulnerable to Inefficient Regular Expression Complexity", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cdr/code-server", + "cwes": [], + "commits": [ + "911af4075f111f5c47700fbc731978bb65941a56" + ] + }, + { + "id": "CVE-2021-42648", + "published": "2022-05-11T18:15:23", + "modified": "2025-02-19T03:21:42.540149", + "details": "Cross-site scripting (XSS) vulnerability exists in Coder Code-Server before 3.12.0, allows attackers to execute arbitrary code via crafted URL.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cdr/code-server", + "cwes": [], + "commits": [ + "911af4075f111f5c47700fbc731978bb65941a56" + ] + }, + { + "id": "CVE-2024-34713", + "published": "2024-05-14T16:17:27", + "modified": "2025-01-15T05:13:56.450239", + "details": "sshproxy is used on a gateway to transparently proxy a user SSH connection on the gateway to an internal host via SSH. Prior to version 1.6.3, any user authorized to connect to a ssh server using `sshproxy` can inject options to the `ssh` command executed by `sshproxy`. All versions of `sshproxy` are impacted. The problem is patched starting in version 1.6.3. The only workaround is to use the `force_command` option in `sshproxy.yaml`, but it's rarely relevant.", + "repo_url": "https://github.com/cea-hpc/sshproxy", + "cwes": [], + "commits": [ + "62fc70e40562c0e70573661ec686b0e28098b008" + ] + }, + { + "id": "CVE-2023-49552", + "published": "2024-01-02T23:15:12", + "modified": "2025-01-14T12:06:13.201034", + "details": "An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-49551", + "published": "2024-01-02T23:15:12", + "modified": "2025-01-14T12:06:12.722016", + "details": "An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-49553", + "published": "2024-01-02T23:15:12", + "modified": "2025-01-14T12:06:12.443972", + "details": "An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-49549", + "published": "2024-01-02T23:15:12", + "modified": "2025-01-14T12:06:12.968714", + "details": "An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-49550", + "published": "2024-01-02T23:15:12", + "modified": "2025-01-14T12:06:13.126070", + "details": "An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs+0x4ec508 component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-29571", + "published": "2023-04-12T15:15:13", + "modified": "2025-02-08T04:45:36.081929", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-29569", + "published": "2023-04-14T12:15:07", + "modified": "2025-02-06T23:51:37.819278", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-29570", + "published": "2023-04-24T14:15:07", + "modified": "2025-02-04T19:58:40.062361", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-43338", + "published": "2023-09-23T00:15:20", + "modified": "2025-01-14T11:59:38.882048", + "details": "Cesanta mjs v2.20.0 was discovered to contain a function pointer hijacking vulnerability via the function mjs_get_ptr(). This vulnerability allows attackers to execute arbitrary code via a crafted input.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-36535", + "published": "2023-02-03T18:15:10", + "modified": "2025-01-14T09:24:26.467412", + "details": "Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-30088", + "published": "2023-05-09T16:15:14", + "modified": "2025-01-29T23:49:59.514502", + "details": "An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2023-30087", + "published": "2023-05-09T16:15:14", + "modified": "2025-01-29T17:48:32.790935", + "details": "Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36368", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:06.320227", + "details": "Stack overflow vulnerability in parse_statement Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-18392", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:35:51.471897", + "details": "Stack overflow vulnerability in parse_array Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [ + "CWE-674" + ], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36369", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:06.469668", + "details": "Stack overflow vulnerability in parse_statement_list Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36370", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:07.285555", + "details": "Stack overflow vulnerability in parse_unary Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36366", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:04.317262", + "details": "Stack overflow vulnerability in parse_value Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36374", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:06.944035", + "details": "Stack overflow vulnerability in parse_comparison Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36371", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:06.582180", + "details": "Stack overflow vulnerability in parse_mul_div_rem Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36373", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:07.447961", + "details": "Stack overflow vulnerability in parse_shifts Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36372", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:06.523732", + "details": "Stack overflow vulnerability in parse_plus_minus Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36367", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:06.473243", + "details": "Stack overflow vulnerability in parse_block Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2020-36375", + "published": "2021-05-28T21:15:08", + "modified": "2025-01-14T08:46:07.272948", + "details": "Stack overflow vulnerability in parse_equality Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46509", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:47.994826", + "details": "Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46525", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.495290", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46516", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:49.452999", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46553", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:53.664123", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_set_internal at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46545", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:53.797432", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x4b44b. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46548", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:53.555439", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via add_lineno_map_item at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46511", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:48.753651", + "details": "There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46554", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:54.064034", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_json_stringify at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46537", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:52.029837", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x9a30e. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46543", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:53.476011", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e810. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46541", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:52.669086", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c6ae. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46556", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:54.619540", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_bcode_insert_offset at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46523", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.671013", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46517", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:49.908780", + "details": "There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46522", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.789659", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46538", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:51.468364", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_compact_strings at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46529", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:51.362836", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46513", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:47.575879", + "details": "Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46520", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:50.488639", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46535", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:52.415032", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0xe533e. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46508", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:48.791111", + "details": "There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46542", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:51.578534", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46518", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:49.062052", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46547", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:54.110505", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c17e. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46528", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.908319", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46532", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:51.831241", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via exec_expr at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46531", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:52.405588", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8d28e. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46521", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:50.666617", + "details": "Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46544", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:53.525757", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x59e19. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46510", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:47.750865", + "details": "There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46512", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:49.248891", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46519", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:50.426951", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46514", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:49.729863", + "details": "There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46534", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:53.345315", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46527", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.402187", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46526", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.750087", + "details": "Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46539", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:52.558798", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x45a1f. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46540", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:51.621175", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_get_mjs at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46550", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:53.750223", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via free_json_frame at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46546", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:53.266898", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_next at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46549", + "published": "2022-01-27T21:15:11", + "modified": "2025-01-14T10:04:53.426978", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via parse_cval_type at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46530", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:53.436235", + "details": "Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_execute at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46515", + "published": "2022-01-27T21:15:09", + "modified": "2025-01-14T10:04:49.700449", + "details": "There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-46524", + "published": "2022-01-27T21:15:10", + "modified": "2025-01-14T10:04:50.806146", + "details": "Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33443", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:39.653537", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in mjs_execute() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33446", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:36.831095", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33437", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:32.677083", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There are memory leaks in frozen_cb() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33440", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:34.133447", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_commit() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33449", + "published": "2022-07-26T13:15:09", + "modified": "2025-01-14T09:16:38.187810", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33439", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:31.700220", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33442", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:39.493621", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in json_printf() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33448", + "published": "2022-07-26T13:15:09", + "modified": "2025-01-14T09:16:39.422434", + "details": "An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33445", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:36.469441", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33444", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:38.308559", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33441", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:35.496020", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in exec_expr() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33447", + "published": "2022-07-26T13:15:09", + "modified": "2025-01-14T09:16:37.934389", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2021-33438", + "published": "2022-07-26T13:15:08", + "modified": "2025-01-14T09:16:35.471264", + "details": "An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow in json_parse_array() in mjs.c.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cesanta/mjs", + "cwes": [], + "commits": [ + "2827bd00b59bdc176a010b22fc4acde9b580d6c2" + ] + }, + { + "id": "CVE-2024-36127", + "published": "2024-06-03T15:15:09", + "modified": "2025-01-15T05:14:12.640349", + "details": "apko is an apk-based OCI image builder. apko exposures HTTP basic auth credentials from repository and keyring URLs in log output. This vulnerability is fixed in v0.14.5.", + "repo_url": "https://github.com/chainguard-dev/apko", + "cwes": [], + "commits": [ + "1781b2d946ac3b37647d87f28ab6c47a81d705a7" + ] + }, + { + "id": "CVE-2017-16762", + "published": "2017-11-10T09:29:00", + "modified": "2025-01-14T07:07:47.791182", + "details": "Sanic before 0.5.1 allows reading arbitrary files with directory traversal, as demonstrated by the /static/..%2f substring.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/channelcat/sanic", + "cwes": [], + "commits": [ + "e5fdc7fdd08a29bab1f63f73816028033fdafdc3" + ] + }, + { + "id": "CVE-2023-47105", + "published": "2024-09-18T17:15:18", + "modified": "2024-10-08T03:54:33.554557", + "details": "exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.", + "repo_url": "https://github.com/chaosblade-io/chaosblade", + "cwes": [], + "commits": [ + "176699f18bff9e4afdf43e8fb31d9dd79907ef5d" + ] + }, + { + "id": "CVE-2022-29180", + "published": "2022-05-07T04:15:09", + "modified": "2025-01-15T02:19:59.266976", + "details": "A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ### Additional notes * Encrypted user data uploaded to the Charm server is safe as Charm servers cannot decrypt user data. This includes filenames, paths, and all key-value data. * Users running the official Charm [Docker images](https://github.com/charmbracelet/charm/blob/main/docker.md) are at minimal risk because the exploit is limited to the containerized filesystem.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/charmbracelet/charm", + "cwes": [], + "commits": [ + "b7d991650ccde9b7d0e466c2aa2966b724217e23" + ] + }, + { + "id": "CVE-2024-41956", + "published": "2024-08-01T22:15:29", + "modified": "2024-10-08T04:20:32.560687", + "details": "Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve passes all environment variables given by the client to git subprocesses. This includes environment variables that control program execution, such as LD_PRELOAD. This vulnerability is fixed in 0.7.5.", + "repo_url": "https://github.com/charmbracelet/soft-serve", + "cwes": [], + "commits": [ + "9021825f7be1015bb278ce4df4d464830be9c6e7" + ] + }, + { + "id": "CVE-2023-43809", + "published": "2023-10-04T21:15:10", + "modified": "2025-01-15T04:58:37.841405", + "details": "Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve. Users should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue. To workaround this vulnerability without upgrading, users can temporarily disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/charmbracelet/soft-serve", + "cwes": [], + "commits": [ + "9021825f7be1015bb278ce4df4d464830be9c6e7" + ] + }, + { + "id": "CVE-2025-22130", + "published": "2025-01-08T16:15:38", + "modified": "2025-01-15T05:17:22.033575", + "details": "Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2.", + "repo_url": "https://github.com/charmbracelet/soft-serve", + "cwes": [], + "commits": [ + "9021825f7be1015bb278ce4df4d464830be9c6e7" + ] + }, + { + "id": "CVE-2023-40050", + "published": "2023-10-31T15:15:09", + "modified": "2025-01-14T11:54:43.847142", + "details": "Upload profile either\nthrough API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec\ncheck command with maliciously crafted profile allows remote code execution. \n\n\n\n\n\n\n\n\n\n\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/chef/automate", + "cwes": [], + "commits": [ + "98981657948fc0a85a0d72556c8a6d447ca143d4" + ] + }, + { + "id": "CVE-2023-28864", + "published": "2023-07-17T20:15:13", + "modified": "2025-01-14T11:38:59.452667", + "details": "Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the \"chef-server-ctl reconfigure\" command.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/chef/chef-server", + "cwes": [], + "commits": [ + "d55f1ceb0bc66348cbb3c50c16c9cf695e10a4a5" + ] + }, + { + "id": "CVE-2024-29862", + "published": "2024-03-21T04:15:09", + "modified": "2025-01-15T05:11:46.019332", + "details": "The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4.2.1 and chirpstack-gateway-bridge before 4.0.11 wrongly accepts certain TCP packets when a connection is not in the ESTABLISHED state.", + "repo_url": "https://github.com/chirpstack/chirpstack-gateway-bridge", + "cwes": [], + "commits": [ + "b5e6125844a89cf1ac11f639860aab6bbb0136f9" + ] + }, + { + "id": "CVE-2021-28954", + "published": "2021-03-21T05:15:13", + "modified": "2025-01-14T09:04:08.359530", + "details": "In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/chriswalz/bit", + "cwes": [], + "commits": [ + "83f458c7d5955f113e7546932640855c0d9c914b" + ] + }, + { + "id": "CVE-2023-28114", + "published": "2023-03-22T19:15:12", + "modified": "2025-01-15T04:49:32.013587", + "details": "`cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remote clusters. Users who have set up cluster meshes using the Cilium Helm chart are not affected by this issue.\n\nDue to an incorrect mount point specification, the settings specified by the `initContainer` that configures `etcd` users and their permissions are overwritten when using `cilium-cli` to configure a cluster mesh. An attacker who has already gained access to a valid key and certificate for an `etcd` cluster compromised in this manner could then modify state in that `etcd` cluster.\n\nThis issue is patched in `cilium-cli` 0.13.2. As a workaround, one may use Cilium's Helm charts to create their cluster.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/cilium/cilium-cli", + "cwes": [], + "commits": [ + "34db9d12626abb316341c19f03c034206cce44bb" + ] + }, + { + "id": "CVE-2023-46254", + "published": "2023-11-06T19:15:09", + "modified": "2025-01-15T04:59:49.817772", + "details": "capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenants `solar` and `wind`. Tenant `solar`, owned by a ServiceAccount named `tenant-owner` in the Namespace `solar`. Tenant `wind`, owned by a ServiceAccount named `tenant-owner` in the Namespace `wind`. The Tenant owner `solar` would be able to list the namespaces of the Tenant `wind` and vice-versa, although this is not correct. The bug introduces an exfiltration vulnerability since allows the listing of Namespace resources of other Tenants, although just in some specific conditions: 1. `capsule-proxy` runs with the `--disable-caching=false` (default value: `false`) and 2. Tenant owners are ServiceAccount, with the same resource name, but in different Namespaces. This vulnerability doesn't allow any privilege escalation on the outer tenant Namespace-scoped resources, since the Kubernetes RBAC is enforcing this. This issue has been addressed in version 0.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/clastix/capsule", + "cwes": [], + "commits": [ + "1bbaebbc90ac159cb54f3b89790cfd4017a31ccc" + ] + }, + { + "id": "CVE-2022-46167", + "published": "2022-12-02T19:15:11", + "modified": "2025-01-15T04:05:54.845221", + "details": "Capsule is a multi-tenancy and policy-based framework for Kubernetes. Prior to version 0.1.3, a ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing all the enforcement like Pod Security annotations, Network Policies, Limit Range and Resource Quota items. An attacker could detach the Namespace from a Tenant that is forbidding starting privileged Pods using the Pod Security labels by removing the OwnerReference, removing the enforcement labels, and being able to start privileged containers that would be able to start a generic Kubernetes privilege escalation. Patches have been released for version 0.1.3. No known workarounds are available.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/clastix/capsule", + "cwes": [], + "commits": [ + "1bbaebbc90ac159cb54f3b89790cfd4017a31ccc" + ] + }, + { + "id": "CVE-2023-48312", + "published": "2023-11-24T18:15:07", + "modified": "2025-01-15T05:01:26.658337", + "details": "capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/clastix/capsule-proxy", + "cwes": [], + "commits": [ + "55a1cb1e56c1cc02f674223011fc86f599db34bc" + ] + }, + { + "id": "CVE-2022-23652", + "published": "2022-02-22T20:15:07", + "modified": "2025-01-15T02:16:39.050911", + "details": "capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/clastix/capsule-proxy", + "cwes": [], + "commits": [ + "55a1cb1e56c1cc02f674223011fc86f599db34bc" + ] + }, + { + "id": "CVE-2024-42480", + "published": "2024-08-12T16:15:15", + "modified": "2024-10-08T04:21:05.170693", + "details": "Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an \"open at the top\" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/clastix/kamaji", + "cwes": [], + "commits": [ + "d4d38c8eafef0879366dbd6240347ab627c5945a" + ] + }, + { + "id": "CVE-2022-26315", + "published": "2022-02-28T19:15:12", + "modified": "2025-01-14T10:53:05.815856", + "details": "qrcp through 0.8.4, in receive mode, allows ../ Directory Traversal via the file name specified by the uploader.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/claudiodangelis/qrcp", + "cwes": [], + "commits": [ + "b2293923e8acc33563c19604949628895998122b" + ] + }, + { + "id": "CVE-2021-41130", + "published": "2021-10-07T19:15:08", + "modified": "2025-01-15T02:04:11.625098", + "details": "Extensible Service Proxy, a.k.a. ESP is a proxy which enables API management capabilities for JSON/REST or gRPC API services. ESPv1 can be configured to authenticate a JWT token. Its verified JWT claim is passed to the application by HTTP header \"X-Endpoint-API-UserInfo\", the application can use it to do authorization. But if there are two \"X-Endpoint-API-UserInfo\" headers from the client, ESPv1 only replaces the first one, the 2nd one will be passed to the application. An attacker can send two \"X-Endpoint-API-UserInfo\" headers, the second one with a fake JWT claim. Application may use the fake JWT claim to do the authorization. This impacts following ESPv1 usages: 1) Users have configured ESPv1 to do JWT authentication with Google ID Token as described in the referenced google endpoint document. 2) Users backend application is using the info in the \"X-Endpoint-API-UserInfo\" header to do the authorization. It has been fixed by v1.58.0. You need to patch it in the following ways: * If your docker image is using tag \":1\", needs to re-start the container to pick up the new version. The tag \":1\" will automatically point to the latest version. * If your docker image tag pings to a specific minor version, e.g. \":1.57\". You need to update it to \":1.58\" and re-start the container. There are no workaround for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cloudendpoints/esp", + "cwes": [], + "commits": [ + "c5c579cf15600661c37fbac84388738c386e7615" + ] + }, + { + "id": "CVE-2021-29994", + "published": "2021-11-08T13:15:07", + "modified": "2025-01-14T09:08:01.366426", + "details": "Cloudera Hue 4.6.0 allows XSS.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cloudera/hue", + "cwes": [], + "commits": [ + "5326efbf509f39da41cf568fbaccb0fe2586d461" + ] + }, + { + "id": "CVE-2021-32481", + "published": "2021-11-08T13:15:07", + "modified": "2025-01-14T09:14:24.390787", + "details": "Cloudera Hue 4.6.0 allows XSS via the type parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cloudera/hue", + "cwes": [], + "commits": [ + "5326efbf509f39da41cf568fbaccb0fe2586d461" + ] + }, + { + "id": "CVE-2016-4946", + "published": "2017-03-07T16:59:00", + "modified": "2025-01-14T06:37:39.162436", + "details": "Multiple cross-site scripting (XSS) vulnerabilities in Cloudera HUE 3.9.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) First name or (2) Last name field in the HUE Users page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cloudera/hue", + "cwes": [], + "commits": [ + "5326efbf509f39da41cf568fbaccb0fe2586d461" + ] + }, + { + "id": "CVE-2016-4947", + "published": "2017-03-07T16:59:00", + "modified": "2025-01-14T06:37:44.752934", + "details": "Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to desktop/api/users/autocomplete.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudera/hue", + "cwes": [], + "commits": [ + "5326efbf509f39da41cf568fbaccb0fe2586d461" + ] + }, + { + "id": "CVE-2024-28110", + "published": "2024-03-06T22:15:57", + "modified": "2025-01-15T05:10:58.289573", + "details": "Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.", + "repo_url": "https://github.com/cloudevents/sdk-go", + "cwes": [], + "commits": [ + "67e389964131d55d65cd14b4eb32d57a47312695" + ] + }, + { + "id": "CVE-2023-1732", + "published": "2023-05-10T12:15:10", + "modified": "2025-01-14T11:21:10.343588", + "details": "When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read()\u00a0returns an error. In rare deployment cases (error thrown by the Read()\u00a0function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudflare/circl", + "cwes": [], + "commits": [ + "769d73f14c245a9a54a860640516c1b799a398d0" + ] + }, + { + "id": "CVE-2023-1314", + "published": "2023-03-21T12:15:10", + "modified": "2025-01-14T11:20:05.950598", + "details": "A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory.\n\nAn attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process.\n\nExploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised.\n\nThe cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudflare/cloudflared", + "cwes": [], + "commits": [ + "20466dacb7e8428df93e9c5da1096e54daa0cd1c" + ] + }, + { + "id": "CVE-2020-24356", + "published": "2020-10-02T15:15:12", + "modified": "2025-01-14T08:38:59.463916", + "details": "`cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudflare/cloudflared", + "cwes": [], + "commits": [ + "20466dacb7e8428df93e9c5da1096e54daa0cd1c" + ] + }, + { + "id": "CVE-2022-2529", + "published": "2022-09-30T11:15:09", + "modified": "2025-01-14T10:52:11.762169", + "details": "sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudflare/goflow", + "cwes": [], + "commits": [ + "835a8829e3f7ba96b33acf6d2ea1bac23644d1be" + ] + }, + { + "id": "CVE-2018-15800", + "published": "2018-12-10T19:29:25", + "modified": "2025-01-14T07:23:57.160431", + "details": "Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/bits-service-release", + "cwes": [], + "commits": [ + "11f66fb1ee9cc511c882a877df2f9678e7b1af86" + ] + }, + { + "id": "CVE-2019-3786", + "published": "2019-04-24T16:29:01", + "modified": "2025-01-14T07:59:44.967922", + "details": "Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/bosh-backup-and-restore", + "cwes": [], + "commits": [ + "d723a8704da53e848283aab44fce9757c1feb5c7" + ] + }, + { + "id": "CVE-2019-3782", + "published": "2019-02-13T16:29:00", + "modified": "2025-01-14T07:59:34.699502", + "details": "Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user with access to the CredHub CLI config file can use these credentials to retrieve and modify credentials stored in CredHub that are authorized to the targeted user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/credhub-cli", + "cwes": [], + "commits": [ + "bfbb05b8c9539c80929b2d14a453c33b7f6f466b" + ] + }, + { + "id": "CVE-2019-3779", + "published": "2019-03-08T16:29:00", + "modified": "2025-02-19T02:58:20.963754", + "details": "Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/kubo-release", + "cwes": [], + "commits": [ + "413988c8a75a64ed2482d1c58666a1970284b6c4" + ] + }, + { + "id": "CVE-2019-3780", + "published": "2019-03-08T16:29:00", + "modified": "2025-02-19T02:58:05.127668", + "details": "Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/kubo-release", + "cwes": [], + "commits": [ + "413988c8a75a64ed2482d1c58666a1970284b6c4" + ] + }, + { + "id": "CVE-2019-3783", + "published": "2019-03-07T18:29:00", + "modified": "2025-01-14T07:59:49.815456", + "details": "Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/stratos", + "cwes": [], + "commits": [ + "b4fa724ebe0e1eea8178686d03ab1f013dd9f94c" + ] + }, + { + "id": "CVE-2019-3784", + "published": "2019-03-07T18:29:00", + "modified": "2025-01-14T07:59:50.055828", + "details": "Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry-incubator/stratos", + "cwes": [], + "commits": [ + "b4fa724ebe0e1eea8178686d03ab1f013dd9f94c" + ] + }, + { + "id": "CVE-2018-1231", + "published": "2018-03-27T16:29:00", + "modified": "2025-01-14T07:22:15.395312", + "details": "Cloud Foundry BOSH CLI, versions prior to v3.0.1, contains an improper access control vulnerability. A user with access to an instance using the BOSH CLI can access the BOSH CLI configuration file and use its contents to perform authenticated requests to BOSH.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/bosh-cli", + "cwes": [], + "commits": [ + "e94aeebdeed26c840d96c33a02126f523d7b226a" + ] + }, + { + "id": "CVE-2020-5422", + "published": "2020-10-02T17:15:12", + "modified": "2025-01-14T08:47:34.909098", + "details": "BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/bosh-system-metrics-server-release", + "cwes": [], + "commits": [ + "18f6dc0a995c90af3daad2070902280adf925894" + ] + }, + { + "id": "CVE-2023-34061", + "published": "2024-01-12T07:15:11", + "modified": "2025-02-19T03:33:43.964602", + "details": "Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.\n\n\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b", + "1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d", + "36c1ff1a3fc4175c910aed00d423ea2edf457603" + ] + }, + { + "id": "CVE-2024-22279", + "published": "2024-06-10T20:15:12", + "modified": "2025-02-19T03:37:00.610180", + "details": "Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade\n the service availability of the Cloud Foundry deployment if performed at scale.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "e4caeeffdbc19d9db0e4eb10a5e109acf1017fe5" + ] + }, + { + "id": "CVE-2023-34041", + "published": "2023-09-08T08:15:07", + "modified": "2025-02-19T03:33:43.527965", + "details": "Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b", + "1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d", + "36c1ff1a3fc4175c910aed00d423ea2edf457603" + ] + }, + { + "id": "CVE-2022-31733", + "published": "2023-02-03T19:15:11", + "modified": "2025-02-19T02:37:56.668313", + "details": "Starting with diego-release 2.55.0 and up to 2.69.0, and starting with CF Deployment 17.1 and up to 23.2.0, apps are accessible via another port on diego cells, allowing application ingress without a client certificate. If mTLS route integrity is enabled AND unproxied ports are turned off, then an attacker could connect to an application that should be only reachable via mTLS, without presenting a client certificate.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "36c1ff1a3fc4175c910aed00d423ea2edf457603" + ] + }, + { + "id": "CVE-2023-20882", + "published": "2023-05-26T17:15:13", + "modified": "2025-02-19T03:29:05.609843", + "details": "In Cloud foundry routing release versions from 0.262.0 and prior to 0.266.0,a bug in the gorouter process can lead to a denial of service of applications hosted on Cloud Foundry. Under the right circumstances, when client connections are closed prematurely, gorouter marks the currently selected backend as failed and removes it from the routing pool.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "1ef1fcda375fca5d7dc0cbbb9ba3d5de31efa83d" + ] + }, + { + "id": "CVE-2021-22001", + "published": "2021-07-22T14:15:07", + "modified": "2025-02-19T03:15:22.895405", + "details": "In UAA versions prior to 75.3.0, sensitive information like relaying secret of the provider was revealed in response when deletion request of an identity provider( IdP) of type \u201coauth 1.0\u201d was sent to UAA server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2021-22098", + "published": "2021-08-11T21:15:08", + "modified": "2025-02-19T03:15:21.744192", + "details": "UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victims\u2019 accounts in certain cases along with redirection of UAA users to a malicious sites.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-3801", + "published": "2019-04-25T21:29:00", + "modified": "2025-01-14T08:00:00.865658", + "details": "Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11290", + "published": "2019-11-26T00:15:11", + "modified": "2025-02-19T02:44:28.247619", + "details": "Cloud Foundry UAA Release, versions prior to v74.8.0, logs all query parameters to tomcat\u2019s access file. If the query parameters are used to provide authentication, ie. credentials, then they will be logged as well.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11289", + "published": "2019-11-19T19:15:23", + "modified": "2025-01-14T07:43:52.318446", + "details": "Cloud Foundry Routing, all versions before 0.193.0, does not properly validate nonce input. A remote unauthenticated malicious user could forge an HTTP route service request using an invalid nonce that will cause the Gorouter to crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11277", + "published": "2019-09-23T18:15:11", + "modified": "2025-02-19T02:44:03.166706", + "details": "Cloud Foundry NFS Volume Service, 1.7.x versions prior to 1.7.11 and 2.x versions prior to 2.3.0, is vulnerable to LDAP injection. A remote authenticated malicious space developer can potentially inject LDAP filters via service instance creation, facilitating the malicious space developer to deny service or perform a dictionary attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11282", + "published": "2019-10-23T16:15:11", + "modified": "2025-01-14T07:44:06.822388", + "details": "Cloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11283", + "published": "2019-10-23T16:15:11", + "modified": "2025-01-14T07:43:46.812881", + "details": "Cloud Foundry SMB Volume, versions prior to v2.0.3, accidentally outputs sensitive information to the logs. A remote user with access to the SMB Volume logs can discover the username and password for volumes that have been recently created, allowing the user to take control of the SMB Volume.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11294", + "published": "2019-12-19T20:15:12", + "modified": "2025-01-14T07:43:48.543741", + "details": "Cloud Foundry Cloud Controller API (CAPI), version 1.88.0, allows space developers to list all global service brokers, including service broker URLs and GUIDs, which should only be accessible to admins.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2019-11293", + "published": "2019-12-06T20:15:09", + "modified": "2025-02-19T02:44:37.678465", + "details": "Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2018-1221", + "published": "2018-03-19T18:29:00", + "modified": "2025-02-19T02:29:45.038975", + "details": "In cf-deployment before 1.14.0 and routing-release before 0.172.0, the Cloud Foundry Gorouter mishandles WebSocket requests for AWS Application Load Balancers (ALBs) and some other HTTP-aware Load Balancers. A user with developer privileges could use this vulnerability to steal data or cause denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3" + ] + }, + { + "id": "CVE-2018-1191", + "published": "2018-03-29T20:29:00", + "modified": "2025-01-14T07:21:54.415557", + "details": "Cloud Foundry Garden-runC, versions prior to 1.11.0, contains an information exposure vulnerability. A user with access to Garden logs may be able to obtain leaked credentials and perform authenticated actions using those credentials.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3" + ] + }, + { + "id": "CVE-2018-1277", + "published": "2018-04-30T20:29:00", + "modified": "2025-02-19T02:30:01.241794", + "details": "Cloud Foundry Garden-runC, versions prior to 1.13.0, does not correctly enforce disc quotas for Docker image layers. A remote authenticated user may push an app with a malicious Docker image that will consume more space on a Diego cell than allocated in their quota, potentially causing a DoS against the cell.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3" + ] + }, + { + "id": "CVE-2018-1265", + "published": "2018-06-06T20:29:00", + "modified": "2025-02-19T02:30:08.691071", + "details": "Cloud Foundry Diego, release versions prior to 2.8.0, does not properly sanitize file paths in tar and zip files headers. A remote attacker with CF admin privileges can upload a malicious buildpack that will allow a complete takeover of a Diego Cell VM and access to all apps running on that Diego Cell.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2018-1262", + "published": "2018-05-15T20:29:00", + "modified": "2025-02-19T02:34:00.620678", + "details": "Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation. A zone administrator could configure their zone to issue tokens which impersonate another zone, granting up to admin privileges in the impersonated zone for clients performing offline token validation.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2018-1193", + "published": "2018-05-23T15:29:00", + "modified": "2025-02-19T02:29:41.187445", + "details": "Cloud Foundry routing-release, versions prior to 0.175.0, lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3" + ] + }, + { + "id": "CVE-2020-5416", + "published": "2020-08-21T22:15:12", + "modified": "2025-02-19T03:12:28.651733", + "details": "Cloud Foundry Routing (Gorouter), versions prior to 0.204.0, when used in a deployment with NGINX reverse proxies in front of the Gorouters, is potentially vulnerable to denial-of-service attacks in which an unauthenticated malicious attacker can send specially-crafted HTTP requests that may cause the Gorouters to be dropped from the NGINX backend pool.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2020-5420", + "published": "2020-09-03T01:15:10", + "modified": "2025-02-19T03:12:23.583960", + "details": "Cloud Foundry Routing (Gorouter) versions prior to 0.206.0 allow a malicious developer with \"cf push\" access to cause denial-of-service to the CF cluster by pushing an app that returns specially crafted HTTP responses that crash the Gorouters.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2020-5402", + "published": "2020-02-27T20:15:11", + "modified": "2025-02-19T03:12:32.673469", + "details": "In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function when authenticating with external identity providers.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-deployment", + "cwes": [], + "commits": [ + "11822083b7d80dea7c1ff40e89812787c6d4fbe3", + "1bf516e1fffd86002d92d1d8c016d541c9d7a95b" + ] + }, + { + "id": "CVE-2016-6655", + "published": "2017-06-13T06:29:00", + "modified": "2025-01-14T06:44:31.171099", + "details": "An issue was discovered in Cloud Foundry Foundation Cloud Foundry release versions prior to v245 and cf-mysql-release versions prior to v31. A command injection vulnerability was discovered in a common script used by many Cloud Foundry components. A malicious user may exploit numerous vectors to execute arbitrary commands on servers running Cloud Foundry.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-mysql-release", + "cwes": [], + "commits": [ + "4a7df1cbeb2083b19a1b1537bbfc755deb515434" + ] + }, + { + "id": "CVE-2018-15755", + "published": "2018-10-12T22:15:07", + "modified": "2025-01-14T07:23:57.916428", + "details": "Cloud Foundry CF Networking Release, versions 2.11.0 prior to 2.16.0, contain an internal api endpoint vulnerable to SQL injection between Diego cells and the policy server. A remote authenticated malicious user with mTLS certs can issue arbitrary SQL queries and gain access to the policy server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cf-networking-release", + "cwes": [], + "commits": [ + "97edbbcb0d60390918ce61c7378a9e77329666b8" + ] + }, + { + "id": "CVE-2019-3781", + "published": "2019-03-07T18:29:00", + "modified": "2025-02-19T02:58:50.556105", + "details": "Cloud Foundry CLI, versions prior to v6.43.0, improperly exposes passwords when verbose/trace/debugging is turned on. A local unauthenticated or remote authenticated malicious user with access to logs may gain part or all of a users password.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/cli", + "cwes": [], + "commits": [ + "4947847c552d8aa967d3ad9ed720d74d42f674d3" + ] + }, + { + "id": "CVE-2018-11084", + "published": "2018-09-18T21:29:02", + "modified": "2025-02-19T02:28:34.716849", + "details": "Cloud Foundry Garden-runC release, versions prior to 1.16.1, prevents deletion of some app environments based on file attributes. A remote authenticated malicious user may create and delete apps with crafted file attributes to cause a denial of service for new app instances or scaling up of existing apps.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/garden-runc-release", + "cwes": [], + "commits": [ + "0e9adf1d37cd22507afff99a38b10bb413c5dd9b" + ] + }, + { + "id": "CVE-2017-14388", + "published": "2017-11-13T17:29:00", + "modified": "2025-02-19T02:23:57.754119", + "details": "Cloud Foundry Foundation GrootFS release 0.3.x versions prior to 0.30.0 do not validate DiffIDs, allowing specially crafted images to poison the grootfs volume cache. For example, this could allow an attacker to provide an image layer that GrootFS would consider to be the Ubuntu base layer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/grootfs", + "cwes": [], + "commits": [ + "00520d66bfb6a1546b372942f98695dbe9454d75" + ] + }, + { + "id": "CVE-2018-1268", + "published": "2018-06-06T20:29:00", + "modified": "2025-01-14T07:22:29.210854", + "details": "Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not validate app GUID structure in requests. A remote authenticated malicious user knowing the GUID of an app may construct malicious requests to read from or write to the logs of that app.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/cloudfoundry/loggregator-release", + "cwes": [], + "commits": [ + "423b6711d2a99577faf67f8bc4b8f307845cef36" + ] + }, + { + "id": "CVE-2018-1269", + "published": "2018-06-06T20:29:00", + "modified": "2025-01-14T07:22:29.338126", + "details": "Cloud Foundry Loggregator, versions 89.x prior to 89.5 or 96.x prior to 96.1 or 99.x prior to 99.1 or 101.x prior to 101.9 or 102.x prior to 102.2, does not handle errors thrown while constructing certain http requests. A remote authenticated user may construct malicious requests to cause the traffic controller to leave dangling TCP connections, which could cause denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/loggregator-release", + "cwes": [], + "commits": [ + "423b6711d2a99577faf67f8bc4b8f307845cef36" + ] + }, + { + "id": "CVE-2018-15797", + "published": "2018-12-05T18:29:00", + "modified": "2025-01-14T07:24:01.519112", + "details": "Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/nfs-volume-release", + "cwes": [], + "commits": [ + "dbbef2ef49432a1a66539e1aff2948ef8570d80c" + ] + }, + { + "id": "CVE-2018-1267", + "published": "2018-03-27T16:29:00", + "modified": "2025-01-14T07:22:28.937664", + "details": "Cloud Foundry Silk CNI plugin, versions prior to 0.2.0, contains an improper access control vulnerability. If the platform is configured with an application security group (ASG) that overlaps with the Silk overlay network, any applications can reach any other application on the network regardless of the configured routing policies.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cloudfoundry/silk-release", + "cwes": [], + "commits": [ + "bba5414efb0880288815d63524738b00e2374bad" + ] + }, + { + "id": "CVE-2022-40082", + "published": "2022-09-28T14:15:10", + "modified": "2025-01-14T11:09:32.041866", + "details": "Hertz v0.3.0 ws discovered to contain a path traversal vulnerability via the normalizePath function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cloudwego/hertz", + "cwes": [], + "commits": [ + "a83e52c84424955e27d70250924d0d2189e61fb0" + ] + }, + { + "id": "CVE-2023-30622", + "published": "2023-04-24T16:15:07", + "modified": "2025-02-19T03:31:43.219703", + "details": "Clusternet is a general-purpose system for controlling Kubernetes clusters across different environments. An issue in clusternet prior to version 0.15.2 can be leveraged to lead to a cluster-level privilege escalation. The clusternet has a deployment called `cluster-hub` inside the `clusternet-system` Kubernetes namespace, which runs on worker nodes randomly. The deployment has a service account called `clusternet-hub`, which has a cluster role called `clusternet:hub` via cluster role binding. The `clusternet:hub` cluster role has `\"*\" verbs of \"*.*\"` resources. Thus, if a malicious user can access the worker node which runs the clusternet, they can leverage the service account to do malicious actions to critical system resources. For example, the malicious user can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation. Version 0.15.2 contains a fix for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/clusternet/clusternet", + "cwes": [], + "commits": [ + "e156bf08264f425b0ff56b4047d6d0fc0db87c8a" + ] + }, + { + "id": "CVE-2022-40494", + "published": "2022-10-06T22:15:09", + "modified": "2025-02-19T03:29:47.804412", + "details": "NPS before v0.26.10 was discovered to contain an authentication bypass vulnerability via constantly generating and sending the Auth key and Timestamp parameters.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cnlh/nps", + "cwes": [], + "commits": [ + "18c11f108b149527ef069b9833ff683aeb2b8f52" + ] + }, + { + "id": "CVE-2019-15119", + "published": "2019-08-16T15:15:11", + "modified": "2025-02-19T02:48:13.365222", + "details": "lib/install/install.go in cnlh nps through 0.23.2 uses 0777 permissions for /usr/local/bin/nps and/or /usr/bin/nps, leading to a file overwrite by a local user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cnlh/nps", + "cwes": [], + "commits": [ + "18c11f108b149527ef069b9833ff683aeb2b8f52" + ] + }, + { + "id": "CVE-2024-47877", + "published": "2024-10-11T17:15:04", + "modified": "2025-01-14T12:17:15.493293", + "details": "Extract is aA Go library to extract archives in zip, tar.gz or tar.bz2 formats. A maliciously crafted archive may allow an attacker to create a symlink outside the extraction target directory. This vulnerability is fixed in 4.0.0. If you're using the Extractor.FS interface, then upgrading to /v4 will require to implement the new methods that have been added.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/codeclysm/extract", + "cwes": [], + "commits": [ + "07d6c3396bb2b57ec93b00c210ef35474dc786f7" + ] + }, + { + "id": "CVE-2022-36111", + "published": "2022-11-23T18:15:11", + "modified": "2025-01-14T11:04:09.822591", + "details": "immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/codenotary/immudb", + "cwes": [], + "commits": [ + "e512022c8157e77ef85ebb7f5b51d3f3c87ae6a2" + ] + }, + { + "id": "CVE-2022-39199", + "published": "2022-11-22T20:15:11", + "modified": "2025-01-14T11:06:27.539841", + "details": "immudb is a database with built-in cryptographic proof and verification. immudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the reported UUID tricking the client to treat it as a different server thus accepting a state completely irrelevant to the one previously retrieved from the server. This issue has been patched in version 1.4.1. As a workaround, when initializing an immudb client object a custom state handler can be used to store the state. Providing custom implementation that ignores the server UUID can be used to ensure that even if the server changes the UUID, client will still consider it to be the same server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/codenotary/immudb", + "cwes": [], + "commits": [ + "e512022c8157e77ef85ebb7f5b51d3f3c87ae6a2" + ] + }, + { + "id": "CVE-2024-27918", + "published": "2024-03-21T02:52:20", + "modified": "2025-01-15T05:19:02.109892", + "details": "Coder allows oragnizations to provision remote development environments via Terraform. Prior to versions 2.6.1, 2.7.3, and 2.8.4, a vulnerability in Coder's OIDC authentication could allow an attacker to bypass the `CODER_OIDC_EMAIL_DOMAIN` verification and create an account with an email not in the allowlist. Deployments are only affected if the OIDC provider allows users to create accounts on the provider. During OIDC registration, the user's email was improperly validated against the allowed `CODER_OIDC_EMAIL_DOMAIN`s. This could allow a user with a domain that only partially matched an allowed domain to successfully login or register. An attacker could register a domain name that exploited this vulnerability and register on a Coder instance with a public OIDC provider.\n\nCoder instances with OIDC enabled and protected by the `CODER_OIDC_EMAIL_DOMAIN` configuration are affected. Coder instances using a private OIDC provider are not affected, as arbitrary users cannot register through a private OIDC provider without first having an account on the provider. Public OIDC providers are impacted. GitHub authentication and external authentication are not impacted. This vulnerability is remedied in versions 2.8.4, 2.7.3, and 2.6.1 All versions prior to these patches are affected by the vulnerability.*It is recommended that customers upgrade their deployments as soon as possible if they are utilizing OIDC authentication with the `CODER_OIDC_EMAIL_DOMAIN` setting.", + "repo_url": "https://github.com/coder/coder", + "cwes": [], + "commits": [ + "d6cdaae8b194829c0631908d15e4ac57ae887ef6" + ] + }, + { + "id": "CVE-2023-34451", + "published": "2023-07-03T17:15:09", + "modified": "2025-02-19T03:33:51.702158", + "details": "CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. The mempool maintains two data structures to keep track of outstanding transactions: a list and a map.\nThese two data structures are supposed to be in sync all the time in the sense that the map tracks the index (if any) of the transaction in the list. In `v0.37.0`, and `v0.37.1`, as well as in `v0.34.28`, and all previous releases of the CometBFT repo2, it is possible to have them out of sync. When this happens, the list may contain several copies of the same transaction. Because the map tracks a single index, it is then no longer possible to remove all the copies of the transaction from the list. This happens even if the duplicated transaction is later committed in a block. The only way to remove the transaction is by restarting the node.\n\nThe above problem can be repeated on and on until a sizable number of transactions are stuck in the mempool, in order to try to bring down the target node. The problem is fixed in releases `v0.34.29` and `v0.37.2`. Some workarounds are available. Increasing the value of `cache_size` in `config.toml` makes it very difficult to effectively attack a full node. Not exposing the transaction submission RPC's would mitigate the probability of a successful attack, as the attacker would then have to create a modified (byzantine) full node to be able to perform the attack via p2p.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" + } + ], + "repo_url": "https://github.com/cometbft/cometbft", + "cwes": [], + "commits": [ + "45e98ef8001b7be722fb080a78910a272a129172" + ] + }, + { + "id": "CVE-2023-34450", + "published": "2023-07-03T17:15:09", + "modified": "2025-02-19T03:32:27.936023", + "details": "CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. An internal modification made in versions 0.34.28 and 0.37.1 to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places. The first is via logs, setting the `consensus` logging module to \"debug\" level (should not happen in production), and setting the log output format to JSON. The second is via RPC `dump_consensus_state`.\n\nCase 1, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node.\n\nIn case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded.\n\nThe theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated.\n\nAs the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with two nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that \"for\" loop to never be reached).\n\nThis regression was fixed in versions 0.34.29 and 0.37.2. Some workarounds are available. For case 1 (hitting the deadlock via logs), either don't set the log output to \"json\", leave at \"plain\", or don't set the consensus logging module to \"debug\", leave it at \"info\" or higher. For case 2 (hitting the deadlock via RPC `dump_consensus_state`), do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in one's nginx setup).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "repo_url": "https://github.com/cometbft/cometbft", + "cwes": [], + "commits": [ + "45e98ef8001b7be722fb080a78910a272a129172" + ] + }, + { + "id": "CVE-2024-23688", + "published": "2024-01-19T22:15:08", + "modified": "2025-01-14T12:11:36.557230", + "details": "Consensys Discovery versions less than 0.4.5 uses the same AES/GCM nonce for the entire session. which should ideally be unique for every message. The node's private key isn't compromised, only the session key generated for specific peer communication is exposed.\n\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/consensys/discovery", + "cwes": [], + "commits": [ + "c4ffade2cbf9943ac0f2f1be6e94a207fbc98ba5" + ] + }, + { + "id": "CVE-2024-45040", + "published": "2024-09-06T13:15:04", + "modified": "2025-02-19T03:38:23.741614", + "details": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.11.0, commitments to private witnesses in Groth16 as implemented break the zero-knowledge property. The vulnerability affects only Groth16 proofs with commitments. Notably, PLONK proofs are not affected. The vulnerability affects the zero-knowledge property of the proofs - in case the witness (secret or internal) values are small, then the attacker may be able to enumerate all possible choices to deduce the actual value. If the possible choices for the variables to be committed is large or there are many values committed, then it would be computationally infeasible to enumerate all valid choices. It doesn't affect the completeness/soundness of the proofs. The vulnerability has been fixed in version 0.11.0. The patch to fix the issue is to add additional randomized value to the list of committed value at proving time to mask the rest of the values which were committed. As a workaround, the user can manually commit to a randomized value.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/consensys/gnark", + "cwes": [], + "commits": [ + "f9dfb87201d5166b25f0e0d44606df54c4ad3036" + ] + }, + { + "id": "CVE-2024-50354", + "published": "2024-10-31T16:15:05", + "modified": "2024-11-01T22:27:08.771887", + "details": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory.", + "repo_url": "https://github.com/consensys/gnark", + "cwes": [], + "commits": [ + "f9dfb87201d5166b25f0e0d44606df54c4ad3036" + ] + }, + { + "id": "CVE-2023-44378", + "published": "2023-10-09T14:15:10", + "modified": "2025-01-15T04:58:49.809218", + "details": "gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/consensys/gnark", + "cwes": [], + "commits": [ + "f9dfb87201d5166b25f0e0d44606df54c4ad3036" + ] + }, + { + "id": "CVE-2024-45039", + "published": "2024-09-06T13:15:04", + "modified": "2025-02-19T03:38:25.155831", + "details": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. Versions prior to 0.11.0 have a soundness issue - in case of multiple commitments used inside the circuit the prover is able to choose all but the last commitment. As gnark uses the commitments for optimized non-native multiplication, lookup checks etc. as random challenges, then it could impact the soundness of the whole circuit. However, using multiple commitments has been discouraged due to the additional cost to the verifier and it has not been supported in the recursive in-circuit Groth16 verifier and Solidity verifier. gnark's maintainers expect the impact of the issue be very small - only for the users who have implemented the native Groth16 verifier or are using it with multiple commitments. We do not have information of such users. The issue has been patched in version 0.11.0. As a workaround, users should follow gnark maintainers' recommendation to use only a single commitment and then derive in-circuit commitments as needed using the `std/multicommit` package.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/consensys/gnark-crypto", + "cwes": [], + "commits": [ + "f93a56c714c4e6266429cac111a004e9eec7daa0" + ] + }, + { + "id": "CVE-2023-44273", + "published": "2023-09-28T04:15:12", + "modified": "2025-02-19T03:34:25.473005", + "details": "Consensys gnark-crypto through 0.11.2 allows Signature Malleability. This occurs because deserialisation of EdDSA and ECDSA signatures does not ensure that the data is in a certain interval.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/consensys/gnark-crypto", + "cwes": [], + "commits": [ + "f93a56c714c4e6266429cac111a004e9eec7daa0" + ] + }, + { + "id": "CVE-2022-24778", + "published": "2022-03-25T18:15:22", + "modified": "2025-01-15T02:16:58.838611", + "details": "The imgcrypt library provides API exensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/containerd/imgcrypt", + "cwes": [], + "commits": [ + "65d749cef36547473d1c1b0b67ed8a4b9e3d13d4" + ] + }, + { + "id": "CVE-2020-1702", + "published": "2021-05-27T20:15:07", + "modified": "2025-01-14T08:34:13.020021", + "details": "A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" + } + ], + "repo_url": "https://github.com/containers/image", + "cwes": [], + "commits": [ + "eaab4bee6eecfa8220e8a21a802b81919f3c94e1" + ] + }, + { + "id": "CVE-2019-10152", + "published": "2019-07-30T23:15:11", + "modified": "2025-01-14T07:42:56.582522", + "details": "A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/containers/libpod", + "cwes": [], + "commits": [ + "1f2e2a25bf0fec4a1e023a35903627e0562c88a6" + ] + }, + { + "id": "CVE-2019-18466", + "published": "2019-10-28T13:15:11", + "modified": "2025-01-15T01:41:09.511847", + "details": "An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/containers/libpod", + "cwes": [], + "commits": [ + "1f2e2a25bf0fec4a1e023a35903627e0562c88a6" + ] + }, + { + "id": "CVE-2018-10856", + "published": "2018-07-03T01:29:00", + "modified": "2025-01-15T01:31:51.910274", + "details": "It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/containers/libpod", + "cwes": [], + "commits": [ + "1f2e2a25bf0fec4a1e023a35903627e0562c88a6" + ] + }, + { + "id": "CVE-2024-3056", + "published": "2024-08-02T21:16:30", + "modified": "2025-01-14T12:13:49.120701", + "details": "A flaw was found in Podman. This issue may allow an attacker to create a specially crafted container that, when configured to share the same IPC with at least one other container, can create a large number of IPC resources in /dev/shm. The malicious container will continue to exhaust resources until it is out-of-memory (OOM) killed. While the malicious container's cgroup will be removed, the IPC resources it created are not. Those resources are tied to the IPC namespace that will not be removed until all containers using it are stopped, and one non-malicious container is holding the namespace open. The malicious container is restarted, either automatically or by attacker control, repeating the process and increasing the amount of memory consumed. With a container configured to restart always, such as `podman run --restart=always`, this can result in a memory-based denial of service of the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:H" + } + ], + "repo_url": "https://github.com/containers/podman", + "cwes": [], + "commits": [ + "b22d5c61eef93475413724f49fd6a32980d2c746" + ] + }, + { + "id": "CVE-2022-25891", + "published": "2022-07-15T20:15:08", + "modified": "2025-01-15T02:19:07.046951", + "details": "The package github.com/containrrr/shoutrrr/pkg/util before 0.6.0 are vulnerable to Denial of Service (DoS) via the util.PartitionMessage function. Exploiting this vulnerability is possible by sending exactly 2000, 4000, or 6000 characters messages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/containrrr/shoutrrr", + "cwes": [], + "commits": [ + "23170b836d31a2231011472b6e8a91bf98bf6b26" + ] + }, + { + "id": "CVE-2023-37279", + "published": "2023-09-20T22:15:13", + "modified": "2025-01-14T11:49:15.155509", + "details": "Faktory is a language-agnostic persistent background job server. Prior to version 1.8.0, the Faktory web dashboard can suffer from denial of service by a crafted malicious url query param `days`. The vulnerability is related to how the backend reads the `days` URL query parameter in the Faktory web dashboard. The value is used directly without any checks to create a string slice. If a very large value is provided, the backend server ends up using a significant amount of memory and causing it to crash. Version 1.8.0 fixes this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/contribsys/faktory", + "cwes": [], + "commits": [ + "afc27bfb107e2146f11d0eed119ad54b2d57ec4e" + ] + }, + { + "id": "CVE-2023-40586", + "published": "2023-08-25T21:15:09", + "modified": "2025-01-15T04:57:24.513792", + "details": "OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers. The application will immediately crash after receiving a malicious request that triggers an error in `mime.ParseMediaType`. This issue was patched in version 3.0.1.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/corazawaf/coraza", + "cwes": [], + "commits": [ + "ad50864cfa00f5143fff7f6877847326fdc4b394" + ] + }, + { + "id": "CVE-2021-31232", + "published": "2021-04-30T13:15:07", + "modified": "2025-01-14T09:13:03.803314", + "details": "The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cortexproject/cortex", + "cwes": [], + "commits": [ + "06bbda1ec0bd4d5fc0194d3d28ac8c9fce914707" + ] + }, + { + "id": "CVE-2021-36157", + "published": "2021-08-03T15:15:08", + "modified": "2025-01-14T09:20:54.666264", + "details": "An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/cortexproject/cortex", + "cwes": [], + "commits": [ + "06bbda1ec0bd4d5fc0194d3d28ac8c9fce914707" + ] + }, + { + "id": "CVE-2022-23536", + "published": "2022-12-19T22:15:10", + "modified": "2025-02-19T03:24:52.391172", + "details": "Cortex provides multi-tenant, long term storage for Prometheus. A local file inclusion vulnerability exists in Cortex versions 1.13.0, 1.13.1 and 1.14.0, where a malicious actor could remotely read local files as a result of parsing maliciously crafted Alertmanager configurations when submitted to the Alertmanager Set Configuration API. Only users of the Alertmanager service where `-experimental.alertmanager.enable-api` or `enable_api: true` is configured are affected. Affected Cortex users are advised to upgrade to patched versions 1.13.2 or 1.14.1. However as a workaround, Cortex administrators may reject Alertmanager configurations containing the `api_key_file` setting in the `opsgenie_configs` section before sending to the Set Alertmanager Configuration API.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cortexproject/cortex", + "cwes": [], + "commits": [ + "06bbda1ec0bd4d5fc0194d3d28ac8c9fce914707" + ] + }, + { + "id": "CVE-2021-41135", + "published": "2021-10-20T18:15:07", + "modified": "2025-01-15T02:04:45.464227", + "details": "The Cosmos-SDK is a framework for building blockchain applications in Golang. Affected versions of the SDK were vulnerable to a consensus halt due to non-deterministic behaviour in a ValidateBasic method in the x/authz module. The MsgGrant of the x/authz module contains a Grant field which includes a user-defined expiration time for when the authorization grant expires. In Grant.ValidateBasic(), that time is compared to the node\u2019s local clock time. Any chain running an affected version of the SDK with the authz module enabled could be halted by anyone with the ability to send transactions on that chain. Recovery would require applying the patch and rolling back the latest block. Users are advised to update to version 0.44.2.", + "repo_url": "https://github.com/cosmos/cosmos-sdk", + "cwes": [], + "commits": [ + "8a73b266f52e08f24738c93ef519b529cd35bbd8" + ] + }, + { + "id": "CVE-2021-25835", + "published": "2021-02-08T18:15:13", + "modified": "2025-01-14T09:00:52.187035", + "details": "Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables \"cross-chain transaction replay\" attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cosmos/ethermint", + "cwes": [], + "commits": [ + "11e2f636787f453dac645b53e6b930d42bbb8711" + ] + }, + { + "id": "CVE-2021-25837", + "published": "2021-02-08T18:15:13", + "modified": "2025-01-14T09:00:47.740158", + "details": "Cosmos Network Ethermint <= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. Due to the inconsistency between the Storage caching cycle and the Tx processing cycle, Storage changes caused by a failed transaction are improperly reserved in memory. Although the bad storage cache data will be discarded at EndBlock, it is still valid in the current block, which enables many possible attacks such as an \"arbitrary mint token\".", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cosmos/ethermint", + "cwes": [], + "commits": [ + "11e2f636787f453dac645b53e6b930d42bbb8711" + ] + }, + { + "id": "CVE-2021-25836", + "published": "2021-02-08T18:15:13", + "modified": "2025-01-14T09:00:47.529974", + "details": "Cosmos Network Ethermint <= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. The bytecode set in a FAILED transaction wrongfully remains in memory(stateObject.code) and is further written to persistent store at the Endblock stage, which may be utilized to build honeypot contracts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cosmos/ethermint", + "cwes": [], + "commits": [ + "11e2f636787f453dac645b53e6b930d42bbb8711" + ] + }, + { + "id": "CVE-2021-25834", + "published": "2021-02-08T18:15:13", + "modified": "2025-01-14T09:00:43.880846", + "details": "Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/cosmos/ethermint", + "cwes": [], + "commits": [ + "11e2f636787f453dac645b53e6b930d42bbb8711" + ] + }, + { + "id": "CVE-2023-28119", + "published": "2023-03-22T20:15:12", + "modified": "2025-01-15T04:49:22.111196", + "details": "The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/crewjam/saml", + "cwes": [], + "commits": [ + "a60693989d9efbca89bb06007e3269a7da3cc214" + ] + }, + { + "id": "CVE-2023-45683", + "published": "2023-10-16T19:15:11", + "modified": "2025-01-15T04:59:19.475782", + "details": "github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim\u2019s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/crewjam/saml", + "cwes": [], + "commits": [ + "a60693989d9efbca89bb06007e3269a7da3cc214" + ] + }, + { + "id": "CVE-2022-41912", + "published": "2022-11-28T15:15:10", + "modified": "2025-01-15T03:04:53.380049", + "details": "The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/crewjam/saml", + "cwes": [], + "commits": [ + "a60693989d9efbca89bb06007e3269a7da3cc214" + ] + }, + { + "id": "CVE-2020-27846", + "published": "2020-12-21T16:15:13", + "modified": "2025-01-14T08:44:31.904466", + "details": "A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/crewjam/saml", + "cwes": [], + "commits": [ + "a60693989d9efbca89bb06007e3269a7da3cc214" + ] + }, + { + "id": "CVE-2024-5154", + "published": "2024-06-12T09:15:19", + "modified": "2025-02-19T03:42:09.483829", + "details": "A flaw was found in cri-o. A malicious container can create a symbolic link to arbitrary files on the host via directory traversal (\u201c../\u201c). This flaw allows the container to read and write to arbitrary files on the host system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "a85ea609db33ce5da282a02873021a3fdfb6562f" + ] + }, + { + "id": "CVE-2022-0811", + "published": "2022-03-16T15:15:16", + "modified": "2025-02-19T03:25:21.952374", + "details": "A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "91f84584bc4b49fdc8aad716fdc7ac2a165d9f63" + ] + }, + { + "id": "CVE-2022-1708", + "published": "2022-06-07T18:15:11", + "modified": "2025-02-19T03:25:54.299667", + "details": "A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the memory or the disk space of the node when CRI-O reads the output of the command. The highest threat from this vulnerability is system availability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "a85ea609db33ce5da282a02873021a3fdfb6562f" + ] + }, + { + "id": "CVE-2022-2995", + "published": "2022-09-19T20:15:12", + "modified": "2025-02-19T03:27:08.649106", + "details": "Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "a85ea609db33ce5da282a02873021a3fdfb6562f" + ] + }, + { + "id": "CVE-2022-0532", + "published": "2022-02-09T23:15:16", + "modified": "2025-02-19T03:24:48.052369", + "details": "An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of \"safe\" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "a85ea609db33ce5da282a02873021a3fdfb6562f" + ] + }, + { + "id": "CVE-2019-14891", + "published": "2019-11-25T11:15:11", + "modified": "2025-02-19T02:48:20.798554", + "details": "A flaw was found in cri-o, as a result of all pod-related processes being placed in the same memory cgroup. This can result in container management (conmon) processes being killed if a workload process triggers an out-of-memory (OOM) condition for the cgroup. An attacker could abuse this flaw to get host network access on an cri-o host.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "a85ea609db33ce5da282a02873021a3fdfb6562f" + ] + }, + { + "id": "CVE-2018-1000400", + "published": "2018-05-18T18:29:00", + "modified": "2025-01-14T07:20:14.998240", + "details": "Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cri-o/cri-o", + "cwes": [], + "commits": [ + "a85ea609db33ce5da282a02873021a3fdfb6562f" + ] + }, + { + "id": "CVE-2023-27484", + "published": "2023-03-09T21:15:11", + "modified": "2025-01-14T11:36:31.778754", + "details": "crossplane-runtime is a set of go libraries used to build Kubernetes controllers in Crossplane and its related stacks. In affected versions an already highly privileged user able to create or update Compositions can specify an arbitrarily high index in a patch's `ToFieldPath`, which could lead to excessive memory usage once such Composition is selected for a Composite resource. Compositions allow users to specify patches inserting elements into arrays at an arbitrary index. When a Composition is selected for a Composite Resource, patches are evaluated and if a specified index is greater than the current size of the target slice, Crossplane will grow that slice up to the specified index, which could lead to an excessive amount of memory usage and therefore the Pod being OOM-Killed. The index is already capped to the maximum value for a uint32 (4294967295) when parsed, but that is still an unnecessarily large value. This issue has been addressed in versions 1.11.2, 1.10.3, and 1.9.2. Users are advised to upgrade. Users unable to upgrade can restrict write privileges on Compositions to only admin users as a workaround.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/crossplane/crossplane", + "cwes": [], + "commits": [ + "6b674f868403e92fa40d49a8a0385352d8d32e39" + ] + }, + { + "id": "CVE-2023-38495", + "published": "2023-07-27T19:15:10", + "modified": "2025-02-19T03:31:17.901954", + "details": "Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, Crossplane's image backend does not validate the byte contents of Crossplane packages. As such, Crossplane does not detect if an attacker has tampered with a Package. The problem has been fixed in 1.11.5, 1.12.3 and 1.13.0. As a workaround, only use images from trusted sources and keep Package editing/creating privileges to administrators only.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/crossplane/crossplane", + "cwes": [], + "commits": [ + "ad3af882d09231d80a6e066bd4f72b9b543c76b6" + ] + }, + { + "id": "CVE-2023-37900", + "published": "2023-07-27T16:15:10", + "modified": "2025-02-19T03:33:02.233685", + "details": "Crossplane is a framework for building cloud native control planes without needing to write code. In versions prior to 1.11.5, 1.12.3, and 1.13.0, a high-privileged user could create a Package referencing an arbitrarily large image containing that Crossplane would then parse, possibly resulting in exhausting all the available memory and therefore in the container being OOMKilled. The impact is limited due to the high privileges required to be able to create the Package and the eventually consistency nature of controller. This issue is fixed in versions 1.11.5, 1.12.3, and 1.13.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" + } + ], + "repo_url": "https://github.com/crossplane/crossplane", + "cwes": [], + "commits": [ + "ad3af882d09231d80a6e066bd4f72b9b543c76b6" + ] + }, + { + "id": "CVE-2023-27483", + "published": "2023-03-09T21:15:11", + "modified": "2025-01-15T04:48:11.983112", + "details": "crossplane-runtime is a set of go libraries used to build Kubernetes controllers in Crossplane and its related stacks. An out of memory panic vulnerability has been discovered in affected versions. Applications that use the `Paved` type's `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic. In the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index, the index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value. If callers are not validating paths' indexes on their own, which most probably are not going to do, given that the input is parsed directly in the SetValue method, this could allow users to consume arbitrary amounts of memory. Applications that do not use the `Paved` type's `SetValue` method are not affected. This issue has been addressed in versions 0.16.1 and 0.19.2. Users are advised to upgrade. Users unable to upgrade can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/crossplane/crossplane-runtime", + "cwes": [], + "commits": [ + "1fc35a41fccae56fdc26f075e737f4a7dc4a7a58" + ] + }, + { + "id": "CVE-2021-43839", + "published": "2021-12-21T17:15:08", + "modified": "2025-01-15T02:08:26.386075", + "details": "Cronos is a commercial implementation of a blockchain. In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx. This problem has been patched in Cronos v0.6.5. There are no tested workarounds. All validator node operators are recommended to upgrade to Cronos v0.6.5 at their earliest possible convenience.", + "repo_url": "https://github.com/crypto-org-chain/cronos", + "cwes": [], + "commits": [ + "087d3cdb4b003c92f77db8fe530679806e6520d6" + ] + }, + { + "id": "CVE-2022-43996", + "published": "2022-12-13T22:15:10", + "modified": "2025-01-14T11:14:26.768958", + "details": "The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF document uploaded as text/html. The endpoint upload allows valid CSAF advisories (JSON format) to be uploaded with Content-Type text/html and filenames ending in .html. When subsequently accessed via web browser, these advisories are served and interpreted as HTML pages. Such uploaded advisories can contain JavaScript code that will execute within the browser context of users inspecting the advisory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/csaf-poc/csaf_distribution", + "cwes": [], + "commits": [ + "f6fa366ee571061bbfd6a3f311cef0ba18b9548e" + ] + }, + { + "id": "CVE-2023-46741", + "published": "2024-01-03T17:15:10", + "modified": "2025-01-15T05:00:16.077272", + "details": "CubeFS is an open-source cloud-native file storage system. A vulnerability was found in CubeFS prior to version 3.3.1 that could allow users to read sensitive data from the logs which could allow them escalate privileges. CubeFS leaks configuration keys in plaintext format in the logs. These keys could allow anyone to carry out operations on blobs that they otherwise do not have permissions for. For example, an attacker that has succesfully retrieved a secret key from the logs can delete blogs from the blob store. The attacker can either be an internal user with limited privileges to read the log, or they can be an external user who has escalated privileges sufficiently to access the logs. The vulnerability has been patched in v3.3.1. There is no other mitigation than upgrading.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cubefs/cubefs", + "cwes": [], + "commits": [ + "00e7ae59d56508e1926862adf83ef4329819ae6a" + ] + }, + { + "id": "CVE-2023-46740", + "published": "2024-01-03T17:15:10", + "modified": "2025-01-15T05:00:18.200412", + "details": "CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the \u201caccessKey\u201d. To create the \"accesKey\", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/cubefs/cubefs", + "cwes": [], + "commits": [ + "00e7ae59d56508e1926862adf83ef4329819ae6a" + ] + }, + { + "id": "CVE-2023-46739", + "published": "2024-01-03T17:15:10", + "modified": "2025-01-15T05:00:20.002937", + "details": "CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cubefs/cubefs", + "cwes": [], + "commits": [ + "00e7ae59d56508e1926862adf83ef4329819ae6a" + ] + }, + { + "id": "CVE-2023-46742", + "published": "2024-01-03T17:15:11", + "modified": "2025-01-15T05:00:17.109948", + "details": "CubeFS is an open-source cloud-native file storage system. CubeFS prior to version 3.3.1 was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves. The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cubefs/cubefs", + "cwes": [], + "commits": [ + "00e7ae59d56508e1926862adf83ef4329819ae6a" + ] + }, + { + "id": "CVE-2023-46738", + "published": "2024-01-03T16:15:08", + "modified": "2025-01-15T05:00:23.536706", + "details": "CubeFS is an open-source cloud-native file storage system. A security vulnerability was found in CubeFS HandlerNode in versions prior to 3.3.1 that could allow authenticated users to send maliciously-crafted requests that would crash the ObjectNode and deny other users from using it. The root cause was improper handling of incoming HTTP requests that could allow an attacker to control the ammount of memory that the ObjectNode would allocate. A malicious request could make the ObjectNode allocate more memory that the machine had available, and the attacker could exhaust memory by way of a single malicious request. An attacker would need to be authenticated in order to invoke the vulnerable code with their malicious request and have permissions to delete objects. In addition, the attacker would need to know the names of existing buckets of the CubeFS deployment - otherwise the request would be rejected before it reached the vulnerable code. As such, the most likely attacker is an inside user or an attacker that has breached the account of an existing user in the cluster. The issue has been patched in v3.3.1. There is no other mitigation besides upgrading.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/cubefs/cubefs", + "cwes": [], + "commits": [ + "00e7ae59d56508e1926862adf83ef4329819ae6a" + ] + }, + { + "id": "CVE-2023-30512", + "published": "2023-04-12T06:15:07", + "modified": "2025-02-07T22:47:40.246956", + "details": "CubeFS through 3.2.1 allows Kubernetes cluster-level privilege escalation. This occurs because DaemonSet has cfs-csi-cluster-role and can thus list all secrets, including the admin secret.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/cubefs/cubefs", + "cwes": [], + "commits": [ + "00e7ae59d56508e1926862adf83ef4329819ae6a" + ] + }, + { + "id": "CVE-2024-35223", + "published": "2024-05-23T09:15:09", + "modified": "2025-01-15T05:14:09.830302", + "details": "Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. Dapr sends the app token of the invoker app instead of the app token of the invoked app. This causes of a leak of the application token of the invoker app to the invoked app when using Dapr as a gRPC proxy for remote service invocation. This vulnerability impacts Dapr users who use Dapr as a gRPC proxy for remote service invocation as well as the Dapr App API token functionality. An attacker could exploit this vulnerability to gain access to the app token of the invoker app, potentially compromising security and authentication mechanisms. This vulnerability was patched in version 1.13.3.\n", + "repo_url": "https://github.com/dapr/dapr", + "cwes": [], + "commits": [ + "9dbd0ab8733185008ec69ac0fa8d6546320b7799" + ] + }, + { + "id": "CVE-2023-37918", + "published": "2023-07-21T21:15:11", + "modified": "2025-01-15T04:56:06.542729", + "details": "Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. A vulnerability has been found in Dapr that allows bypassing API token authentication, which is used by the Dapr sidecar to authenticate calls coming from the application, with a well-crafted HTTP request. Users who leverage API token authentication are encouraged to upgrade Dapr to 1.10.9 or to 1.11.2. This vulnerability impacts Dapr users who have configured API token authentication. An attacker could craft a request that is always allowed by the Dapr sidecar over HTTP, even if the `dapr-api-token` in the request is invalid or missing. The issue has been fixed in Dapr 1.10.9 or to 1.11.2. There are no known workarounds for this vulnerability.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/dapr/dapr", + "cwes": [], + "commits": [ + "9dbd0ab8733185008ec69ac0fa8d6546320b7799" + ] + }, + { + "id": "CVE-2022-38817", + "published": "2022-10-03T13:15:11", + "modified": "2025-02-19T03:29:35.853847", + "details": "Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/dapr/dashboard", + "cwes": [], + "commits": [ + "febc4a7bca4cb992bc3fdd9799a0a87b5922f8f6" + ] + }, + { + "id": "CVE-2023-27163", + "published": "2023-03-31T20:15:07", + "modified": "2025-02-18T18:49:50.036741", + "details": "request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/darklynx/request-baskets", + "cwes": [], + "commits": [ + "a36e2ae402204050ce42a78d750785b4b10e7958" + ] + }, + { + "id": "CVE-2020-26277", + "published": "2020-12-21T22:15:13", + "modified": "2025-01-15T01:44:50.923094", + "details": "DBdeployer is a tool that deploys MySQL database servers easily. In DBdeployer before version 1.58.2, users unpacking a tarball may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defenses. For the attack to succeed, the following factors need to contribute: 1) The user is logged in as root. While dbdeployer is usable as root, it was designed to run as unprivileged user. 2) The user has taken a tarball from a non secure source, without testing the checksum. When the tarball is retrieved through dbdeployer, the checksum is compared before attempting to unpack. This has been fixed in version 1.58.2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/datacharmer/dbdeployer", + "cwes": [], + "commits": [ + "9fb4cd3dda124d20151cc69a7d64219386eb1ce9" + ] + }, + { + "id": "CVE-2016-15036", + "published": "2023-12-23T20:15:37", + "modified": "2025-01-15T01:06:58.958418", + "details": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Deis Workflow Manager up to 2.3.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to race condition. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.3.3 is able to address this issue. The patch is named 31fe3bccbdde134a185752e53380330d16053f7f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248847. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/deis/workflow-manager", + "cwes": [], + "commits": [ + "2582640c2c13c5f5f9b860d62d2b7c3bc7f4826b" + ] + }, + { + "id": "CVE-2021-21272", + "published": "2021-01-25T19:15:12", + "modified": "2025-01-15T01:47:07.931263", + "details": "ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a \"zip-slip\" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a trusted artifact provider. For `oras` package users, the workaround is to not use `github.com/deislabs/oras/pkg/content.FileStore`, and use other content stores instead, or pull from a trusted artifact provider.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/deislabs/oras", + "cwes": [], + "commits": [ + "237ac925cb6a308a5523cc048292bb53037f6975" + ] + }, + { + "id": "CVE-2022-34375", + "published": "2022-08-30T21:15:08", + "modified": "2025-01-14T11:01:49.194402", + "details": "Dell Container Storage Modules 1.2 contains a path traversal vulnerability in goiscsi and gobrick libraries. A remote authenticated malicious user with low privileges could exploit this vulnerability leading to unintentional access to path outside of restricted directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/dell/csm", + "cwes": [], + "commits": [ + "5c433c6b1cf704be3adb28e72e34c9098dc0c12f" + ] + }, + { + "id": "CVE-2022-34374", + "published": "2022-08-30T21:15:08", + "modified": "2025-01-14T11:01:47.941587", + "details": "Dell Container Storage Modules 1.2 contains an OS command injection in goiscsi and gobrick libraries. A remote authenticated malicious user with low privileges could exploit this vulnerability leading to to execute arbitrary OS commands on the affected system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/dell/csm", + "cwes": [], + "commits": [ + "5c433c6b1cf704be3adb28e72e34c9098dc0c12f" + ] + }, + { + "id": "CVE-2024-8005", + "published": "2024-08-20T14:15:11", + "modified": "2024-10-08T04:25:25.581629", + "details": "A vulnerability was found in demozx gf_cms 1.0/1.0.1. It has been classified as critical. This affects the function init of the file internal/logic/auth/auth.go of the component JWT Authentication. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.2 is able to address this issue. The patch is named be702ada7cb6fdabc02689d90b38139c827458a5. It is recommended to upgrade the affected component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/demozx/gf_cms", + "cwes": [], + "commits": [ + "9bdb687920e57adad6e3a716e35b96dd3f80e3fe" + ] + }, + { + "id": "CVE-2020-26222", + "published": "2020-11-13T16:15:18", + "modified": "2025-01-15T01:46:10.424417", + "details": "Dependabot is a set of packages for automated dependency management for Ruby, JavaScript, Python, PHP, Elixir, Rust, Java, .NET, Elm and Go. In Dependabot-Core from version 0.119.0.beta1 before version 0.125.1, there is a remote code execution vulnerability in dependabot-common and dependabot-go_modules when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: \"/$({curl,127.0.0.1})\", Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. The fix was applied to version 0.125.1. As a workaround, one can escape the branch name prior to passing it to the Dependabot::Source class.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/dependabot/dependabot-core", + "cwes": [], + "commits": [ + "8dc6ce1966e1637db91f21aa89b331ee83e59ec6" + ] + }, + { + "id": "CVE-2020-15391", + "published": "2020-07-23T20:15:11", + "modified": "2025-02-19T03:08:43.680230", + "details": "The UI in DevSpace 4.13.0 allows web sites to execute actions on pods (on behalf of a victim) because of a lack of authentication for the WebSocket protocol. This leads to remote code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/devspace-cloud/devspace", + "cwes": [], + "commits": [ + "c29f25a287002e41d2208301763268089551ec95" + ] + }, + { + "id": "CVE-2024-23656", + "published": "2024-01-25T20:15:41", + "modified": "2025-01-15T05:08:05.090261", + "details": "Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex 2.37.0 serves HTTPS with insecure TLS 1.0 and TLS 1.1. `cmd/dex/serve.go` line 425 seemingly sets TLS 1.2 as minimum version, but the whole `tlsConfig` is ignored after `TLS cert reloader` was introduced in v2.37.0. Configured cipher suites are not respected either. This issue is fixed in Dex 2.38.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/dexidp/dex", + "cwes": [], + "commits": [ + "71bbbee0752781a65d7f9dde198d58f97ddec097" + ] + }, + { + "id": "CVE-2020-27847", + "published": "2021-05-28T11:15:07", + "modified": "2025-02-19T03:09:48.000373", + "details": "A vulnerability exists in the SAML connector of the github.com/dexidp/dex library used to process SAML Signature Validation. This flaw allows an attacker to bypass SAML authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. This flaw affects dex versions before 2.27.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/dexidp/dex", + "cwes": [], + "commits": [ + "71bbbee0752781a65d7f9dde198d58f97ddec097" + ] + }, + { + "id": "CVE-2022-39222", + "published": "2022-10-06T18:16:09", + "modified": "2025-01-15T02:28:32.703475", + "details": "Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex instances with public clients (and by extension, clients accepting tokens issued by those Dex instances) are affected by this vulnerability if they are running a version prior to 2.35.0. An attacker can exploit this vulnerability by making a victim navigate to a malicious website and guiding them through the OIDC flow, stealing the OAuth authorization code in the process. The authorization code then can be exchanged by the attacker for a token, gaining access to applications accepting that token. Version 2.35.0 has introduced a fix for this issue. Users are advised to upgrade. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/dexidp/dex", + "cwes": [], + "commits": [ + "71bbbee0752781a65d7f9dde198d58f97ddec097" + ] + }, + { + "id": "CVE-2020-26290", + "published": "2020-12-28T20:15:12", + "modified": "2025-01-15T01:44:59.695993", + "details": "Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/dexidp/dex", + "cwes": [], + "commits": [ + "71bbbee0752781a65d7f9dde198d58f97ddec097" + ] + }, + { + "id": "CVE-2023-31135", + "published": "2023-05-17T18:15:09", + "modified": "2025-01-14T11:42:32.397511", + "details": "Dgraph is an open source distributed GraphQL database. Existing Dgraph audit logs are vulnerable to brute force attacks due to nonce collisions. The first 12 bytes come from a baseIv which is initialized when an audit log is created. The last 4 bytes come from the length of the log line being encrypted. This is problematic because two log lines will often have the same length, so due to these collisions we are reusing the same nonce many times. All audit logs generated by versions of Dgraph bytecode` entry in the internal state.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "repo_url": "https://github.com/evmos/ethermint", + "cwes": [], + "commits": [ + "c9d42d667b753147977a725e98ed116c933c76cb" + ] + }, + { + "id": "CVE-2023-52081", + "published": "2023-12-28T16:16:02", + "modified": "2025-01-20T00:57:59.465605", + "details": "ffcss is a CLI interface to apply and configure Firefox CSS themes. Prior to 0.2.0, the function `lookupPreprocess()` is meant to apply some transformations to a string by disabling characters in the regex `[-_ .]`. However, due to the use of late Unicode normalization of type NFKD, it is possible to bypass that validation and re-introduce all the characters in the regex `[-_ .]`. The `lookupPreprocess()` can be easily bypassed with equivalent Unicode characters like U+FE4D (\ufe4d), which would result in the omitted U+005F (_), for instance. The `lookupPreprocess()` function is only ever used to search for themes loosely (case insensitively, while ignoring dashes, underscores and dots), so the actual security impact is classified as low. This vulnerability is fixed in 0.2.0. There are no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/ewen-lbh/ffcss", + "cwes": [], + "commits": [ + "041ac1a05f252472b0811e884f59b925da11a7dd" + ] + }, + { + "id": "CVE-2024-45041", + "published": "2024-09-09T15:15:11", + "modified": "2024-10-08T04:22:23.601179", + "details": "External Secrets Operator is a Kubernetes operator that integrates external secret management systems. The external-secrets has a deployment called default-external-secrets-cert-controller, which is bound with a same-name ClusterRole. This ClusterRole has \"get/list\" verbs of secrets resources. It also has path/update verb of validatingwebhookconfigurations resources. This can be used to abuse the SA token of the deployment to retrieve or get ALL secrets in the whole cluster, capture and log all data from requests attempting to update Secrets, or make a webhook deny all Pod create and update requests. This vulnerability is fixed in 0.10.2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/external-secrets/external-secrets", + "cwes": [], + "commits": [ + "ba6627a9fcb7e3581ba73b5d71e7ae959da5ea5d" + ] + }, + { + "id": "CVE-2021-24028", + "published": "2021-04-14T00:15:13", + "modified": "2025-01-15T01:48:50.202260", + "details": "An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-3558", + "published": "2019-05-06T16:29:00", + "modified": "2025-01-15T01:41:31.253897", + "details": "Python Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.18.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-3552", + "published": "2019-05-06T16:29:00", + "modified": "2025-01-15T01:41:33.249275", + "details": "C++ Facebook Thrift servers (using cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.18.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-3565", + "published": "2019-05-06T16:29:01", + "modified": "2025-01-15T01:41:36.387050", + "details": "Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.05.06.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-3564", + "published": "2019-05-06T16:29:01", + "modified": "2025-01-15T01:41:37.721304", + "details": "Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-3559", + "published": "2019-05-06T16:29:01", + "modified": "2025-01-15T01:41:34.855908", + "details": "Java Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.18.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-11939", + "published": "2020-03-18T01:15:11", + "modified": "2025-01-15T01:37:25.456615", + "details": "Golang Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2020.03.16.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-3553", + "published": "2020-03-10T21:15:11", + "modified": "2025-01-15T01:41:35.590575", + "details": "C++ Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2020.02.03.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2019-11938", + "published": "2020-03-10T21:15:11", + "modified": "2025-01-15T01:37:39.033140", + "details": "Java Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.12.09.00.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/facebook/fbthrift", + "cwes": [], + "commits": [ + "1b0b1e72e17ae943f72a8d6a806a2ad79b0316ef" + ] + }, + { + "id": "CVE-2021-33505", + "published": "2021-07-15T11:15:07", + "modified": "2025-01-14T09:17:04.023886", + "details": "A local malicious user can circumvent the Falco detection engine through 0.28.1 by running a program that alters arguments of system calls being executed. Issue is fixed in Falco versions >= 0.29.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/falcosecurity/falco", + "cwes": [], + "commits": [ + "fb3f2178bac3696f1372d03d3cf9fc4086eb6cc9" + ] + }, + { + "id": "CVE-2019-8339", + "published": "2019-05-17T20:29:05", + "modified": "2025-01-14T08:08:38.610640", + "details": "An issue was discovered in Falco through 0.14.0. A missing indicator for insufficient resources allows local users to bypass the detection engine.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/falcosecurity/falco", + "cwes": [], + "commits": [ + "fb3f2178bac3696f1372d03d3cf9fc4086eb6cc9" + ] + }, + { + "id": "CVE-2023-39612", + "published": "2023-09-16T01:15:07", + "modified": "2025-01-15T04:56:41.648844", + "details": "A cross-site scripting (XSS) vulnerability in FileBrowser before v2.23.0 allows an authenticated attacker to escalate privileges to Administrator via user interaction with a crafted HTML file or URL.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/filebrowser/filebrowser", + "cwes": [], + "commits": [ + "73ccbe912fc1848957d8b2f6bbe5243804769d85" + ] + }, + { + "id": "CVE-2021-37794", + "published": "2021-08-31T18:15:08", + "modified": "2025-01-15T01:59:40.878153", + "details": "A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/filebrowser/filebrowser", + "cwes": [], + "commits": [ + "73ccbe912fc1848957d8b2f6bbe5243804769d85" + ] + }, + { + "id": "CVE-2021-46398", + "published": "2022-02-04T16:15:07", + "modified": "2025-01-15T02:09:11.608259", + "details": "A Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/filebrowser/filebrowser", + "cwes": [], + "commits": [ + "73ccbe912fc1848957d8b2f6bbe5243804769d85" + ] + }, + { + "id": "CVE-2021-21405", + "published": "2021-04-15T22:15:11", + "modified": "2025-01-14T08:43:00.762346", + "details": "Lotus is an Implementation of the Filecoin protocol written in Go. BLS signature validation in lotus uses blst library method VerifyCompressed. This method accepts signatures in 2 forms: \"serialized\", and \"compressed\", meaning that BLS signatures can be provided as either of 2 unique byte arrays. Lotus block validation functions perform a uniqueness check on provided blocks. Two blocks are considered distinct if the CIDs of their blockheader do not match. The CID method for blockheader includes the BlockSig of the block. The result of these issues is that it would be possible to punish miners for valid blocks, as there are two different valid block CIDs available for each block, even though this must be unique. By switching from the go based `blst` bindings over to the bindings in `filecoin-ffi`, the code paths now ensure that all signatures are compressed by size and the way they are deserialized. This happened in https://github.com/filecoin-project/lotus/pull/5393.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/filecoin-project/lotus", + "cwes": [], + "commits": [ + "d1abc3cb5feaaf275dbb7431c259a67ba437c709" + ] + }, + { + "id": "CVE-2024-56327", + "published": "2024-12-19T23:15:07", + "modified": "2025-01-15T05:16:50.248936", + "details": "pyrage is a set of Python bindings for the rage file encryption library (age in Rust). `pyrage` uses the Rust `age` crate for its underlying operations, and `age` is vulnerable to GHSA-4fg7-vxc8-qx5w. All details of GHSA-4fg7-vxc8-qx5w are relevant to `pyrage` for the versions specified in this advisory. See GHSA-4fg7-vxc8-qx5w for full details. Versions of `pyrage` before 1.2.0 lack plugin support and are therefore **not affected**. An equivalent issue was fixed in [the reference Go implementation of age](https://github.com/FiloSottile/age), see advisory GHSA-32gq-x56h-299c. This issue has been addressed in version 1.2.3 and all users are advised to update. There are no known workarounds for this vulnerability.", + "repo_url": "https://github.com/filosottile/age", + "cwes": [], + "commits": [ + "c6dcfa1efcaa27879762a934d5bea0d1b83a894c" + ] + }, + { + "id": "CVE-2023-24533", + "published": "2023-03-08T20:15:09", + "modified": "2025-01-15T04:43:19.529664", + "details": "Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/filosottile/nistec", + "cwes": [], + "commits": [ + "a82cab4ea6f0bd2cb4038d4dc26f1b6b8b687ae3" + ] + }, + { + "id": "CVE-2021-21296", + "published": "2021-02-10T20:15:15", + "modified": "2025-01-15T01:57:54.541320", + "details": "Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. The issue is fixed in Fleet 3.7.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" + } + ], + "repo_url": "https://github.com/fleetdm/fleet", + "cwes": [], + "commits": [ + "4c27a6786a0ad78cd52aeb55fb7f07502053695d" + ] + }, + { + "id": "CVE-2022-24841", + "published": "2022-04-18T22:15:08", + "modified": "2025-01-15T02:25:48.910508", + "details": "fleetdm/fleet is an open source device management, built on osquery. All versions of fleet making use of the teams feature are affected by this authorization bypass issue. Fleet instances without teams, or with teams but without restricted team accounts are not affected. In affected versions a team admin can erroneously add themselves as admin, maintainer or observer on other teams. Users are advised to upgrade to version 4.13. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/fleetdm/fleet", + "cwes": [], + "commits": [ + "4c27a6786a0ad78cd52aeb55fb7f07502053695d" + ] + }, + { + "id": "CVE-2022-23600", + "published": "2022-02-04T23:15:15", + "modified": "2025-01-15T02:16:43.077509", + "details": "fleet is an open source device management, built on osquery. Versions prior to 4.9.1 expose a limited ability to spoof SAML authentication with missing audience verification. This impacts deployments using SAML SSO in two specific cases: 1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same Identity Provider (IdP) configured with Fleet. 2. A user with an account in Fleet could reuse a SAML response intended for another SP to log into Fleet. This is only a concern if the user is blocked from Fleet in the IdP, but continues to have an account in Fleet. If the user is blocked from the IdP entirely, this cannot be exploited. Fleet 4.9.1 resolves this issue. Users unable to upgrade should: Reduce the length of sessions on your IdP to reduce the window for malicious re-use, Limit the amount of SAML Service Providers/Applications used by user accounts with access to Fleet, and When removing access to Fleet in the IdP, delete the Fleet user from Fleet as well.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/fleetdm/fleet", + "cwes": [], + "commits": [ + "4c27a6786a0ad78cd52aeb55fb7f07502053695d" + ] + }, + { + "id": "CVE-2020-26276", + "published": "2020-12-17T20:15:13", + "modified": "2025-01-15T01:56:03.907688", + "details": "Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/fleetdm/fleet", + "cwes": [], + "commits": [ + "4c27a6786a0ad78cd52aeb55fb7f07502053695d" + ] + }, + { + "id": "CVE-2024-0960", + "published": "2024-01-27T12:15:07", + "modified": "2025-01-14T12:09:13.237727", + "details": "A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \\ai_flow\\cli\\commands\\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/flink-extended/ai-flow", + "cwes": [], + "commits": [ + "97e6830be8463c226a01f62daf7c212bdcbf272a" + ] + }, + { + "id": "CVE-2024-31457", + "published": "2024-04-09T18:15:10", + "modified": "2025-01-15T05:12:03.058214", + "details": "gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. gin-vue-admin pseudoversion 0.0.0-20240407133540-7bc7c3051067, corresponding to version 2.6.1, has a code injection vulnerability in the backend. In the Plugin System -> Plugin Template feature, an attacker can perform directory traversal by manipulating the `plugName` parameter. They can create specific folders such as `api`, `config`, `global`, `model`, `router`, `service`, and `main.go` function within the specified traversal directory. Moreover, the Go files within these folders can have arbitrary code inserted based on a specific PoC parameter. The main reason for the existence of this vulnerability is the controllability of the PlugName field within the struct. Pseudoversion 0.0.0-20240409100909-b1b7427c6ea6, corresponding to commit b1b7427c6ea6c7a027fa188c6be557f3795e732b, contains a patch for the issue. As a workaround, one may manually use a filtering method available in the GitHub Security Advisory to rectify the directory traversal problem.", + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403", + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2024-37896", + "published": "2024-06-17T20:15:14", + "modified": "2025-01-15T05:14:39.324693", + "details": "Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit `53d033821` which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403", + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2022-47762", + "published": "2023-02-03T21:15:10", + "modified": "2025-01-14T11:16:59.573245", + "details": "In gin-vue-admin < 2.5.5, the download module has a Path Traversal vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403", + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2021-44219", + "published": "2021-11-24T23:15:08", + "modified": "2025-01-14T10:01:56.024555", + "details": "Gin-Vue-Admin before 2.4.6 mishandles a SQL database.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2022-24843", + "published": "2022-04-13T22:15:08", + "modified": "2025-02-19T03:23:08.827450", + "details": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2022-21660", + "published": "2022-02-09T20:15:12", + "modified": "2025-01-14T10:40:22.910348", + "details": "Gin-vue-admin is a backstage management system based on vue and gin. In versions prior to 2.4.7 low privilege users are able to modify higher privilege users. Authentication is missing on the `setUserInfo` function. Users are advised to update as soon as possible. There are no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2022-32177", + "published": "2022-10-14T07:15:09", + "modified": "2025-02-19T03:27:42.410890", + "details": "In \"Gin-Vue-Admin\", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin\u2019s cookie leading to account takeover.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403" + ] + }, + { + "id": "CVE-2022-39345", + "published": "2022-10-25T17:15:56", + "modified": "2025-01-14T11:08:27.543086", + "details": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin prior to 2.5.4 is vulnerable to path traversal, which leads to file upload vulnerabilities. Version 2.5.4 contains a patch for this issue. There are no workarounds aside from upgrading to a patched version.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403", + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2022-39305", + "published": "2022-10-24T14:15:51", + "modified": "2025-01-14T11:08:01.504762", + "details": "Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403", + "b1c6d26a0f2f9386a70e321b90b63b8722a16b4a" + ] + }, + { + "id": "CVE-2022-32176", + "published": "2022-10-17T19:15:09", + "modified": "2025-02-19T03:27:41.517528", + "details": "In \"Gin-Vue-Admin\", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the \"Compress Upload\" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/flipped-aurora/gin-vue-admin", + "cwes": [], + "commits": [ + "3b6e6495c5e58230ce8006116d7aaefb2b08c403" + ] + }, + { + "id": "CVE-2023-51699", + "published": "2024-03-15T19:15:06", + "modified": "2025-01-15T05:03:00.562980", + "details": "Fluid is an open source Kubernetes-native Distributed Dataset Orchestrator and Accelerator for data-intensive applications. An OS command injection vulnerability within the Fluid project's JuicefsRuntime can potentially allow an authenticated user, who has the authority to create or update the K8s CRD Dataset/JuicefsRuntime, to execute arbitrary OS commands within the juicefs related containers. This could lead to unauthorized access, modification or deletion of data. Users who're using versions < 0.9.3 with JuicefsRuntime should upgrade to v0.9.3.", + "repo_url": "https://github.com/fluid-cloudnative/fluid", + "cwes": [], + "commits": [ + "8ffdd288114ea4f21d4b2c66abbfb8e023933699" + ] + }, + { + "id": "CVE-2023-30840", + "published": "2023-05-08T18:15:14", + "modified": "2025-01-15T04:51:40.095228", + "details": "Fluid is an open source Kubernetes-native distributed dataset orchestrator and accelerator for data-intensive applications. Starting in version 0.7.0 and prior to version 0.8.6, if a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the `csi-nodeplugin-fluid` node-daemonset), they can leverage the fluid-csi service account to modify specs of all the nodes in the cluster. However, since this service account lacks `list node` permissions, the attacker may need to use other techniques to identify vulnerable nodes.\n\nOnce the attacker identifies and modifies the node specs, they can manipulate system-level-privileged components to access all secrets in the cluster or execute pods on other nodes. This allows them to elevate privileges beyond the compromised node and potentially gain full privileged access to the whole cluster.\n\nTo exploit this vulnerability, the attacker can make all other nodes unschedulable (for example, patch node with taints) and wait for system-critical components with high privilege to appear on the compromised node. However, this attack requires two prerequisites: a compromised node and identifying all vulnerable nodes through other means.\n\nVersion 0.8.6 contains a patch for this issue. As a workaround, delete the `csi-nodeplugin-fluid` daemonset in `fluid-system` namespace and avoid using CSI mode to mount FUSE file systems. Alternatively, using sidecar mode to mount FUSE file systems is recommended.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/fluid-cloudnative/fluid", + "cwes": [], + "commits": [ + "8ffdd288114ea4f21d4b2c66abbfb8e023933699" + ] + }, + { + "id": "CVE-2023-34236", + "published": "2023-07-14T22:15:09", + "modified": "2025-02-19T03:33:45.669084", + "details": "Weave GitOps Terraform Controller (aka Weave TF-controller) is a controller for Flux to reconcile Terraform resources in a GitOps way. A vulnerability has been identified in Weave GitOps Terraform Controller which could allow an authenticated remote attacker to view sensitive information. This vulnerability stems from Weave GitOps Terraform Runners (`tf-runner`), where sensitive data is inadvertently printed - potentially revealing sensitive user data in their pod logs. In particular, functions `tfexec.ShowPlan`, `tfexec.ShowPlanRaw`, and `tfexec.Output` are implicated when the `tfexec` object set its `Stdout` and `Stderr` to be `os.Stdout` and `os.Stderr`. An unauthorized remote attacker could exploit this vulnerability by accessing these prints of sensitive information, which may contain configurations or tokens that could be used to gain unauthorized control or access to resources managed by the Terraform controller. A successful exploit could allow the attacker to utilize this sensitive data, potentially leading to unauthorized access or control of the system. This vulnerability has been addressed in Weave GitOps Terraform Controller versions `v0.14.4` and `v0.15.0-rc.5`. Users are urged to upgrade to one of these versions to mitigate the vulnerability. As a temporary measure until the patch can be applied, users can add the environment variable `DISABLE_TF_LOGS` to the tf-runners via the runner pod template of the Terraform Custom Resource. This will prevent the logging of sensitive information and mitigate the risk of this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/flux-iac/tofu-controller", + "cwes": [], + "commits": [ + "6481f214e664f2726d7391165b7799489d6c6d33" + ] + }, + { + "id": "CVE-2021-41254", + "published": "2021-11-12T18:15:07", + "modified": "2025-02-19T03:22:51.530150", + "details": "kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges. In affected versions multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue. This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image. To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "c4261399b548734f17203c02377083669d24704f" + ] + }, + { + "id": "CVE-2022-36035", + "published": "2022-08-31T15:15:08", + "modified": "2025-02-19T03:28:03.879585", + "details": "Flux is a tool for keeping Kubernetes clusters in sync with sources of configuration (like Git repositories), and automating updates to configuration when there is new code to deploy. Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of user-supplied input, which results in a path traversal that can be controlled by the attacker. Users sharing the same shell between other applications and the Flux CLI commands could be affected by this vulnerability. In some scenarios no errors may be presented, which may cause end users not to realize that something is amiss. A safe workaround is to execute Flux CLI in ephemeral and isolated shell environments, which can ensure no persistent values exist from previous processes. However, upgrading to the latest version of the CLI is still the recommended mitigation strategy.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "fe3e0efcf1060bd5b3332b1d717243401b34c305" + ] + }, + { + "id": "CVE-2022-36049", + "published": "2022-09-07T21:15:08", + "modified": "2025-02-19T03:28:09.226009", + "details": "Flux2 is a tool for keeping Kubernetes clusters in sync with sources of configuration, and Flux's helm-controller is a Kubernetes operator that allows one to declaratively manage Helm chart releases. Helm controller is tightly integrated with the Helm SDK. A vulnerability found in the Helm SDK that affects flux2 v0.0.17 until v0.32.0 and helm-controller v0.0.4 until v0.23.0 allows for specific data inputs to cause high memory consumption. In some platforms, this could cause the controller to panic and stop processing reconciliations. In a shared cluster multi-tenancy environment, a tenant could create a HelmRelease that makes the controller panic, denying all other tenants from their Helm releases being reconciled. Patches are available in flux2 v0.32.0 and helm-controller v0.23.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "c4261399b548734f17203c02377083669d24704f", + "fe3e0efcf1060bd5b3332b1d717243401b34c305" + ] + }, + { + "id": "CVE-2022-24877", + "published": "2022-05-06T01:15:09", + "modified": "2025-02-19T03:23:10.113541", + "details": "Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to expose sensitive data from the controller\u2019s pod filesystem and possibly privilege escalation in multi-tenancy deployments. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "c4261399b548734f17203c02377083669d24704f" + ] + }, + { + "id": "CVE-2022-24817", + "published": "2022-05-06T00:15:07", + "modified": "2025-02-19T03:23:13.521085", + "details": "Flux2 is an open and extensible continuous delivery solution for Kubernetes. Flux2 versions between 0.1.0 and 0.29.0, helm-controller 0.1.0 to v0.19.0, and kustomize-controller 0.1.0 to v0.23.0 are vulnerable to Code Injection via malicious Kubeconfig. In multi-tenancy deployments this can also lead to privilege escalation if the controller's service account has elevated permissions. Workarounds include disabling functionality via Validating Admission webhooks by restricting users from setting the `spec.kubeConfig` field in Flux `Kustomization` and `HelmRelease` objects. Additional mitigations include applying restrictive AppArmor and SELinux profiles on the controller\u2019s pod to limit what binaries can be executed. This vulnerability is fixed in kustomize-controller v0.23.0 and helm-controller v0.19.0, both included in flux2 v0.29.0", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "c4261399b548734f17203c02377083669d24704f" + ] + }, + { + "id": "CVE-2022-24878", + "published": "2022-05-06T02:15:07", + "modified": "2025-02-19T03:23:13.731042", + "details": "Flux is an open and extensible continuous delivery solution for Kubernetes. Path Traversal in the kustomize-controller via a malicious `kustomization.yaml` allows an attacker to cause a Denial of Service at the controller level. Workarounds include automated tooling in the user's CI/CD pipeline to validate `kustomization.yaml` files conform with specific policies. This vulnerability is fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0. Users are recommended to upgrade.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "c4261399b548734f17203c02377083669d24704f" + ] + }, + { + "id": "CVE-2022-39272", + "published": "2022-10-22T00:15:09", + "modified": "2025-02-19T03:29:46.476086", + "details": "Flux is an open and extensible continuous delivery solution for Kubernetes. Versions prior to 0.35.0 are subject to a Denial of Service. Users that have permissions to change Flux\u2019s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields `.spec.interval` or `.spec.timeout` (and structured variations of these fields), causing the entire object type to stop being processed. This issue is patched in version 0.35.0. As a workaround, Admission controllers can be employed to restrict the values that can be used for fields `.spec.interval` and `.spec.timeout`, however upgrading to the latest versions is still the recommended mitigation.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], + "repo_url": "https://github.com/fluxcd/flux2", + "cwes": [], + "commits": [ + "c4261399b548734f17203c02377083669d24704f", + "fe3e0efcf1060bd5b3332b1d717243401b34c305" + ] + }, + { + "id": "CVE-2024-31216", + "published": "2024-05-15T16:15:10", + "modified": "2025-01-15T05:12:44.782582", + "details": "The source-controller is a Kubernetes operator, specialised in artifacts acquisition from external sources such as Git, OCI, Helm repositories and S3-compatible buckets. The source-controller implements the source.toolkit.fluxcd.io API and is a core component of the GitOps toolkit. Prior to version 1.2.5, when source-controller was configured to use an Azure SAS token when connecting to Azure Blob Storage, the token was logged along with the Azure URL when the controller encountered a connection error. An attacker with access to the source-controller logs could use the token to gain access to the Azure Blob Storage until the token expires. This vulnerability was fixed in source-controller v1.2.5. There is no workaround for this vulnerability except for using a different auth mechanism such as Azure Workload Identity.", + "repo_url": "https://github.com/fluxcd/source-controller", + "cwes": [], + "commits": [ + "452c308db43839b202db21181d4c61756203be05" + ] + }, + { + "id": "CVE-2023-41891", + "published": "2023-10-30T19:15:07", + "modified": "2025-01-15T04:57:57.251444", + "details": "FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/flyteorg/flyteadmin", + "cwes": [], + "commits": [ + "f18839d61860dfa837c1540aa16d8a2beb9e4d89" + ] + }, + { + "id": "CVE-2022-31145", + "published": "2022-07-13T21:15:08", + "modified": "2025-01-15T02:22:03.643092", + "details": "FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating signing keys immediately will invalidate all open sessions and force all users to attempt to obtain new tokens. Those who use this workaround should continue to rotate keys until FlyteAdmin has been upgraded and hide FlyteAdmin deployment ingress URL from the internet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/flyteorg/flyteadmin", + "cwes": [], + "commits": [ + "f18839d61860dfa837c1540aa16d8a2beb9e4d89" + ] + }, + { + "id": "CVE-2022-39273", + "published": "2022-10-06T18:16:15", + "modified": "2025-02-19T03:29:39.998030", + "details": "FlyteAdmin is the control plane for the data processing platform Flyte. Users who enable the default Flyte\u2019s authorization server without changing the default clientid hashes will be exposed to the public internet. In an effort to make enabling authentication easier for Flyte administrators, the default configuration for Flyte Admin allows access for Flyte Propeller even after turning on authentication via a hardcoded hashed password. This password is also set on the default Flyte Propeller configmap in the various Flyte Helm charts. Users who enable auth but do not override this setting in Flyte Admin\u2019s configuration may unbeknownst to them be allowing public traffic in by way of this default password with attackers effectively impersonating propeller. This only applies to users who have not specified the ExternalAuthorizationServer setting. Usage of an external auth server automatically turns off this default configuration and are not susceptible to this vulnerability. This issue has been addressed in version 1.1.44. Users should manually set the staticClients in the selfAuthServer section of their configuration if they intend to rely on Admin\u2019s internal auth server. Again, users who use an external auth server are automatically protected from this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/flyteorg/flyteadmin", + "cwes": [], + "commits": [ + "f18839d61860dfa837c1540aa16d8a2beb9e4d89" + ] + }, + { + "id": "CVE-2023-27582", + "published": "2023-03-13T22:15:12", + "modified": "2025-01-15T04:48:38.943627", + "details": "maddy is a composable, all-in-one mail server. Starting with version 0.2.0 and prior to version 0.6.3, maddy allows a full authentication bypass if SASL authorization username is specified when using the PLAIN authentication mechanisms. Instead of validating the specified username, it is accepted as is after checking the credentials for the authentication username. maddy 0.6.3 includes the fix for the bug. There are no known workarounds.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/foxcpp/maddy", + "cwes": [], + "commits": [ + "8f1d57293cb2135da75503e853101d8e0b7f3743" + ] + }, + { + "id": "CVE-2021-42583", + "published": "2021-12-28T19:15:07", + "modified": "2025-01-14T09:58:35.053189", + "details": "A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/foxcpp/maddy", + "cwes": [], + "commits": [ + "8f1d57293cb2135da75503e853101d8e0b7f3743" + ] + }, + { + "id": "CVE-2022-24732", + "published": "2022-03-09T20:15:08", + "modified": "2025-01-15T02:17:36.577075", + "details": "Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/foxcpp/maddy", + "cwes": [], + "commits": [ + "8f1d57293cb2135da75503e853101d8e0b7f3743" + ] + }, + { + "id": "CVE-2023-47347", + "published": "2023-11-15T22:15:27", + "modified": "2025-01-14T12:03:55.589538", + "details": "Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2023-47346", + "published": "2023-11-13T22:15:07", + "modified": "2025-01-14T12:03:55.431815", + "details": "Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2023-47025", + "published": "2023-11-16T23:15:08", + "modified": "2025-01-14T12:03:28.290618", + "details": "An issue in Free5gc v.3.3.0 allows a local attacker to cause a denial of service via the free5gc-compose component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2023-47345", + "published": "2023-11-15T22:15:27", + "modified": "2025-01-14T12:03:55.979997", + "details": "Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2023-49391", + "published": "2023-12-22T11:15:07", + "modified": "2025-01-14T12:06:09.543838", + "details": "An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2022-38871", + "published": "2022-11-18T23:15:20", + "modified": "2025-01-14T11:09:14.307688", + "details": "In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2022-38870", + "published": "2022-10-25T17:15:55", + "modified": "2025-01-14T11:09:12.436222", + "details": "Free5gc v3.2.1 is vulnerable to Information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2022-43677", + "published": "2022-10-24T14:15:53", + "modified": "2025-01-14T11:13:19.150155", + "details": "In free5GC 3.2.1, a malformed NGAP message can crash the AMF and NGAP decoders via an index-out-of-range panic in aper.GetBitString.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/free5gc/free5gc", + "cwes": [], + "commits": [ + "04340eb8493ba98178ecc725e38ed8677f08d16e" + ] + }, + { + "id": "CVE-2023-46324", + "published": "2023-10-23T01:15:07", + "modified": "2025-01-14T12:02:36.373894", + "details": "pkg/suci/suci.go in free5GC udm before 1.2.0, when Go before 1.19 is used, allows an Invalid Curve Attack because it may compute a shared secret via an uncompressed public key that has not been validated. An attacker can send arbitrary SUCIs to the UDM, which tries to decrypt them via both its private key and the attacker's public key.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/free5gc/udm", + "cwes": [], + "commits": [ + "dd730c193e4f2fefc6d4f9620f2a2452c89f93fd" + ] + }, + { + "id": "CVE-2022-36078", + "published": "2022-09-02T13:15:08", + "modified": "2025-01-14T11:03:57.904685", + "details": "Binary provides encoding/decoding in Borsh and other formats. The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program. When using `github.com/gagliardetto/binary` to parse unchecked (or wrong type of) data from untrusted sources of input (e.g. the blockchain) into slices, it's possible to allocate memory with excessive size. When `dec.Decode(&val)` method is used to parse data into a structure that is or contains slices of values, the length of the slice was previously read directly from the data itself without any checks on the size of it, and then a slice was allocated. This could lead to an overflow and an allocation of memory with excessive size value. Users should upgrade to `v0.7.1` or higher. A workaround is not to rely on the `dec.Decode(&val)` function to parse the data, but to use a custom `UnmarshalWithDecoder()` method that reads and checks the length of any slice.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/gagliardetto/binary", + "cwes": [], + "commits": [ + "2b2638040b6d1921df7e9247b441a630ba80d517" + ] + }, + { + "id": "CVE-2023-44392", + "published": "2023-10-09T20:15:10", + "modified": "2025-01-15T04:59:09.456035", + "details": "Garden provides automation for Kubernetes development and testing. Prior tov ersions 0.13.17 and 0.12.65, Garden has a dependency on the cryo library, which is vulnerable to code injection due to an insecure implementation of deserialization. Garden stores serialized objects using cryo in the Kubernetes `ConfigMap` resources prefixed with `test-result` and `run-result` to cache Garden test and run results. These `ConfigMaps` are stored either in the `garden-system` namespace or the configured user namespace. When a user invokes the command `garden test` or `garden run` objects stored in the `ConfigMap` are retrieved and deserialized. This can be used by an attacker with access to the Kubernetes cluster to store malicious objects in the `ConfigMap`, which can trigger a remote code execution on the users machine when cryo deserializes the object. In order to exploit this vulnerability, an attacker must have access to the Kubernetes cluster used to deploy garden remote environments. Further, a user must actively invoke either a `garden test` or `garden run` which has previously cached results. The issue has been patched in Garden versions `0.13.17` (Bonsai) and `0.12.65` (Acorn). Only Garden versions prior to these are vulnerable. No known workarounds are available.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/garden-io/garden", + "cwes": [], + "commits": [ + "af5fea7e2fe52d33cefd77a4130706b3f7f16fe8" + ] + }, + { + "id": "CVE-2022-24829", + "published": "2022-04-11T20:15:20", + "modified": "2025-01-15T02:18:12.455858", + "details": "Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it accessible to anyone on the same network (or anyone on the internet if they are on a public, static IP). This may lead to the ability to compromise credentials, secrets or environment variables. Users are advised to upgrade to version 0.12.39 as soon as possible. Users unable to upgrade should use a firewall blocking access to port 9777 from all untrusted network machines.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/garden-io/garden", + "cwes": [], + "commits": [ + "af5fea7e2fe52d33cefd77a4130706b3f7f16fe8" + ] + }, + { + "id": "CVE-2017-11671", + "published": "2017-07-26T21:29:00", + "modified": "2025-01-14T07:20:52.551768", + "details": "Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/gcc-mirror/gcc", + "cwes": [], + "commits": [ + "4cf01c09fe137b7a70b9879ca396823615962eb3" + ] + }, + { + "id": "CVE-2023-37786", + "published": "2023-07-13T17:15:09", + "modified": "2025-01-14T11:50:06.576066", + "details": "Multiple cross-site scripting (XSS) vulnerabilities in Geeklog v2.2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Mail Settings[backend], Mail Settings[host], Mail Settings[port] and Mail Settings[auth] parameters of the /admin/configuration.php.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/geeklog-core/geeklog", + "cwes": [], + "commits": [ + "ef48c658c253a8d0ed28209ba8d5471489dcb472" + ] + }, + { + "id": "CVE-2023-37787", + "published": "2023-07-13T17:15:09", + "modified": "2025-01-14T11:50:06.639398", + "details": "Multiple cross-site scripting (XSS) vulnerabilities in Geeklog v2.2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Rule and Route parameters of /admin/router.php.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/geeklog-core/geeklog", + "cwes": [], + "commits": [ + "ef48c658c253a8d0ed28209ba8d5471489dcb472" + ] + }, + { + "id": "CVE-2023-46058", + "published": "2023-10-24T00:15:08", + "modified": "2025-01-14T12:02:48.012313", + "details": "Cross Site Scripting (XSS) vulnerability in Geeklog-Core geeklog v.2.2.2 allows a remote attacker to execute arbitrary code via a crafted payload to the grp_desc parameter of the admin/group.php component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/geeklog-core/geeklog", + "cwes": [], + "commits": [ + "ef48c658c253a8d0ed28209ba8d5471489dcb472" + ] + }, + { + "id": "CVE-2023-46059", + "published": "2023-10-24T00:15:08", + "modified": "2025-01-14T12:02:47.599381", + "details": "Cross Site Scripting (XSS) vulnerability in Geeklog-Core geeklog v.2.2.2 allows a remote attacker to execute arbitrary code via a crafted payload to the Service, and website URL to Ping parameters of the admin/trackback.php component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/geeklog-core/geeklog", + "cwes": [], + "commits": [ + "ef48c658c253a8d0ed28209ba8d5471489dcb472" + ] + }, + { + "id": "CVE-2021-38197", + "published": "2021-08-08T16:15:07", + "modified": "2025-01-14T09:29:13.838335", + "details": "unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gen2brain/go-unarr", + "cwes": [], + "commits": [ + "a9c9a14faa9e11d8ca8ba5b98d0d4f82215ce17c" + ] + }, + { + "id": "CVE-2023-28424", + "published": "2023-03-20T13:15:11", + "modified": "2025-01-14T11:37:08.234912", + "details": "Soko if the code that powers packages.gentoo.org. Prior to version 1.0.2, the two package search handlers, `Search` and `SearchFeed`, implemented in `pkg/app/handler/packages/search.go`, are affected by a SQL injection via the `q` parameter. As a result, unauthenticated attackers can execute arbitrary SQL queries on `https://packages.gentoo.org/`. It was also demonstrated that primitive was enough to gain code execution in the context of the PostgreSQL container. The issue was addressed in commit `4fa6e4b619c0362728955b6ec56eab0e0cbf1e23y` of version 1.0.2 using prepared statements to interpolate user-controlled data in SQL queries.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gentoo/soko", + "cwes": [], + "commits": [ + "0e8a1a49290b7b08f31c603d3895f60bb38d5bb7" + ] + }, + { + "id": "CVE-2023-26033", + "published": "2023-02-25T00:15:11", + "modified": "2025-01-14T11:35:10.778979", + "details": "Gentoo soko is the code that powers packages.gentoo.org. Versions prior to 1.0.1 are vulnerable to SQL Injection, leading to a Denial of Service. If the user selects (in user preferences) the \"Recently Visited Packages\" view for the index page, the value of the `search_history` cookie is used as a base64 encoded comma separated list of atoms. These are string loaded directly into the SQL query with `atom = '%s'` format string. As a result, any user can modify the browser's cookie value and inject most SQL queries. A proof of concept malformed cookie was generated that wiped the database or changed it's content. On the database, only public data is stored, so there is no confidentiality issues to site users. If it is known that the database was modified, a full restoration of data is possible by performing a full database wipe and performing full update of all components. This issue is patched with commit id 5ae9ca83b73. Version 1.0.1 contains the patch. If users are unable to upgrade immediately, the following workarounds may be applied: (1.) Use a proxy to always drop the `search_history` cookie until upgraded. The impact on user experience is low. (2.) Sanitize to the value of `search_history` cookie after base64 decoding it.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/gentoo/soko", + "cwes": [], + "commits": [ + "0e8a1a49290b7b08f31c603d3895f60bb38d5bb7" + ] + }, + { + "id": "CVE-2020-26772", + "published": "2021-09-08T21:15:09", + "modified": "2025-01-14T08:41:45.609331", + "details": "Command Injection in PPGo_Jobs v2.8.0 allows remote attackers to execute arbitrary code via the 'AjaxRun()' function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/george518/ppgo_job", + "cwes": [], + "commits": [ + "d1aef8d5e1c7fec896c604d45f8c37565b68aa0d" + ] + }, + { + "id": "CVE-2023-32691", + "published": "2023-05-30T04:15:09", + "modified": "2025-02-19T03:33:24.966650", + "details": "gost (GO Simple Tunnel) is a simple tunnel written in golang. Sensitive secrets such as passwords, token and API keys should be compared only using a constant-time comparison function. Untrusted input, sourced from a HTTP header, is compared directly with a secret. Since this comparison is not secure, an attacker can mount a side-channel timing attack to guess the password. As a workaround, this can be easily fixed using a constant time comparing function such as `crypto/subtle`'s `ConstantTimeCompare`. \n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/ginuerzh/gost", + "cwes": [], + "commits": [ + "729d0e70005607dc7c69fc1de62fd8fe21f85355" + ] + }, + { + "id": "CVE-2022-41953", + "published": "2023-01-17T22:15:10", + "modified": "2025-02-19T03:32:09.079842", + "details": "Git GUI is a convenient graphical tool that comes with Git for Windows. Its target audience is users who are uncomfortable with using Git on the command-line. Git GUI has a function to clone repositories. Immediately after the local clone is available, Git GUI will automatically post-process it, among other things running a spell checker called `aspell.exe` if it was found. Git GUI is implemented as a Tcl/Tk script. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable _always includes the current directory_. Therefore, malicious repositories can ship with an `aspell.exe` in their top-level directory which is executed by Git GUI without giving the user a chance to inspect it first, i.e. running untrusted code. This issue has been addressed in version 2.39.1. Users are advised to upgrade. Users unable to upgrade should avoid using Git GUI for cloning. If that is not a viable option, at least avoid cloning from untrusted sources.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2023-29011", + "published": "2023-04-25T21:15:10", + "modified": "2025-02-19T03:34:57.132947", + "details": "Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\\etc\\connectrc`. Since `C:\\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `:\\etc\\connectrc` files on multi-user machines.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2023-29012", + "published": "2023-04-25T21:15:10", + "modified": "2025-02-19T03:34:53.636718", + "details": "Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2023-22743", + "published": "2023-02-14T21:15:12", + "modified": "2025-02-19T03:32:16.302893", + "details": "Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, by carefully crafting DLL and putting into a subdirectory of a specific name living next to the Git for Windows installer, Windows can be tricked into side-loading said DLL. This potentially allows users with local write access to place malicious payloads in a location where automated upgrades might run the Git for Windows installer with elevation. Version 2.39.2 contains a patch for this issue. Some workarounds are available. Never leave untrusted files in the Downloads folder or its sub-folders before executing the Git for Windows installer, or move the installer into a different directory before executing it.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2023-23618", + "published": "2023-02-14T21:15:13", + "modified": "2025-01-15T04:44:16.870186", + "details": "Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI's \"Visualize History\" functionality) in clones of untrusted repositories.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2022-24767", + "published": "2022-04-12T18:15:09", + "modified": "2025-02-19T03:28:39.686857", + "details": "GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2022-31012", + "published": "2022-07-12T21:15:09", + "modified": "2025-02-19T03:28:14.067124", + "details": "Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows' installer execute a binary into `C:\\mingw64\\bin\\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\\`.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2016-9274", + "published": "2016-11-11T17:59:00", + "modified": "2025-02-19T02:18:24.635802", + "details": "Untrusted search path vulnerability in Git 1.x for Windows allows local users to gain privileges via a Trojan horse git.exe file in the current working directory. NOTE: 2.x is unaffected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/git-for-windows/git", + "cwes": [], + "commits": [ + "34d5217584ee4722d0c0b07ed6c8f1f01ad157c3" + ] + }, + { + "id": "CVE-2021-32638", + "published": "2021-05-25T17:15:08", + "modified": "2025-01-15T01:55:09.659316", + "details": "Github's CodeQL action is provided to run CodeQL-based code scanning on non-GitHub CI/CD systems and requires a GitHub access token to connect to a GitHub repository. The runner and its documentation previously suggested passing the GitHub token as a command-line parameter to the process instead of reading it from a file, standard input, or an environment variable. This approach made the token visible to other processes on the same machine, for example in the output of the `ps` command. If the CI system publicly exposes the output of `ps`, for example by logging the output, then the GitHub access token can be exposed beyond the scope intended. Users of the CodeQL runner on 3rd-party systems, who are passing a GitHub token via the `--github-auth` flag, are affected. This applies to both GitHub.com and GitHub Enterprise users. Users of the CodeQL Action on GitHub Actions are not affected. The `--github-auth` flag is now considered insecure and deprecated. The undocumented `--external-repository-token` flag has been removed. To securely provide a GitHub access token to the CodeQL runner, users should **do one of the following instead**: Use the `--github-auth-stdin` flag and pass the token on the command line via standard input OR set the `GITHUB_TOKEN` environment variable to contain the token, then call the command without passing in the token. The old flag remains present for backwards compatibility with existing workflows. If the user tries to specify an access token using the `--github-auth` flag, there is a deprecation warning printed to the terminal that directs the user to one of the above options. All CodeQL runner releases codeql-bundle-20210304 onwards contain the patches. We recommend updating to a recent version of the CodeQL runner, storing a token in your CI system's secret storage mechanism, and passing the token to the CodeQL runner using `--github-auth-stdin` or the `GITHUB_TOKEN` environment variable. If still using the old flag, ensure that process output, such as from `ps`, is not persisted in CI logs.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/github/codeql-action", + "cwes": [], + "commits": [ + "0dc37c7260df8e43e9d5a7d4455662fda84240b3" + ] + }, + { + "id": "CVE-2025-24362", + "published": "2025-01-24T18:15:32", + "modified": "2025-01-25T01:57:57.337756", + "details": "In some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the workflow. Users with read access to the repository would be able to access this artifact, containing any secrets from the environment. This vulnerability is patched in CodeQL Action version 3.28.3 or later, or CodeQL CLI version 2.20.3 or later.\n\nFor some affected workflow runs, the exposed environment variables in the debug artifacts included a valid `GITHUB_TOKEN` for the workflow run, which has access to the repository in which the workflow ran, and all the permissions specified in the workflow or job. The `GITHUB_TOKEN` is valid until the job completes or 24 hours has elapsed, whichever comes first.\n\nEnvironment variables are exposed only from workflow runs that satisfy all of the following conditions:\n- Code scanning workflow configured to scan the Java/Kotlin languages.\n- Running in a repository containing Kotlin source code.\n- Running with debug artifacts enabled.\n- Using CodeQL Action versions <= 3.28.2, and CodeQL CLI versions >= 2.9.2 (May 2022) and <= 2.20.2.\n- The workflow run fails before the CodeQL database is finalized within the `github/codeql-action/analyze` step.\n- Running in any GitHub environment: GitHub.com, GitHub Enterprise Cloud, and GitHub Enterprise Server. Note: artifacts are only accessible to users within the same GitHub environment with access to the scanned repo.\n\nThe `GITHUB_TOKEN` exposed in this way would only have been valid for workflow runs that satisfy all of the following conditions, in addition to the conditions above:\n- Using CodeQL Action versions >= 3.26.11 (October 2024) and <= 3.28.2, or >= 2.26.11 and < 3.\n- Running in GitHub.com or GitHub Enterprise Cloud only (not valid on GitHub Enterprise Server).\n\nIn rare cases during advanced setup, logging of environment variables may also occur during database creation of Java, Swift, and C/C++. Please read the corresponding CodeQL CLI advisory GHSA-gqh3-9prg-j95m for more details.\n\nIn CodeQL CLI versions >= 2.9.2 and <= 2.20.2, the CodeQL Kotlin extractor logs all environment variables by default into an intermediate file during the process of creating a CodeQL database for Kotlin code. This is a part of the CodeQL CLI and is invoked by the CodeQL Action for analyzing Kotlin repositories. \n\nOn Actions, the environment variables logged include GITHUB_TOKEN, which grants permissions to the repository being scanned.\nThe intermediate file containing environment variables is deleted when finalizing the database, so it is not included in a successfully created database. It is, however, included in the debug artifact that is uploaded on a failed analysis run if the CodeQL Action was invoked in debug mode.\n\nTherefore, under these specific circumstances (incomplete database creation using the CodeQL Action in debug mode) an attacker with access to the debug artifact would gain unauthorized access to repository secrets from the environment, including both the `GITHUB_TOKEN` and any user-configured secrets made available via environment variables.\n\nThe impact of the `GITHUB_TOKEN` leaked in this environment is limited:\n- For workflows on GitHub.com and GitHub Enterprise Cloud using CodeQL Action versions >= 3.26.11 and <= 3.28.2, or >= 2.26.11 and < 3, which in turn use the `actions/artifacts v4` library, the debug artifact is uploaded before the workflow job completes. During this time the `GITHUB_TOKEN` is still valid, providing an opportunity for attackers to gain access to the repository.\n- For all other workflows, the debug artifact is uploaded after the workflow job completes, at which point the leaked `GITHUB_TOKEN` has been revoked and cannot be used to access the repository.", + "repo_url": "https://github.com/github/codeql-action", + "cwes": [], + "commits": [ + "0dc37c7260df8e43e9d5a7d4455662fda84240b3" + ] + }, + { + "id": "CVE-2022-2251", + "published": "2023-01-17T21:15:12", + "modified": "2025-01-14T10:46:01.712029", + "details": "Improper sanitization of branch names in GitLab Runner affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user who creates a branch with a specially crafted name and gets another user to trigger a pipeline to execute commands in the runner as that other user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gitlabhq/gitlab-runner", + "cwes": [], + "commits": [ + "7178588dc1e747941d1c5b9da759c0c00b6aaa96" + ] + }, + { + "id": "CVE-2020-13295", + "published": "2020-08-10T14:15:13", + "modified": "2025-01-14T08:17:32.671855", + "details": "For GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gitlabhq/gitlab-runner", + "cwes": [], + "commits": [ + "a998cacdcee3e1b21cbb23526f5e7da54e53e047" + ] + }, + { + "id": "CVE-2024-21583", + "published": "2024-07-19T05:15:10", + "modified": "2025-01-15T05:06:39.853501", + "details": "Versions of the package github.com/gitpod-io/gitpod/components/server/go/pkg/lib before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/components/ws-proxy/pkg/proxy before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/install/installer/pkg/components/auth before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/install/installer/pkg/components/public-api-server before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/install/installer/pkg/components/server before main-gha.27122; versions of the package @gitpod/gitpod-protocol before 0.1.5-main-gha.27122 are vulnerable to Cookie Tossing due to a missing __Host- prefix on the _gitpod_io_jwt2_ session cookie. This allows an adversary who controls a subdomain to set the value of the cookie on the Gitpod control plane, which can be assigned to an attacker\u2019s own JWT so that specific actions taken by the victim (such as connecting a new Github organization) are actioned by the attackers session.", + "repo_url": "https://github.com/gitpod-io/gitpod", + "cwes": [], + "commits": [ + "3c0afbafa50dd1e66f385e091fa49c873405faa8" + ] + }, + { + "id": "CVE-2023-0957", + "published": "2023-03-03T08:15:08", + "modified": "2025-01-15T04:38:47.903024", + "details": "An issue was discovered in Gitpod versions prior to release-2022.11.2.16. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to the Gitpod JSONRPC server using a victim\u2019s credentials, because the Origin header is not restricted. This can lead to the extraction of data from workspaces, to a full takeover of the workspace.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gitpod-io/gitpod", + "cwes": [], + "commits": [ + "3c0afbafa50dd1e66f385e091fa49c873405faa8" + ] + }, + { + "id": "CVE-2023-32766", + "published": "2023-06-05T15:15:09", + "modified": "2025-01-31T20:00:51.301146", + "details": "Gitpod before 2022.11.3 allows XSS because redirection can occur for some protocols outside of the trusted set of three (vscode: vscode-insiders: jetbrains-gateway:).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gitpod-io/gitpod", + "cwes": [], + "commits": [ + "3c0afbafa50dd1e66f385e091fa49c873405faa8" + ] + }, + { + "id": "CVE-2021-35206", + "published": "2021-06-22T14:15:09", + "modified": "2025-01-15T02:00:03.884948", + "details": "Gitpod before 0.6.0 allows unvalidated redirects.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gitpod-io/gitpod", + "cwes": [], + "commits": [ + "3c0afbafa50dd1e66f385e091fa49c873405faa8" + ] + }, + { + "id": "CVE-2020-36559", + "published": "2022-12-27T22:15:11", + "modified": "2025-01-15T01:45:28.647399", + "details": "Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/go-aah/aah", + "cwes": [], + "commits": [ + "def102ffcb9e1d3b029a2c3d884ed6407d9a1389" + ] + }, + { + "id": "CVE-2022-42980", + "published": "2022-10-17T07:15:08", + "modified": "2025-02-19T03:28:19.149066", + "details": "go-admin (aka GO Admin) 2.0.12 uses the string go-admin as a production JWT key.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/go-admin-team/go-admin", + "cwes": [], + "commits": [ + "012202478905438be61b0ae3958d4f31df4d340c" + ] + }, + { + "id": "CVE-2020-12666", + "published": "2020-05-05T22:15:13", + "modified": "2025-01-14T08:16:17.156212", + "details": "macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/go-macaron/macaron", + "cwes": [], + "commits": [ + "bbb5ca29768e04c2d5f344c235909f44c8dd0fdd" + ] + }, + { + "id": "CVE-2022-46959", + "published": "2023-01-23T05:15:18", + "modified": "2025-01-14T11:16:29.309697", + "details": "An issue in the component /admin/backups/work-dir of Sonic v1.0.4 allows attackers to execute a directory traversal.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/go-sonic/sonic", + "cwes": [], + "commits": [ + "ec9c203b2721db0589fb8daa2e1f9bba0d4e82ee" + ] + }, + { + "id": "CVE-2020-26294", + "published": "2021-01-04T19:15:15", + "modified": "2025-01-15T01:44:52.494575", + "details": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. In Vela compiler before version 0.6.1 there is a vulnerability which allows exposure of server configuration. It impacts all users of Vela. An attacker can use Sprig's `env` function to retrieve configuration information, see referenced GHSA for an example. This has been fixed in version 0.6.1. In addition to upgrading, it is recommended to rotate all secrets.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/go-vela/compiler", + "cwes": [], + "commits": [ + "f7912c5019d2994e619f2a77d949d0996617c44a" + ] + }, + { + "id": "CVE-2024-28236", + "published": "2024-03-12T21:15:59", + "modified": "2025-02-19T03:37:15.888400", + "details": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. Vela pipelines can use variable substitution combined with insensitive fields like `parameters`, `image` and `entrypoint` to inject secrets into a plugin/image and \u2014 by using common substitution string manipulation \u2014 can bypass log masking and expose secrets without the use of the commands block. This unexpected behavior primarily impacts secrets restricted by the \"no commands\" option. This can lead to unintended use of the secret value, and increased risk of exposing the secret during image execution bypassing log masking. **To exploit this** the pipeline author must be supplying the secrets to a plugin that is designed in such a way that will print those parameters in logs. Plugin parameters are not designed for sensitive values and are often intentionally printed throughout execution for informational/debugging purposes. Parameters should therefore be treated as insensitive. While Vela provides secrets masking, secrets exposure is not entirely solved by the masking process. A docker image (plugin) can easily expose secrets if they are not handled properly, or altered in some way. There is a responsibility on the end-user to understand how values injected into a plugin are used. This is a risk that exists for many CICD systems (like GitHub Actions) that handle sensitive runtime variables. Rather, the greater risk is that users who restrict a secret to the \"no commands\" option and use image restriction can still have their secret value exposed via substitution tinkering, which turns the image and command restrictions into a false sense of security. This issue has been addressed in version 0.23.2. Users are advised to upgrade. Users unable to upgrade should not provide sensitive values to plugins that can potentially expose them, especially in `parameters` that are not intended to be used for sensitive values, ensure plugins (especially those that utilize shared secrets) follow best practices to avoid logging parameters that are expected to be sensitive, minimize secrets with `pull_request` events enabled, as this allows users to change pipeline configurations and pull in secrets to steps not typically part of the CI process, make use of the build approval setting, restricting builds from untrusted users, and limit use of shared secrets, as they are less restrictive to access by nature.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/go-vela/server", + "cwes": [], + "commits": [ + "5a3ffe34701a1451192376bb87e8a03ad361a5ed" + ] + }, + { + "id": "CVE-2021-21432", + "published": "2021-04-09T18:15:13", + "modified": "2025-01-15T01:47:36.105601", + "details": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. An authentication mechanism added in version 0.7.0 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Refer to the referenced GitHub Security Advisory for complete details. This is fixed in version 0.7.5.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/go-vela/server", + "cwes": [], + "commits": [ + "5a3ffe34701a1451192376bb87e8a03ad361a5ed" + ] + }, + { + "id": "CVE-2022-39395", + "published": "2022-11-10T18:15:10", + "modified": "2025-02-19T03:29:46.997185", + "details": "Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. In Vela Server and Vela Worker prior to version 0.16.0 and Vela UI prior to version 0.17.0, some default configurations for Vela allow exploitation and container breakouts. Users should upgrade to Server 0.16.0, Worker 0.16.0, and UI 0.17.0 to fix the issue. After upgrading, Vela administrators will need to explicitly change the default settings to configure Vela as desired. Some of the fixes will interrupt existing workflows and will require Vela administrators to modify default settings. However, not applying the patch (or workarounds) will continue existing risk exposure. Some workarounds are available. Vela administrators can adjust the worker's `VELA_RUNTIME_PRIVILEGED_IMAGES` setting to be explicitly empty, leverage the `VELA_REPO_ALLOWLIST` setting on the server component to restrict access to a list of repositories that are allowed to be enabled, and/or audit enabled repositories and disable pull_requests if they are not needed.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/go-vela/server", + "cwes": [], + "commits": [ + "5a3ffe34701a1451192376bb87e8a03ad361a5ed" + ] + }, + { + "id": "CVE-2019-25073", + "published": "2022-12-27T22:15:11", + "modified": "2025-01-15T01:40:47.689671", + "details": "Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/goadesign/goa", + "cwes": [], + "commits": [ + "c562182dfa2a4ee68d7e08f8bc882606bebef5a1" + ] + }, + { + "id": "CVE-2024-38513", + "published": "2024-07-01T19:15:05", + "modified": "2025-01-15T05:16:27.672456", + "details": "Fiber is an Express-inspired web framework written in Go A vulnerability present in versions prior to 2.52.5 is a session middleware issue in GoFiber versions 2 and above. This vulnerability allows users to supply their own session_id value, resulting in the creation of a session with that key. If a website relies on the mere presence of a session for security purposes, this can lead to significant security risks, including unauthorized access and session fixation attacks. All users utilizing GoFiber's session middleware in the affected versions are impacted. The issue has been addressed in version 2.52.5. Users are strongly encouraged to upgrade to version 2.52.5 or higher to mitigate this vulnerability. Users who are unable to upgrade immediately can apply the following workarounds to reduce the risk: Either implement additional validation to ensure session IDs are not supplied by the user and are securely generated by the server, or regularly rotate session IDs and enforce strict session expiration policies.", + "repo_url": "https://github.com/gofiber/fiber", + "cwes": [], + "commits": [ + "0e9593886c2cb51dd78d1946eac620c8c83bf90a" + ] + }, + { + "id": "CVE-2024-25124", + "published": "2024-02-21T21:15:09", + "modified": "2025-02-06T00:59:10.754724", + "details": "Fiber is a web framework written in go. Prior to version 2.52.1, the CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard (`*`) while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices. The impact of this misconfiguration is high as it can lead to unauthorized access to sensitive user data and expose the system to various types of attacks listed in the PortSwigger article linked in the references. Version 2.52.1 contains a patch for this issue. As a workaround, users may manually validate the CORS configurations in their implementation to ensure that they do not allow a wildcard origin when credentials are enabled. The browser fetch api, as well as browsers and utilities that enforce CORS policies, are not affected by this.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gofiber/fiber", + "cwes": [], + "commits": [ + "0e9593886c2cb51dd78d1946eac620c8c83bf90a" + ] + }, + { + "id": "CVE-2023-41338", + "published": "2023-09-08T19:15:43", + "modified": "2025-01-15T04:59:19.885090", + "details": "Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version. ", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/gofiber/fiber", + "cwes": [], + "commits": [ + "0e9593886c2cb51dd78d1946eac620c8c83bf90a" + ] + }, + { + "id": "CVE-2023-45128", + "published": "2023-10-16T21:15:11", + "modified": "2025-01-15T05:00:44.174477", + "details": "Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to inject arbitrary values and forge malicious requests on behalf of a user. This vulnerability can allow an attacker to inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This issue has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes as defense in depth measures. There are no known workarounds for this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gofiber/fiber", + "cwes": [], + "commits": [ + "0e9593886c2cb51dd78d1946eac620c8c83bf90a" + ] + }, + { + "id": "CVE-2023-45141", + "published": "2023-10-16T21:15:11", + "modified": "2025-02-19T03:35:55.069799", + "details": "Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This vulnerability has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gofiber/fiber", + "cwes": [], + "commits": [ + "0e9593886c2cb51dd78d1946eac620c8c83bf90a" + ] + }, + { + "id": "CVE-2020-15111", + "published": "2020-07-20T18:15:12", + "modified": "2025-02-19T03:09:33.426508", + "details": "In Fiber before version 1.12.6, the filename that is given in c.Attachment() (https://docs.gofiber.io/ctx#attachment) is not escaped, and therefore vulnerable for a CRLF injection attack. I.e. an attacker could upload a custom filename and then give the link to the victim. With this filename, the attacker can change the name of the downloaded file, redirect to another site, change the authorization header, etc. A possible workaround is to serialize the input before passing it to ctx.Attachment().", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gofiber/fiber", + "cwes": [], + "commits": [ + "0e9593886c2cb51dd78d1946eac620c8c83bf90a" + ] + }, + { + "id": "CVE-2024-22199", + "published": "2024-01-11T18:15:45", + "modified": "2025-01-15T05:06:49.773657", + "details": "This package provides universal methods to use multiple template engines with the Fiber web framework using the Views interface. This vulnerability specifically impacts web applications that render user-supplied data through this template engine, potentially leading to the execution of malicious scripts in users' browsers when visiting affected web pages. The vulnerability has been addressed, the template engine now defaults to having autoescape set to `true`, effectively mitigating the risk of XSS attacks.\n", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gofiber/template", + "cwes": [], + "commits": [ + "fd5a1ab847ebbf537447561827f310ba70fd0998" + ] + }, + { + "id": "CVE-2024-44625", + "published": "2024-11-15T17:15:20", + "modified": "2025-02-19T03:38:16.534051", + "details": "Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-1884", + "published": "2024-11-15T11:15:07", + "modified": "2025-02-19T03:25:59.708390", + "details": "A remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.git.` to upload a file into the .git directory, allowing them to write or rewrite the `.git/config` file. If the `core.sshCommand` is set, this can lead to remote command execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2024-39931", + "published": "2024-07-04T16:15:02", + "modified": "2025-02-19T03:38:29.681021", + "details": "Gogs through 0.13.0 allows deletion of internal files.", + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2024-39933", + "published": "2024-07-04T16:15:02", + "modified": "2025-02-19T03:38:27.787272", + "details": "Gogs through 0.13.0 allows argument injection during the tagging of a new release.", + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2024-39930", + "published": "2024-07-04T16:15:02", + "modified": "2025-02-19T03:38:29.577175", + "details": "The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.", + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2024-39932", + "published": "2024-07-04T16:15:02", + "modified": "2025-02-19T03:38:28.446130", + "details": "Gogs through 0.13.0 allows argument injection during the previewing of changes.", + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2024-54148", + "published": "2024-12-23T16:15:07", + "modified": "2025-01-15T05:16:46.592921", + "details": "Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.", + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2024-55947", + "published": "2024-12-23T16:15:07", + "modified": "2025-01-15T05:17:07.214438", + "details": "Gogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1.", + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-2024", + "published": "2023-02-25T08:15:09", + "modified": "2025-01-15T02:13:41.071350", + "details": "OS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-0870", + "published": "2022-03-11T11:15:07", + "modified": "2025-01-15T02:11:48.021536", + "details": "Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-0415", + "published": "2022-03-21T11:15:10", + "modified": "2025-01-15T02:10:17.955039", + "details": "Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-0871", + "published": "2022-03-11T12:15:07", + "modified": "2025-01-15T02:11:48.138995", + "details": "Missing Authorization in GitHub repository gogs/gogs prior to 0.12.5.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-1285", + "published": "2022-06-01T06:15:07", + "modified": "2025-01-15T02:12:37.475749", + "details": "Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2021-32546", + "published": "2022-06-02T14:15:28", + "modified": "2025-02-19T03:18:44.849947", + "details": "Missing input validation in internal/db/repo_editor.go in Gogs before 0.12.8 allows an attacker to execute code remotely. An unprivileged attacker (registered user) can overwrite the Git configuration in his repository. This leads to Remote Command Execution, because that configuration can contain an option such as sshCommand, which is executed when a master branch is a remote branch (using an ssh:// URI). The remote branch can also be configured by editing the Git configuration file. One can create a new file in a new repository, using the GUI, with \"\\\" as its name, and then rename this file to .git/config with the custom configuration content (and then save it).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-1993", + "published": "2022-06-09T17:15:08", + "modified": "2025-01-15T02:14:12.077734", + "details": "Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-1986", + "published": "2022-06-09T17:15:08", + "modified": "2025-01-15T02:14:10.823292", + "details": "OS Command Injection in GitHub repository gogs/gogs prior to 0.12.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-1992", + "published": "2022-06-09T17:15:08", + "modified": "2025-01-15T02:14:12.806003", + "details": "Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-31038", + "published": "2022-06-09T17:15:09", + "modified": "2025-01-15T02:21:26.690449", + "details": "Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-1464", + "published": "2022-05-05T14:15:08", + "modified": "2025-01-15T02:13:08.994782", + "details": "Stored xss bug in GitHub repository gogs/gogs prior to 0.12.7. As the repo is public , any user can view the report and when open the attachment then xss is executed. This bug allow executed any javascript code in victim account .", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2022-32174", + "published": "2022-10-11T15:15:09", + "modified": "2025-02-19T03:27:59.689657", + "details": "In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2019-14544", + "published": "2019-08-02T22:15:14", + "modified": "2025-02-19T02:48:16.736934", + "details": "routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2018-18925", + "published": "2018-11-04T05:29:00", + "modified": "2025-02-19T02:29:18.992883", + "details": "Gogs 0.11.66 allows remote code execution because it does not properly validate session IDs, as demonstrated by a \"..\" session-file forgery in the file session provider in file.go. This is related to session ID handling in the go-macaron/session code for Macaron.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2018-15193", + "published": "2018-08-08T02:29:00", + "modified": "2025-02-19T02:30:59.632079", + "details": "A CSRF vulnerability in the admin panel in Gogs through 0.11.53 allows remote attackers to execute admin operations via a crafted issue / link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2018-15178", + "published": "2018-08-08T00:29:02", + "modified": "2025-02-19T02:31:05.448124", + "details": "Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2018-17031", + "published": "2018-09-14T02:29:00", + "modified": "2025-02-19T02:32:01.453419", + "details": "In Gogs 0.11.53, an attacker can use a crafted .eml file to trigger MIME type sniffing, which leads to XSS, as demonstrated by Internet Explorer, because an \"X-Content-Type-Options: nosniff\" header is not sent.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2018-16409", + "published": "2018-09-03T19:29:01", + "modified": "2025-02-19T02:31:38.356917", + "details": "In Gogs 0.11.53, an attacker can use migrate to send arbitrary HTTP GET requests, leading to SSRF.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2018-20303", + "published": "2018-12-20T00:29:00", + "modified": "2025-01-15T01:34:46.849824", + "details": "In pkg/tool/path.go in Gogs before 0.11.82.1218, a directory traversal in the file-upload functionality can allow an attacker to create a file under data/sessions on the server, a similar issue to CVE-2018-18925.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2020-14958", + "published": "2020-06-21T20:15:09", + "modified": "2025-01-15T01:43:12.862514", + "details": "In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a \"not the owner of the email\" check.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2020-9329", + "published": "2020-02-21T22:15:10", + "modified": "2025-02-19T03:14:08.649534", + "details": "Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2020-15867", + "published": "2020-10-16T14:15:11", + "modified": "2025-02-19T03:08:54.037282", + "details": "The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a \"Product UI does not Warn User of Unsafe Actions\" issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gogs/gogs", + "cwes": [], + "commits": [ + "91441c3fb29d8ead645d8fffa4658d749d5b3fc3" + ] + }, + { + "id": "CVE-2019-9047", + "published": "2019-02-23T21:29:00", + "modified": "2025-01-14T08:08:55.540826", + "details": "GoRose v1.0.4 has SQL Injection when the order_by or group_by parameter can be controlled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gohouse/gorose", + "cwes": [], + "commits": [ + "5aeebf3335499bae38b9292594d8c2e44d5a0b4f" + ] + }, + { + "id": "CVE-2024-1394", + "published": "2024-03-21T13:00:08", + "modified": "2025-01-15T05:04:55.042523", + "details": "A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs\u200b. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey\u200b and ctx\u200b. That function uses named return parameters to free pkey\u200b and ctx\u200b if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the \"return nil, nil, fail(...)\" pattern, meaning that pkey\u200b and ctx\u200b will be nil inside the deferred function that should free them.", + "repo_url": "https://github.com/golang-fips/openssl", + "cwes": [], + "commits": [ + "576fe0d377882f8d0fd6537762ef2ff7918facc8" + ] + }, + { + "id": "CVE-2023-39533", + "published": "2023-08-08T19:15:10", + "modified": "2025-01-15T04:57:45.053991", + "details": "go-libp2p is the Go implementation of the libp2p Networking Stack. Prior to versions 0.27.8, 0.28.2, and 0.29.1 malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step. To prevent this attack, go-libp2p versions 0.27.8, 0.28.2, and 0.29.1 restrict RSA keys to <= 8192 bits. To protect one's application, it is necessary to update to these patch releases and to use the updated Go compiler in 1.20.7 or 1.19.12. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2023-39321", + "published": "2023-09-08T17:15:28", + "modified": "2025-01-14T11:53:51.569394", + "details": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "c19c4c566c63818dfd059b352e52c4710eecf14d" + ] + }, + { + "id": "CVE-2023-39322", + "published": "2023-09-08T17:15:28", + "modified": "2025-01-14T11:53:48.411384", + "details": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "c19c4c566c63818dfd059b352e52c4710eecf14d" + ] + }, + { + "id": "CVE-2023-39320", + "published": "2023-09-08T17:15:27", + "modified": "2025-01-14T11:53:47.557953", + "details": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "c19c4c566c63818dfd059b352e52c4710eecf14d" + ] + }, + { + "id": "CVE-2021-27919", + "published": "2021-03-11T00:15:12", + "modified": "2025-01-14T09:03:21.246988", + "details": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2021-41772", + "published": "2021-11-08T06:15:08", + "modified": "2025-01-14T09:56:23.518683", + "details": "Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2022-28327", + "published": "2022-04-20T10:15:08", + "modified": "2025-01-14T10:54:26.847954", + "details": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2022-27536", + "published": "2022-04-20T10:15:07", + "modified": "2025-01-14T10:55:46.776794", + "details": "Certificate.Verify in crypto/x509 in Go 1.18.x before 1.18.1 can be caused to panic on macOS when presented with certain malformed certificates. This allows a remote TLS server to cause a TLS client to panic.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2022-24675", + "published": "2022-04-20T10:15:07", + "modified": "2025-01-14T10:51:42.835696", + "details": "encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2022-30634", + "published": "2022-07-15T20:15:08", + "modified": "2025-01-14T10:58:38.836773", + "details": "Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2022-29804", + "published": "2022-08-10T20:15:34", + "modified": "2025-01-14T10:57:48.849102", + "details": "Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2022-30580", + "published": "2022-08-10T20:15:40", + "modified": "2025-01-14T10:58:25.441009", + "details": "Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either \"..com\" or \"..exe\" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-6486", + "published": "2019-01-24T05:29:00", + "modified": "2025-01-15T01:41:55.132651", + "details": "Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-9741", + "published": "2019-03-13T08:29:00", + "modified": "2025-01-14T08:10:36.159298", + "details": "An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \\r\\n followed by an HTTP header or a Redis command.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-9634", + "published": "2019-03-08T15:29:00", + "modified": "2025-01-14T08:11:30.629254", + "details": "Go through 1.12 on Windows misuses certain LoadLibrary functionality, leading to DLL injection.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-14809", + "published": "2019-08-13T21:15:11", + "modified": "2025-01-14T07:48:56.145100", + "details": "net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-16276", + "published": "2019-09-30T19:15:08", + "modified": "2025-01-14T07:51:26.422181", + "details": "Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "3a1b4e75f8b6c1b57db73bccf7ca871bf1a97ca9", + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-11888", + "published": "2019-05-13T05:29:01", + "modified": "2025-01-14T07:10:42.302005", + "details": "Go through 1.12.5 on Windows mishandles process creation with a nil environment in conjunction with a non-nil token, which allows attackers to obtain sensitive information or gain privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "3a1b4e75f8b6c1b57db73bccf7ca871bf1a97ca9", + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2019-17596", + "published": "2019-10-24T22:15:10", + "modified": "2025-01-14T07:53:38.532590", + "details": "Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "3a1b4e75f8b6c1b57db73bccf7ca871bf1a97ca9" + ] + }, + { + "id": "CVE-2016-5386", + "published": "2016-07-19T02:00:18", + "modified": "2025-01-14T06:37:36.349952", + "details": "The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2016-3959", + "published": "2016-05-23T19:59:04", + "modified": "2025-01-14T06:31:21.075963", + "details": "The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2016-3958", + "published": "2016-05-23T19:59:03", + "modified": "2025-01-14T06:31:56.452421", + "details": "Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "27d5c0ede5b4411089f4bf52a41dd2f4eed36123" + ] + }, + { + "id": "CVE-2018-7187", + "published": "2018-02-16T17:29:00", + "modified": "2025-01-14T07:37:45.503298", + "details": "The \"go get\" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for \"://\" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2018-6574", + "published": "2018-02-07T21:29:00", + "modified": "2025-01-14T07:39:27.553897", + "details": "Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow \"go get\" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2018-16875", + "published": "2018-12-14T14:29:00", + "modified": "2025-01-14T07:25:50.068474", + "details": "The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2018-16873", + "published": "2018-12-14T14:29:00", + "modified": "2025-01-14T07:25:40.581552", + "details": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2018-16874", + "published": "2018-12-14T14:29:00", + "modified": "2025-01-14T07:25:42.774548", + "details": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2020-0601", + "published": "2020-01-14T23:15:30", + "modified": "2025-02-07T17:54:38.479343", + "details": "A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "3a1b4e75f8b6c1b57db73bccf7ca871bf1a97ca9" + ] + }, + { + "id": "CVE-2020-7919", + "published": "2020-03-16T21:15:12", + "modified": "2025-01-14T08:47:55.175185", + "details": "Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "3a1b4e75f8b6c1b57db73bccf7ca871bf1a97ca9" + ] + }, + { + "id": "CVE-2020-14039", + "published": "2020-07-17T16:15:11", + "modified": "2025-01-14T08:21:28.284256", + "details": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2017-8932", + "published": "2017-07-06T16:29:00", + "modified": "2025-01-15T01:30:25.836165", + "details": "A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2017-15041", + "published": "2017-10-05T21:29:00", + "modified": "2025-01-14T07:07:55.689666", + "details": "Go before 1.8.4 and 1.9.x before 1.9.1 allows \"go get\" remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, \"go get\" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository's Git checkout has malicious commands in .git/hooks/, they will execute on the system running \"go get.\"", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2017-1000097", + "published": "2017-10-05T01:29:03", + "modified": "2025-01-14T06:56:54.148595", + "details": "On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2017-1000098", + "published": "2017-10-05T01:29:03", + "modified": "2025-01-14T06:56:47.427670", + "details": "The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given \"maxMemory\" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2017-15042", + "published": "2017-10-05T21:29:00", + "modified": "2025-01-14T07:07:51.081293", + "details": "An unintended cleartext issue exists in Go before 1.8.4 and 1.9.x before 1.9.1. RFC 4954 requires that, during SMTP, the PLAIN auth scheme must only be used on network connections secured with TLS. The original implementation of smtp.PlainAuth in Go 1.0 enforced this requirement, and it was documented to do so. In 2013, upstream issue #5184, this was changed so that the server may decide whether PLAIN is acceptable. The result is that if you set up a man-in-the-middle SMTP server that doesn't advertise STARTTLS and does advertise that PLAIN auth is OK, the smtp.PlainAuth implementation sends the username and password.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/golang/go", + "cwes": [], + "commits": [ + "66330d8c6c0a23b7eb48688f9954264e48b039da" + ] + }, + { + "id": "CVE-2021-22538", + "published": "2021-03-31T21:15:16", + "modified": "2025-01-15T01:47:51.716877", + "details": "A privilege escalation vulnerability impacting the Google Exposure Notification Verification Server (versions prior to 0.23.1), allows an attacker who (1) has UserWrite permissions and (2) is using a carefully crafted request or malicious proxy, to create another user with higher privileges than their own. This occurs due to insufficient checks on the allowed set of permissions. The new user creation event would be captured in the Event Log.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/google/exposure-notifications-verification-server", + "cwes": [], + "commits": [ + "f2b04559ca6e195a2561487d0b35b997e66d152c" + ] + }, + { + "id": "CVE-2021-22565", + "published": "2021-12-09T13:15:08", + "modified": "2025-01-14T08:55:10.100656", + "details": "An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "repo_url": "https://github.com/google/exposure-notifications-verification-server", + "cwes": [], + "commits": [ + "f2b04559ca6e195a2561487d0b35b997e66d152c" + ] + }, + { + "id": "CVE-2020-35864", + "published": "2020-12-31T10:15:15", + "modified": "2025-02-19T03:11:47.195063", + "details": "An issue was discovered in the flatbuffers crate through 2020-04-11 for Rust. read_scalar (and read_scalar_at) can transmute values without unsafe blocks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/google/flatbuffers", + "cwes": [], + "commits": [ + "6df40a2471737b27271bdd9b900ab5f3aec746c7" + ] + }, + { + "id": "CVE-2020-8918", + "published": "2020-08-11T19:15:17", + "modified": "2025-01-14T08:50:27.943695", + "details": "An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/google/go-tpm", + "cwes": [], + "commits": [ + "b2c8857856f7516bb35d299c6b5d19f64e4ad579" + ] + }, + { + "id": "CVE-2022-31055", + "published": "2022-06-13T16:15:08", + "modified": "2025-01-15T02:21:26.494878", + "details": "kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "repo_url": "https://github.com/google/kctf", + "cwes": [], + "commits": [ + "9d1f2a5f86e9a7c66805b090829c330b0abf71d1" + ] + }, + { + "id": "CVE-2020-8929", + "published": "2020-10-19T13:15:13", + "modified": "2025-01-15T01:47:10.654131", + "details": "A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "repo_url": "https://github.com/google/tink", + "cwes": [], + "commits": [ + "693d0e143c3d61cb2976883c6b9261d1b4f0263c" + ] + }, + { + "id": "CVE-2023-30845", + "published": "2023-04-26T21:15:09", + "modified": "2025-01-15T04:51:49.691413", + "details": "ESPv2 is a service proxy that provides API management capabilities using Google Service Infrastructure. ESPv2 2.20.0 through 2.42.0 contains an authentication bypass vulnerability. API clients can craft a malicious `X-HTTP-Method-Override` header value to bypass JWT authentication in specific cases.\n\nESPv2 allows malicious requests to bypass authentication if both the conditions are true: The requested HTTP method is **not** in the API service definition (OpenAPI spec or gRPC `google.api.http` proto annotations, and the specified `X-HTTP-Method-Override` is a valid HTTP method in the API service definition. ESPv2 will forward the request to your backend without checking the JWT. Attackers can craft requests with a malicious `X-HTTP-Method-Override` value that allows them to bypass specifying JWTs. Restricting API access with API keys works as intended and is not affected by this vulnerability.\n\nUpgrade deployments to release v2.43.0 or higher to receive a patch. This release ensures that JWT authentication occurs, even when the caller specifies `x-http-method-override`. `x-http-method-override` is still supported by v2.43.0+. API clients can continue sending this header to ESPv2.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/googlecloudplatform/esp-v2", + "cwes": [], + "commits": [ + "d75445e1f30244a5c6690196d338c44a29abe55a" + ] + }, + { + "id": "CVE-2023-27475", + "published": "2023-03-07T18:15:09", + "modified": "2025-01-15T04:48:15.916132", + "details": "Goutil is a collection of miscellaneous functionality for the go language. In versions prior to 0.6.0 when users use fsutil.Unzip to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. This vulnerability is known as a ZipSlip. This issue has been fixed in version 0.6.0, users are advised to upgrade. There are no known workarounds for this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gookit/goutil", + "cwes": [], + "commits": [ + "7526dca133db0dff4a50bf8bea42cf13ad702bca" + ] + }, + { + "id": "CVE-2022-45003", + "published": "2023-03-22T21:15:17", + "modified": "2025-02-19T03:28:30.038815", + "details": "Gophish through 0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted payload involving autofocus.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2022-45004", + "published": "2023-03-22T21:15:18", + "modified": "2025-02-19T03:28:32.303791", + "details": "Gophish through 0.12.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted landing page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2022-25295", + "published": "2022-09-11T14:15:08", + "modified": "2025-02-19T03:23:19.120577", + "details": "This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue(\"next\")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\\\\\\\example.com, browser will redirect user to http://example.com.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2019-16146", + "published": "2019-09-09T13:15:11", + "modified": "2025-01-14T07:47:26.595339", + "details": "Gophish through 0.8.0 allows XSS via a username.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24710", + "published": "2020-10-28T20:15:13", + "modified": "2025-01-15T01:44:23.880965", + "details": "Gophish before 0.11.0 allows SSRF attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24712", + "published": "2020-10-28T20:15:13", + "modified": "2025-01-15T01:44:22.608739", + "details": "Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the IMAP Host field on the account settings page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24711", + "published": "2020-10-28T20:15:13", + "modified": "2025-01-15T01:44:24.551897", + "details": "The Reset button on the Account Settings page in Gophish before 0.11.0 allows attackers to cause a denial of service via a clickjacking attack", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24707", + "published": "2020-10-28T20:15:13", + "modified": "2025-01-15T01:44:25.548270", + "details": "Gophish before 0.11.0 allows the creation of CSV sheets that contain malicious content.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24713", + "published": "2020-10-28T20:15:13", + "modified": "2025-02-19T03:11:59.039474", + "details": "Gophish through 0.10.1 does not invalidate the gophish cookie upon logout.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24708", + "published": "2020-10-28T20:15:13", + "modified": "2025-01-15T01:44:24.785912", + "details": "Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2020-24709", + "published": "2020-10-28T20:15:13", + "modified": "2025-02-19T03:12:00.951083", + "details": "Cross Site Scripting (XSS) vulnerability in Gophish through 0.10.1 via a crafted landing page or email template.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "repo_url": "https://github.com/gophish/gophish", + "cwes": [], + "commits": [ + "f95e9554c7cefd8bd0e772af8a19436090311e8c" + ] + }, + { + "id": "CVE-2024-23840", + "published": "2024-01-30T17:15:11", + "modified": "2025-01-15T05:08:25.654051", + "details": "GoReleaser builds Go binaries for several platforms, creates a GitHub release and then pushes a Homebrew formula to a tap repository. `goreleaser release --debug` log shows secret values used in the in the custom publisher. This vulnerability is fixed in 1.24.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "repo_url": "https://github.com/goreleaser/goreleaser", + "cwes": [], + "commits": [ + "3ec68fbf8c3a1b16ca0f69aeccfb93765685b643" + ] + }, + { + "id": "CVE-2023-32698", + "published": "2023-05-30T04:15:10", + "modified": "2025-01-15T04:53:22.799015", + "details": "nFPM is an alternative to fpm. The file permissions on the checked-in files were not maintained. Hence, when nfpm packaged \nthe files (without extra config for enforcing it\u2019s own permissions) files could go out with bad permissions (chmod 666 or 777). Anyone using nfpm for creating packages without checking/setting file permissions before packaging could result in bad permissions for files/folders.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "repo_url": "https://github.com/goreleaser/nfpm", + "cwes": [], + "commits": [ + "3f9527977cc5dee860fab221e23e2290063c3045" + ] + }, + { + "id": "CVE-2020-27813", + "published": "2020-12-02T01:15:12", + "modified": "2025-01-14T08:42:08.392762", + "details": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "repo_url": "https://github.com/gorilla/websocket", + "cwes": [], + "commits": [ + "66b9c49e59c6c48f0ffce28c2d8b8a5678502c6d" + ] + }, + { + "id": "CVE-2024-21527", + "published": "2024-07-19T05:15:10", + "modified": "2025-01-15T05:06:19.465869", + "details": "Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as