ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist | GHSA-769f-539v-f5jg | PrestaShop gamification module ZIP archives were vulnerable from CVE-2017-9841 | ### Impact
We have identified that some gamification module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841)
- phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers)
You can read PrestaShop official statement about this vulnerability [here](https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/).
### Patches
In the [security patch](https://github.com/PrestaShop/gamification/releases/tag/v2.3.2), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading.
### Workarounds
Users can also simply remove the unwanted vendor/phpunit folder.
### References
https://nvd.nist.gov/vuln/detail/CVE-2017-9841
### For more information
If you have any questions or comments about this advisory, email us at security@prestashop.com | null | 2020-01-08T03:10:06Z | 2020-01-08T03:10:44Z | HIGH | null | null | {'https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/', 'https://github.com/PrestaShop/gamification/security/advisories/GHSA-769f-539v-f5jg', 'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'} | null | {'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'} | {'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'} |
Packagist | GHSA-6m26-25q2-cq46 | Cross-site Scripting in microweber | Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3. | {'CVE-2022-0763'} | 2022-03-09T20:36:46Z | 2022-02-27T00:00:15Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6', 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763'} | null | {'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'} | {'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'} |
Packagist | GHSA-wppj-3pjr-9w79 | crater is vulnerable to Unrestricted Upload of File with Dangerous Type | crater is vulnerable to Unrestricted Upload of File with Dangerous Type | {'CVE-2021-4080'} | 2022-01-20T15:08:18Z | 2022-01-21T23:55:11Z | HIGH | null | {'CWE-434'} | {'https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4080'} | null | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'} | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'} |
Packagist | GHSA-553q-hpvp-q8pc | Server-Side Request Forgery in snipe/snipe-it | Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to higher-impact. | {'CVE-2021-4075'} | 2021-12-07T21:24:53Z | 2021-12-10T20:22:15Z | HIGH | null | {'CWE-918'} | {'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075', 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de', 'https://github.com/snipe/snipe-it'} | null | {'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'} | {'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'} |
Packagist | GHSA-gjq4-69wj-p6pr | Path traversal in pimcore | The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file. | {'CVE-2022-0665'} | 2022-03-02T21:16:04Z | 2022-02-23T00:00:59Z | MODERATE | null | {'CWE-22'} | {'https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0665', 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'} | null | {'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'} | {'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'} |
Packagist | GHSA-r7c9-c69m-rph8 | Code Injection in PHPUnit | Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI. | {'CVE-2017-9841'} | 2022-04-19T20:16:49Z | 2022-03-26T00:19:30Z | CRITICAL | null | {'CWE-94'} | {'http://www.securitytracker.com/id/1039812', 'http://web.archive.org/web/20170701212357/', 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5', 'https://github.com/sebastianbergmann/phpunit/pull/1955', 'https://github.com/sebastianbergmann/phpunit', 'http://', 'https://github.com/sebastianbergmann/phpunit/pull/1956', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412', 'https://security.gentoo.org/glsa/201711-15', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841', 'http://www.securityfocus.com/bid/101798', 'http://phpunit.vulnbusters.com/'} | null | {'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5', 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412'} | {'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412', 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5'} |
Packagist | GHSA-h9ph-jcgh-gf69 | Cross-site Scripting in Limesurvey | The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js. | {'CVE-2021-42112'} | 2021-10-19T14:51:30Z | 2021-10-12T16:40:28Z | MODERATE | null | {'CWE-79'} | {'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf', 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112', 'https://github.com/LimeSurvey/LimeSurvey', 'https://github.com/LimeSurvey/LimeSurvey/pull/2044', 'https://bugs.limesurvey.org/view.php?id=17562'} | null | {'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'} | {'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'} |
Packagist | GHSA-frxp-xxx8-hrg6 | Missing Authorization in DayByDay CRM | In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information. | {'CVE-2022-22108'} | 2022-01-07T20:43:46Z | 2022-01-08T00:31:52Z | MODERATE | null | {'CWE-862'} | {'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://github.com/Bottelet/DaybydayCRM/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'} | {'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'} |
Packagist | GHSA-f7q6-xxph-mfm8 | Cross-site Scripting in Pimcore | Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability. | {'CVE-2022-0251'} | 2022-02-03T17:53:53Z | 2022-01-27T00:01:26Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0251', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb', 'https://huntr.dev/bounties/eb4b08f9-cf8b-4335-b3b8-ed44e5fa80a5'} | null | {'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb'} | {'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb'} |
Packagist | GHSA-m3xv-x3ph-mq22 | Server-side Template Injection in nystudio107/craft-seomatic | A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header. | {'CVE-2021-44618'} | 2022-03-24T13:44:50Z | 2022-03-12T00:00:34Z | HIGH | null | {'CWE-94'} | {'https://github.com/nystudio107/craft-seomatic', 'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618', 'https://github.com/nystudio107/craft-seomatic/releases/tag/3.4.12'} | null | {'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'} | {'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'} |
Packagist | GHSA-2xwq-h7r9-6w27 | Cross-site Scripting in kimai2 | Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs | {'CVE-2021-3957'} | 2021-11-22T18:46:48Z | 2021-11-23T17:59:40Z | MODERATE | null | {'CWE-352'} | {'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3', 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'} | null | {'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'} | {'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'} |
Packagist | GHSA-cvh5-p6r6-g2qc | Exposed phpinfo() leadked via documentation files | ### Impact
The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc).
### Patches
Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5.
Older versions such as v5, v4 are not longer supported and will **NOT** be patched.
### Workarounds
Protect the `/vendor` directory from public access.
### References
The first issue revealing this vulnerability is located here: https://github.com/flextype/flextype/issues/567
V6 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/815
V7 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/814
V8 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/813
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues)
* Email us at [security@geolim4.com](mailto:security@geolim4.com)
| {'CVE-2021-37704'} | 2021-08-26T20:11:49Z | 2021-08-30T16:13:40Z | MODERATE | null | {'CWE-668', 'CWE-200'} | {'https://github.com/PHPSocialNetwork/phpfastcache/pull/814', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51', 'https://github.com/flextype/flextype/issues/567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37704', 'https://packagist.org/packages/phpfastcache/phpfastcache', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/813', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/815', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc', 'https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807'} | null | {'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51'} | {'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51'} |
Packagist | GHSA-54qq-9chj-rxhv | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability. | {'CVE-2022-0395'} | 2022-02-04T16:53:54Z | 2022-01-29T00:00:33Z | MODERATE | null | {'CWE-79'} | {'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/36abbd6e-239e-4739-8c77-ba212b946a4a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395', 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'} | {'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'} |
Packagist | GHSA-jjp3-m93h-5jm4 | Cross-site Scripting in microweber | Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12. | {'CVE-2022-0928'} | 2022-03-24T23:19:35Z | 2022-03-12T00:00:34Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a', 'https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928'} | null | {'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a'} | {'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a'} |
Packagist | GHSA-9wrv-g75h-8ccc | Improper Access Control in Shopware | Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | {'CVE-2022-24872'} | 2022-05-04T03:52:17Z | 2022-04-22T21:04:27Z | HIGH | null | {'CWE-732'} | {'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022'} | null | {'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'} | {'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'} |
Packagist | GHSA-c6fg-99pr-25m9 | Uncapped length of skin data fields submitted by players | ### Impact
Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave.
This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an exception will be thrown during data saving, which will cause the server to crash.
Other fields (such as skinGeometryData) are also uncapped, but those have a much larger 2 GB length limit, so this is not a concern for those, particularly considering the decompressed packet size limit of 2 MB.
### Patches
PM3: 958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb
PM4: 6492cac5c10f9fa8443ceddd2191a7b65b73f601
### Workarounds
A plugin may check player skins during `PlayerLoginEvent` and `PlayerSkinChangeEvent` and ensure that the offending fields are not larger than 32767 bytes.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null | 2022-01-06T19:47:00Z | 2022-01-06T23:53:58Z | HIGH | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'} | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'} |
Packagist | GHSA-4r8q-gv9j-3xx6 | Open Redirect | ### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`)
### Patches
Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to.
### Workarounds
There is a simple way to work around the security issue
- Set the `force_https` to every tenant to `false`
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
### For more information
If you have any questions or comments about this advisory:
* Contact us in Discord: https://tenancy.dev/chat
| {'CVE-2021-32645'} | 2022-03-18T17:55:07Z | 2022-03-18T17:55:07Z | MODERATE | null | {'CWE-601'} | {'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6'} | null | {'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'} | {'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'} |
Packagist | GHSA-j29f-m23h-3p8p | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0911'} | 2022-03-29T15:16:19Z | 2022-03-17T00:00:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
Packagist | GHSA-pwwm-pwx2-2hw7 | Generation of Error Message Containing Sensitive Information in Snipe-IT | Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information. | {'CVE-2022-0622'} | 2022-02-22T18:12:11Z | 2022-02-18T00:00:37Z | MODERATE | null | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/snipe/snipe-it'} | null | {'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'} | {'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'} |
Packagist | GHSA-q67f-3jq4-mww2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0831'} | 2022-03-11T20:36:49Z | 2022-03-05T00:00:45Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'} | null | {'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'} | {'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'} |
Packagist | GHSA-g996-q5r8-w7g2 | Escape validation messages in the PHP templating engine | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle. | {'CVE-2019-10909'} | 2021-08-18T22:15:15Z | 2019-11-12T23:00:53Z | MODERATE | null | {'CWE-79'} | {'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml', 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://www.drupal.org/sa-core-2019-005', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://symfony.com/cve-2019-10909'} | null | {'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'} | {'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'} |
Packagist | GHSA-frqg-7g38-6gcf | Improper escaping of command arguments on Windows leading to command injection | ### Impact
Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
### Patches
1.10.23 and 2.1.9 fix the issue
### Workarounds
None
| {'CVE-2021-41116'} | 2021-10-11T18:39:06Z | 2021-10-05T20:23:18Z | HIGH | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41116', 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://github.com/composer/composer'} | null | {'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'} | {'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'} |
Packagist | GHSA-ghhm-xrwp-75m9 | bookstack is vulnerable to Improper Access Control | bookstack is vulnerable to Improper Access Control | {'CVE-2021-4194'} | 2022-01-07T22:38:34Z | 2022-01-08T00:34:12Z | MODERATE | null | {'CWE-668', 'CWE-284'} | {'https://github.com/bookstackapp/bookstack', 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114'} | null | {'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'} | {'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'} |
Packagist | GHSA-7rg4-266c-jqw6 | Predictable CSRF tokens in centreon/centreon | An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user. | {'CVE-2021-28055'} | 2021-05-07T15:18:01Z | 2021-06-08T20:12:56Z | MODERATE | null | {'CWE-330', 'CWE-352'} | {'https://github.com/centreon/centreon/releases/tag/2.8.37', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28055', 'https://github.com/centreon/centreon/releases/tag/19.10.23'} | null | {'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'} | {'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'} |
Packagist | GHSA-w2f4-hxpm-mq98 | bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type | bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type. | {'CVE-2021-3915'} | 2021-11-17T21:12:00Z | 2021-11-15T23:17:37Z | HIGH | null | {'CWE-434'} | {'https://github.com/BookStackApp/BookStack', 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915'} | null | {'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'} | {'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'} |
Packagist | GHSA-h676-pjr4-hgqx | Path Traversal in S-Cart | A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup. | {'CVE-2021-44111'} | 2022-02-23T15:52:20Z | 2022-02-12T00:00:42Z | MODERATE | null | {'CWE-22'} | {'https://github.com/s-cart/s-cart', 'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://github.com/s-cart/s-cart/issues/102', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111'} | null | {'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'} | {'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'} |
Packagist | GHSA-jgjc-332c-8cmc | SQL injection in phpMyAdmin | An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature. | {'CVE-2019-18622'} | 2021-08-19T16:24:16Z | 2020-01-16T21:56:15Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'https://www.phpmyadmin.net/security/PMASA-2019-5/', 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/', 'https://security.gentoo.org/glsa/202003-39', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html'} | null | {'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'} | {'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'} |
Packagist | GHSA-qq74-vgcf-54c3 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0946'} | 2022-03-23T15:37:53Z | 2022-03-15T00:01:00Z | MODERATE | null | {'CWE-79'} | {'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0946'} | null | {'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'} | {'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'} |
Packagist | GHSA-2xw8-j43j-5vxp | elgg is vulnerable to Cross-site Scripting | elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4072'} | 2022-01-05T17:56:06Z | 2022-01-06T21:35:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072', 'https://github.com/elgg/elgg', 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955'} | null | {'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'} | {'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'} |
Packagist | GHSA-jpwx-ffjq-wr4w | Content object state fetch functions open to SQL injection | ### Impact
This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible.
### Patches
The fix is distributed via Composer, see "Patched versions".
| null | 2021-09-03T20:10:38Z | 2021-09-07T22:54:23Z | HIGH | null | {'CWE-89'} | {'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection', 'https://github.com/ezsystems/ezpublish-legacy', 'https://github.com/ezsystems/ezpublish-legacy/security/advisories/GHSA-jpwx-ffjq-wr4w'} | null | {'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'} | {'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'} |
Packagist | GHSA-6jmh-9gqm-5xrx | Cross-Site Request Forgery (CSRF) in livehelperchat | A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed. | {'CVE-2022-0226'} | 2022-01-24T21:11:02Z | 2022-01-26T20:21:03Z | MODERATE | null | {'CWE-352'} | {'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370', 'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'} | {'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'} |
Packagist | GHSA-7g7r-gr46-q4p5 | Cross-Site Request Forgery in yetiforce | Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users. | {'CVE-2022-0269'} | 2022-01-31T21:47:28Z | 2022-01-27T16:21:33Z | HIGH | null | {'CWE-352'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0', ' https://github.com/yetiforcecompany/yetiforcecrm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'} |
Packagist | GHSA-4r3m-j6x5-48m3 | Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7. | {'CVE-2020-15155'} | 2021-01-07T23:39:22Z | 2020-08-28T21:20:42Z | LOW | null | {'CWE-79'} | {'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155'} | null | {'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'} | {'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'} |
Packagist | GHSA-qr95-4mq5-r3fh | Phar unserialization vulnerability in phpMussel | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone using >= v1.0.0 < v1.6.0.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be preferable, seeing as v1 is kind of old now and will most likely be marked as EoL when v3 is released in the near future).
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Yes. In the package's configuration, disable archive checking by setting `check_archives` to `false` (thus avoiding execution of the affected parts of the codebase entirely).
### References
_Are there any links users can visit to find out more?_
Yes. The vulnerability is documented at [SECURITY.md](https://github.com/phpMussel/phpMussel/security/policy) and also at [#167](https://github.com/phpMussel/phpMussel/issues/167).
### For more information
If you have any questions or comments about this advisory:
* Comment at the issue linked to this advisory, or..
* Contact [the package author](https://github.com/Maikuolan) ([082e6bc1046fab95](https://peegeepee.com/046FAB95)). | {'CVE-2020-4043'} | 2021-01-08T20:12:50Z | 2020-06-10T19:40:30Z | HIGH | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-4043', 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities', 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMussel/issues/167', 'https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh'} | null | {'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'} | {'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'} |
Packagist | GHSA-qf2g-q4mc-w7rr | Cross-site Scripting in Fork CMS | Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page. | {'CVE-2022-0145'} | 2022-03-30T21:04:25Z | 2022-03-25T00:00:34Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/forkcms/forkcms', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'} | null | {'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'} | {'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'} |
Packagist | GHSA-jf9v-q8vh-3fmc | Cross-site scripting in ICEcoder | In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed. | {'CVE-2021-32106'} | 2021-09-09T14:17:19Z | 2021-09-09T17:11:11Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://github.com/icecoder/ICEcoder', 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256', 'https://groups.google.com/g/icecoder/c/xcAc8_1UPxQ'} | null | {'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'} | {'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'} |
Packagist | GHSA-p8q8-jfcv-g2h2 | Directory Traversal in Archive_Tar | In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193. | {'CVE-2021-32610'} | 2021-09-20T20:26:41Z | 2021-08-09T20:40:06Z | HIGH | null | {'CWE-59'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://github.com/pear/Archive_Tar', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32610', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/', 'https://github.com/pear/Archive_Tar/releases/tag/1.4.14', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f', 'https://www.drupal.org/sa-core-2021-004'} | null | {'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'} | {'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'} |
Packagist | GHSA-9w7h-3wwh-6m5q | Cross-site Scripting in Microweber | Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user. | {'CVE-2022-1439'} | 2022-04-26T13:14:56Z | 2022-04-23T00:03:02Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'} | {'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'} |
Packagist | GHSA-gcvv-gq92-x94r | Authenticated server-side request forgery in file upload via URL. | ### Impact
Authenticated server-side request forgery in file upload via URL.
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | {'CVE-2021-37711'} | 2021-08-23T17:22:58Z | 2021-08-23T19:42:49Z | HIGH | null | {'CWE-918'} | {'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711'} | null | {'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'} | {'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'} |
Packagist | GHSA-c383-q5vf-hx55 | Integer Overflow or Wraparound in Microweber | Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound. | {'CVE-2022-0913'} | 2022-03-23T15:33:00Z | 2022-03-12T00:00:36Z | HIGH | null | {'CWE-190'} | {'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'} | {'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'} |
Packagist | GHSA-3q55-66g3-p8xq | Cross-site Scripting in microweber | File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12. | {'CVE-2022-0926'} | 2022-03-22T19:36:42Z | 2022-03-13T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17', 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120'} | {'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120'} |
Packagist | GHSA-fwh7-v4gf-xv7w | yetiforcecrm is vulnerable to Cross-site Scripting | yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-4116'} | 2022-01-03T15:55:40Z | 2021-12-16T21:00:45Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4116', 'https://github.com/yetiforcecompany/yetiforcecrm'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'} |
Packagist | GHSA-6xj3-fhrf-rjgc | Cross-site Scripting in microweber | XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks. | {'CVE-2022-1504'} | 2022-04-28T21:11:45Z | 2022-04-28T00:00:34Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504', 'https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6'} | null | {'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'} | {'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'} |
Packagist | GHSA-9f46-5r25-5wfm | Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem | ### Impact
The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely.
The conditions:
- A user is allowed to supply the path or filename of an uploaded file.
- The supplied path or filename is not checked against unicode chars.
- The supplied pathname checked against an extension deny-list, not an allow-list.
- The supplied path or filename contains a unicode whitespace char in the extension.
- The uploaded file is stored in a directory that allows PHP code to be executed.
Given these conditions are met a user can upload and execute arbitrary code on the system under attack.
### Patches
The unicode whitespace removal has been replaced with a rejection (exception).
The library has been patched in:
- 1.x: https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32
- 2.x: https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74
### Workarounds
For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.
| {'CVE-2021-32708'} | 2021-09-21T14:55:38Z | 2021-06-29T03:13:28Z | CRITICAL | null | {'CWE-367'} | {'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/', 'https://github.com/thephpleague/flysystem', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32708', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNZSWK4GOMJOOHKLZEOE5AQSLC4DNCRZ/', 'https://packagist.org/packages/league/flysystem', 'https://github.com/thephpleague/flysystem/security/advisories/GHSA-9f46-5r25-5wfm', 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32'} | null | {'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32', 'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74'} | {'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74', 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32'} |
Packagist | GHSA-wwvv-x5mq-h3jj | Use of Cryptographically Weak Pseudo-Random Number Generator in yiisoft/yii2-dev | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | {'CVE-2021-3692'} | 2021-08-30T20:28:42Z | 2021-09-01T18:35:26Z | MODERATE | null | {'CWE-338', 'CWE-330'} | {'https://github.com/yiisoft/yii2', 'https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3692'} | null | {'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'} | {'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'} |
Packagist | GHSA-3pg8-c473-w6rr | Stored Cross-site Scripting in showdoc | ShowDoc is a tool for an IT team to share documents online. showdoc contains a stored cross-site scripting vulnerability in the File Library page when uploading a file in .ofd format in versions prior to 2.10.4. At this time, there is no known workaround. Users should update to version 2.10.4. | {'CVE-2022-0967'} | 2022-03-25T00:07:36Z | 2022-03-16T00:00:46Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0967', 'https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
Packagist | GHSA-r6g8-jmj9-g945 | Improper Restriction of Rendered UI Layers or Frames in yourls | yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames | {'CVE-2021-3734'} | 2021-08-27T12:54:01Z | 2021-08-30T16:22:16Z | MODERATE | null | {'CWE-352', 'CWE-1021'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3734', 'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe', 'https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd', 'https://github.com/yourls/yourls'} | null | {'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe'} | {'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe'} |
Packagist | GHSA-3rpf-5rqv-689q | PHP Code Injection by malicious function name in smarty | Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher.
| {'CVE-2021-26120'} | 2022-05-03T03:01:58Z | 2021-02-26T19:53:24Z | CRITICAL | null | {'CWE-94'} | {'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md', 'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838', 'https://security.gentoo.org/glsa/202105-06', 'https://github.com/smarty-php/smarty', 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26120', 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md#3139---2021-02-17', 'https://github.com/smarty-php/smarty/security/advisories/GHSA-3rpf-5rqv-689q'} | null | {'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838'} | {'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838'} |
Packagist | GHSA-c676-mcw3-qg55 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3730'} | 2021-08-27T12:48:30Z | 2021-08-25T14:50:08Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7', 'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3730', 'https://github.com/firefly-iii/firefly-iii/'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6'} | {'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6'} |
Packagist | GHSA-m298-fh5c-jc66 | Object injection in PHPMailer/PHPMailer | ### Impact
This is a reintroduction of an earlier issue (CVE-2018-19296) by an unrelated bug fix in PHPMailer 6.1.8. An external file may be unexpectedly executable if it is used as a path to an attachment file via PHP's support for `.phar` files`. Exploitation requires that an attacker is able to provide an unfiltered path to a file to attach, or to trick calling code into generating one. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info.
### Patches
This issue was patched in the PHPMailer 6.4.1 release. This release also implements stricter filtering for attachment paths; paths that look like *any* kind of URL are rejected.
### Workarounds
Validate paths to loaded files using the same pattern as used in [`isPermittedPath()`](https://github.com/PHPMailer/PHPMailer/blob/master/src/PHPMailer.php#L1815) before using them in *any* PHP file function, such as `file_exists`. This method can't be used directly because it is protected, but you can implement the same thing in calling code. Note that this should be applied to *all* user-supplied paths passed into such functions; it's not a problem specific to PHPMailer.
### Credit
This issue was found by Fariskhi Vidyan, reported and managed via Tidelift. | {'CVE-2020-36326'} | 2021-05-10T19:27:44Z | 2021-05-04T17:42:13Z | CRITICAL | null | {'CWE-502', 'CWE-641'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36326', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-m298-fh5c-jc66', 'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/'} | null | {'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9'} | {'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9'} |
Packagist | GHSA-w68r-5p45-5rqp | Improper Input Validation in Laravel | An issue was discovered in Laravel before 6.18.35 and 7.x before 7.24.0. The $guarded property is mishandled in some situations involving requests with JSON column nesting expressions. | {'CVE-2020-24941'} | 2021-05-04T22:46:50Z | 2021-05-06T18:54:20Z | HIGH | null | {'CWE-863'} | {'https://blog.laravel.com/security-release-laravel-61835-7240', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24941', 'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'} | null | {'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'} | {'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'} |
Packagist | GHSA-36m2-8rhx-f36j | Sandbox bypass in Latte templates | ### Impact
The problem affects users who use the sandbox in Latte and templates from untrusted sources.
### Patches
Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8.
### References
The issues were discovered by
- JinYiTong (https://github.com/JinYiTong)
- 赵钰迪 <20212010122@fudan.edu.cn> | {'CVE-2022-21648'} | 2022-01-14T19:42:25Z | 2022-01-06T23:17:07Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21648', 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0', 'https://github.com/nette/latte', 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j'} | null | {'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'} | {'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'} |
Packagist | GHSA-3r8j-pmch-5j2h | Internal exception message exposure for login action in Sylius | ## Internal exception message exposure for login action
### Impact
Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer.
A validation message with the exception details will be presented to the user when one will try to log into the shop.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
### Workarounds
The `src/Sylius/Bundle/UiBundle/Resources/views/Security/_login.html.twig` file should be overridden and lines https://github.com/Sylius/Sylius/blob/1.4/src/Sylius/Bundle/UiBundle/Resources/views/Security/_login.html.twig#L13-L17 should be replaced with
```twig
{% if last_error %}
<div class="ui left aligned basic segment">
{{ messages.error(last_error.messageKey) }}
</div>
{% endif %}
```
The `messageKey` field should be used instead of the `message`. | {'CVE-2019-16768'} | 2021-01-08T21:20:32Z | 2019-12-05T19:57:04Z | LOW | null | {'CWE-209'} | {'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f', 'https://github.com/advisories/GHSA-3r8j-pmch-5j2h', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768'} | null | {'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'} | {'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'} |
Packagist | GHSA-x8wj-cqmp-3wmm | Cross-site Scripting in Zenario CMS | Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS. | {'CVE-2021-41952'} | 2022-03-28T22:21:45Z | 2022-03-15T00:00:59Z | MODERATE | null | {'CWE-79'} | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41952', 'https://github.com/TribalSystems/Zenario', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55141'} | null | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'} | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'} |
Packagist | GHSA-g2qj-pmxm-9f8f | User enumeration in authentication mechanisms | Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user.
Resolution
----------
We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4.
Credits
-------
I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue. | null | 2021-10-08T21:21:12Z | 2021-05-17T20:52:32Z | LOW | null | {'CWE-200'} | {'https://github.com/symfony/symfony/security/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011', 'https://github.com/symfony/symfony'} | null | {'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} | {'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} |
Packagist | GHSA-68q3-7wjp-7q3j | The filename of uploaded files vulnerable to stored XSS | ### Impact
The filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it.
Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented.
### Patches
This is fixed in Bolt 3.7.1.
### References
Related issue: https://github.com/bolt/bolt/pull/7853 | {'CVE-2020-4041'} | 2021-01-08T20:13:40Z | 2020-06-09T00:25:34Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-4041', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html', 'http://seclists.org/fulldisclosure/2020/Jul/4'} | null | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} |
Packagist | GHSA-4w23-c97g-fq5v | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4130'} | 2022-01-04T20:20:07Z | 2022-01-05T20:33:16Z | HIGH | null | {'CWE-352'} | {'https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e', 'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130', 'https://github.com/snipe/snipe-it'} | null | {'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'} | {'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'} |
Packagist | GHSA-7v7w-f7c6-f829 | yetiforcecrm is vulnerable to Business Logic Errors | yetiforcecrm is vulnerable to Business Logic Errors. | {'CVE-2021-4111'} | 2022-01-03T15:47:58Z | 2021-12-16T21:01:15Z | HIGH | null | null | {'https://github.com/yetiforcecompany/yetiforcecrm', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111', 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'} |
Packagist | GHSA-952p-fqcp-g8pc | HTML injection possibility in voucher code form in Shopware | ### Impact
HTML injection possibility in voucher code form
## Patches
Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | {'CVE-2022-24746'} | 2022-03-18T20:14:15Z | 2022-03-10T17:49:26Z | MODERATE | null | {'CWE-79'} | {'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24746', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022'} | null | {'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'} | {'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'} |
Packagist | GHSA-699q-wcff-g9mj | Unsafe deserialization in Yii 2 | ### Impact
Remote code execution in case application calls `unserialize()` on user input containing specially crafted string.
### Patches
2.0.38
### Workarounds
Add the following to BatchQueryResult.php:
```php
public function __sleep()
{
throw new \BadMethodCallException('Cannot serialize '.__CLASS__);
}
public function __wakeup()
{
throw new \BadMethodCallException('Cannot unserialize '.__CLASS__);
}
```
### For more information
If you have any questions or comments about this advisory, [contact us through security form](https://www.yiiframework.com/security). | {'CVE-2020-15148'} | 2021-01-07T22:56:34Z | 2020-09-15T18:19:56Z | HIGH | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15148', 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj', 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'} | null | {'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'} | {'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'} |
Packagist | GHSA-5jxc-hmqf-3f73 | Cross-Site Scripting in grav | grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3904'} | 2021-11-01T14:06:13Z | 2021-11-01T19:17:31Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3904', 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d', 'https://github.com/getgrav/grav/', 'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d'} | null | {'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'} | {'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'} |
Packagist | GHSA-fp63-499m-hq6m | Files or Directories Accessible to External Parties in ether/logs | ### Impact
A vulnerability was found that allowed authenticated admin users to access any file on the server.
### Patches
The vulnerability has been fixed in 3.0.4.
### Workarounds
We recommend disabling the plugin if untrustworthy sources have admin access.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [ether/logs](https://github.com/ethercreative/logs/issues)
| {'CVE-2021-32752'} | 2021-07-09T14:04:21Z | 2021-07-12T16:53:00Z | HIGH | null | {'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32752', 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs/releases/tag/3.0.4'} | null | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} |
Packagist | GHSA-5vfx-8w6m-h3v4 | Authentication bypass due to improper user-provided security token verification | A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user.
## Impact
Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user.
This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`.
There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user.
## Scope
At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably:
1.) The account referenced by the malicious cache key **must** have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow.
2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they **must** provide a valid two-factor authentication token.
However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met:
3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker.
### About the Severity
As you may have noticed, this is not a trivial authentication bypass bug to exploit, and is likely incredibly difficult for a layperson to pull off. However, the severity of this disclosure has been prepared based on the nature of the bug and the potential for unexpected administrative account access under very rare conditions.
## Mitigation
In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere.
If you have any questions or concerns about the content of this disclosure please contact `Tactical Fish#8008` on Discord, or email `dane ät pterodactyl.io`. | {'CVE-2021-41129'} | 2021-10-12T21:45:10Z | 2021-10-04T20:14:13Z | HIGH | null | {'CWE-639', 'CWE-502', 'CWE-807'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41129', 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4', 'https://github.com/pterodactyl/panel', 'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'} | null | {'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'} | {'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'} |
Packagist | GHSA-53m6-44rc-h2q5 | Missing server signature validation in OctoberCMS | ### Impact
This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server.
It has been disclosed that a project fork of October CMS v1.0 is using a compromised gateway to access the October CMS marketplace service. The compromised gateway captures the personal/business information of users and authors, including private source code files. It was also disclosed that captured plugin files are freely redistributed to other users without authorization.
1. End-users are provided with a forked version of October CMS v1.0. The provided software is modified to use a compromised gateway server.
2. The user is instructed to enter their October CMS license key into the administration panel to access the October CMS marketplace. The key is sent to the compromised server while appearing to access the genuine October CMS gateway server.
3. The compromised gateway server uses a "man in the middle" mechanism that captures information while forwarding the request to the genuine October CMS gateway and relaying the response back to the client.
4. The compromised gateway server stores the license key and other information about the user account including client name, email address and contents of purchased plugins and privately uploaded plugin files.
5. The stored plugin files are made available to other users of the compromised gateway server.
### Patches
The issue has been patched in Build 475 (v1.0.475) and v1.1.11.
### Workarounds
Apply https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a to your installation manually if unable to upgrade to Build 475 or v1.1.11.
### Recommendations
We recommend the following steps to make sure your account information stays secure:
- Do not share your license key with anyone except October CMS.
- Check to make sure that your gateway update server has not been modified.
- Be aware of phishing websites, including other platforms that use the same appearance.
- For authors, you may contact us for help requesting the removal of affected plugins.
- Before providing plugin support, verify that the user holds a legitimate copy of the plugin.
### References
Credits for research on this exploit:
• Nikita Khaetsky
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com) | {'CVE-2022-23655'} | 2022-03-08T18:23:38Z | 2022-02-24T13:09:30Z | MODERATE | null | {'CWE-347'} | {'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23655'} | null | {'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'} | {'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'} |
Packagist | GHSA-qwpp-fgrj-h78q | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. | {'CVE-2021-32712'} | 2021-06-25T15:32:28Z | 2021-09-08T17:59:46Z | MODERATE | null | {'CWE-200'} | {'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32712', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'} | null | {'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'} | {'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'} |
Packagist | GHSA-g4m9-5hpf-hx72 | Firewall configured with unanimous strategy was not actually unanimous in Symfony | Description
-----------
On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access.
As of Symfony 4.4.0, a bug was introduced that prevents the check of attributes as soon as `accessDecisionManager` decide to grant access on one attribute.
Resolution
----------
The `accessDecisionManager` is now called with all attributes at once, allowing the unanimous strategy being applied on each attribute.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf) for the 4.4 branch.
Credits
-------
I would like to thank Antonio J. García Lagar for reporting & Robin Chalas for fixing the issue. | {'CVE-2020-5275'} | 2021-01-14T17:48:29Z | 2020-03-30T20:09:44Z | HIGH | null | {'CWE-285'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72', 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5275'} | null | {'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'} | {'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'} |
Packagist | GHSA-59qh-g7m4-j9m9 | Cross-site Scripting in livehelperchat | Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript. | {'CVE-2022-0374'} | 2022-02-02T16:05:01Z | 2022-01-28T23:06:12Z | MODERATE | null | {'CWE-79'} | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374', 'https://github.com/livehelperchat/livehelperchat/'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} |
Packagist | GHSA-m5vr-3m74-jwxp | Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007), [CVE-2020-15099](https://nvd.nist.gov/vuln/detail/CVE-2020-15099): Potential Privilege Escalation
+ the database server used for a TYPO3 installation must be accessible for an attacker (either via internet or shared hosting network)
+ `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5, high)
* [TYPO3-CORE-SA-2016-013](https://typo3.org/security/advisory/typo3-core-sa-2016-013), [CVE-2016-5091](https://nvd.nist.gov/vuln/detail/CVE-2016-5091): Insecure Deserialization & Remote Code Execution
+ an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation
+ `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1, critical)
The overall severity of this vulnerability is **high (8.2)** based on mentioned attack chains and the requirement of having a valid backend user session (authenticated).
### Solution
Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2020-008](https://typo3.org/security/advisory/typo3-core-sa-2020-008) | {'CVE-2020-15098'} | 2021-11-19T15:43:34Z | 2020-07-29T16:15:19Z | HIGH | null | {'CWE-327', 'CWE-200', 'CWE-325', 'CWE-20', 'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-5091', 'https://github.com/TYPO3/TYPO3.CMS', 'https://typo3.org/security/advisory/typo3-core-sa-2020-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098', 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1', 'https://typo3.org/security/advisory/typo3-core-sa-2016-013', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-m5vr-3m74-jwxp'} | null | {'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'} | {'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'} |
Packagist | GHSA-2v82-5746-vwqc | XSS in doc_link | ### Impact
Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected.
### Patches
Patched by 4043092, included in version [4.8.1](https://github.com/vrana/adminer/releases/tag/v4.8.1).
### Workarounds
Do both:
* Use browser supporting strict CSP.
* Enable the native PHP extensions (e.g. `mysqli`) or disable displaying PHP errors (`display_errors`).
### References
https://sourceforge.net/p/adminer/bugs-and-features/797/
### For more information
If you have any questions or comments about this advisory:
* Comment at 4043092.
| {'CVE-2021-29625'} | 2022-03-18T17:49:28Z | 2022-03-18T17:49:28Z | HIGH | null | {'CWE-79'} | {'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc', 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7', 'https://sourceforge.net/p/adminer/bugs-and-features/797/', 'https://packagist.org/packages/vrana/adminer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29625'} | null | {'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'} | {'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'} |
Packagist | GHSA-3pc2-fm7p-q2vg | Cross-site Scripting in October | ### Impact
Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack.
### Patches
Issue has been patched in Build 467 (v1.0.467).
### Workarounds
Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installation manually if unable to upgrade to Build 467.
### References
- https://research.securitum.com/the-curious-case-of-copy-paste/
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
Assessed as Low given that by the nature of the attack it can only impact users that do it to themselves by copying and pasting from malicious websites.
### Acknowledgements
Thanks to [Michał Bentkowski of Securitum](https://research.securitum.com/authors/michal-bentkowski/) for finding the original issue in Froala and @tomaszstrojny for reporting the issue to the October CMS team. | {'CVE-2020-4061'} | 2021-03-04T18:26:09Z | 2020-07-02T16:55:11Z | LOW | null | {'CWE-79'} | {'https://research.securitum.com/the-curious-case-of-copy-paste/', 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5', 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4061'} | null | {'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'} | {'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'} |
Packagist | GHSA-f7xw-46vh-5jw2 | livehelperchat is vulnerable to Cross-site Scripting | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4132'} | 2022-01-04T20:12:09Z | 2022-01-05T20:33:47Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4132', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'} | {'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'} |
Packagist | GHSA-8c5p-4362-9333 | Path traversal in grav | grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | {'CVE-2021-3924'} | 2021-11-08T21:30:39Z | 2021-11-10T16:48:15Z | HIGH | null | {'CWE-22'} | {'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/getgrav/grav', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3924'} | null | {'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'} | {'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'} |
Packagist | GHSA-6gw4-x63h-5499 | Ability to switch customer email address on account detail page and stay verified | ### Impact
The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one).
### Patches
Patch has been provided for Sylius 1.6.x and newer - 1.6.9, 1.7.9, 1.8.3. Versions older than 1.6 are not covered by our security support anymore.
### Workarounds
If for whatever reason you are not able to upgrade your application version, you may resolve this issue on your own by creating a custom event listener, which will listen to the `sylius.customer.pre_update` event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain `/admin` prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here.
### Acknowledgements
This security issue has been reported by Mircea Silviu (@decemvre), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com) | {'CVE-2020-15245'} | 2021-11-19T13:51:50Z | 2020-10-19T20:40:59Z | MODERATE | null | {'CWE-79', 'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15245', 'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'} | null | {'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'} | {'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'} |
Packagist | GHSA-xhr8-mpwq-2rr2 | Automatic named constructor discovery in Valinor | ## Design issue - automatic constructor discovery
The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked.
Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228.
## Example exploit
Take following DTO example:
```php
final class UserDTO
{
public function __construct(
public int $id,
public string $name
) {}
public static function fromDb(
PDO $connection,
int $id
): self { /* ... code to fetch the DTO here ... */ }
}
```
There is nothing inherently unsafe about the above `UserDTO`, but when mixed with `cuyz/valinor:^0.5.0` ( specifically https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b ), it is an explosive mix:
```php
// this could be coming from user input:
$maliciousPayload = [
'connection' => [
'dsn' => 'mysql:host=some-host;database=some-database',
'username' => 'root',
'password' => 'root',
'options' => [
// PDO::MYSQL_ATTR_INIT_COMMAND === 1002
1002 => 'DROP DATABASE all-the-moneys'
]
],
'id' => 123,
];
$treeMapper->map(
UserDTO::class,
$maliciousPayload
); // your DB is gone :D
```
The above payload is represented in PHP form, but may as well be input JSON, HTML or x-form-urlencoded.
## Mitigation
Version 0.7.0 contains a patch for this issue.
Automatic named constructor resolution should be disabled - only explicitly mapped named constructors should be used/discovered. | null | 2022-04-01T13:39:45Z | 2022-04-01T13:39:45Z | HIGH | null | null | {'https://github.com/CuyZ/Valinor', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0'} | null | {'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'} | {'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'} |
Packagist | GHSA-5jfw-35xp-5m42 | Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown | ### Impact
`LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negative signed int32), causing `BinaryStream->get()` to throw an exception.
In the context of PocketMine-MP, this leads to a server crash when the vulnerability is exploited.
### Patches
e3fce7632b94e83fd6a518a87dcaf6a11681c4ac
### Workarounds
This can be worked around by registering a custom `LoginPacket` implementation into `PacketPool` which overrides [this code](https://github.com/pmmp/BedrockProtocol/blob/47532c95ea37d5f0365b23f734d70d943ff95295/src/LoginPacket.php#L54) to patch it.
### For more information
* Email us at [team@pmmp.io](mailto:team@pmmp.io) | null | 2022-04-05T17:53:22Z | 2022-04-05T17:53:22Z | HIGH | null | {'CWE-124'} | {'https://github.com/pmmp/BedrockProtocol', 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'} | null | {'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'} | {'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'} |
Packagist | GHSA-57qf-82hh-2hmc | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting. | {'CVE-2022-0502'} | 2022-02-14T22:30:19Z | 2022-02-07T00:00:30Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'} | {'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'} |
Packagist | GHSA-8c9x-wfgj-v78w | Open Redirect in showdoc | showdoc is vulnerable to URL Redirection to Untrusted Site | {'CVE-2021-4000'} | 2021-12-06T21:57:44Z | 2021-12-16T15:31:58Z | MODERATE | null | {'CWE-601'} | {'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000', 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://github.com/star7th/showdoc'} | null | {'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'} | {'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'} |
Packagist | GHSA-h9vc-2p9g-63gp | Exposure of Sensitive Information to an Unauthorized Actor in pimcore | Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1. | {'CVE-2022-0565'} | 2022-02-24T13:10:51Z | 2022-02-15T00:02:47Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0565', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://github.com/pimcore/pimcore/', 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'} | null | {'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'} | {'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'} |
Packagist | GHSA-7vxc-chqj-h83g | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4168'} | 2022-01-07T16:11:21Z | 2022-01-06T22:02:18Z | MODERATE | null | {'CWE-352'} | {'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168', 'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c'} | null | {'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'} | {'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'} |
Packagist | GHSA-xhfx-hgmf-v6vp | Potential Host Header Poisoning on misconfigured servers | ### Impact
When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Poisoning:
- https://portswigger.net/web-security/host-header
- https://dzone.com/articles/what-is-a-host-header-attack
### Patches
A feature has been added in v1.1.2 to allow a set of trusted hosts to be specified in the application.
### Workarounds
- Apply https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6 & https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0 to your installation manually if unable to upgrade to v1.1.2.
- Check that the configuration setting `cms.linkPolicy` is set to `force`.
### Alternative Workaround
Check to make sure that your web server does not accept any hostname when serving your web application.
1. Add an entry called `testing.tld` to your computer's host file and direct it to your server's IP address
2. Open the address `testing.tld` in your web browser
3. Make sure an October CMS website is not available at this address
If an October CMS website is returned, configure your webserver to only allow known hostnames. If you require assistance with this, please contact your server administrator.
### References
Reported by [Abdullah Hussam](https://github.com/ahussam)
### For More Information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
<img width="1108" alt="Screen Shot 2021-01-15 at 4 12 57 PM" src="https://user-images.githubusercontent.com/7253840/104783859-92fb3600-574c-11eb-9e21-c0dc05d230a9.png"> | {'CVE-2021-21265'} | 2021-03-10T21:07:08Z | 2021-03-10T21:07:25Z | LOW | null | {'CWE-644'} | {'https://packagist.org/packages/october/backend', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp', 'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6'} | null | {'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'} | {'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'} |
Packagist | GHSA-9chx-2vqw-8vq5 | Path Traversal in the Logs plugin for Craft CMS | The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php. | {'CVE-2022-23409'} | 2022-02-08T16:08:49Z | 2022-02-01T00:01:00Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://sec-consult.com/vulnerability-lab/', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs', 'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html', 'https://plugins.craftcms.com/logs'} | null | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} |
Packagist | GHSA-rr8m-29g8-8cgc | SQL Injection in Fork CMS | Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1. | {'CVE-2022-1064'} | 2022-04-01T20:06:24Z | 2022-03-26T00:00:32Z | HIGH | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/forkcms/forkcms', 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'} | null | {'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'} | {'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'} |
Packagist | GHSA-2xhg-w2g5-w95x | CSV Injection in symfony/serializer | Description
-----------
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker.
In Symfony 4.1, we've added the opt-in `csv_escape_formulas` option in `CsvEncoder`, to prefix all cells starting by `=`, `+`, `-` or `@` by a tab `\t`.
Since then, OWASP added 2 chars in that list:
- Tab (0x09)
- Carriage return (0x0D)
This makes our previous prefix char (Tab `\t`) part of the vulnerable characters, and [OWASP suggests](https://owasp.org/www-community/attacks/CSV_Injection) using the single quote `'` for prefixing the value.
Resolution
----------
Symfony now follows the OWASP recommendations and use the single quote `'` to prefix formulas and adds the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8) for branch 4.4.
Credits
-------
We would like to thank Jake Barwell for reporting the issue and Jérémy Derussé for fixing the issue.
| {'CVE-2021-41270'} | 2021-12-06T21:36:47Z | 2021-11-24T21:01:23Z | MODERATE | null | {'CWE-1236'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/', 'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'} | null | {'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'} | {'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'} |
Packagist | GHSA-rf3w-29h3-r636 | Arbitrary Code Execution in feehi/cms | An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file. | {'CVE-2020-21322'} | 2021-09-17T17:54:21Z | 2021-09-20T20:45:35Z | HIGH | null | {'CWE-434'} | {'https://github.com/liufee/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322', 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms/issues/44'} | null | {'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'} | {'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'} |
Packagist | GHSA-pccm-j6vj-jwwf | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload. | {'CVE-2022-0962'} | 2022-03-29T18:54:13Z | 2022-03-15T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
Packagist | GHSA-pq2f-3fg3-rw99 | SQL Injection in WordPress Zero Spam WordPress plugin | The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection | {'CVE-2022-0254'} | 2022-03-29T15:26:17Z | 2022-03-15T00:00:57Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906', 'https://github.com/Highfivery/zero-spam-for-wordpress', 'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3', 'https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997'} | null | {'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'} | {'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'} |
Packagist | GHSA-v4cr-m5f8-gxw8 | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF) | yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4092'} | 2021-12-15T15:20:43Z | 2021-12-16T14:14:56Z | MODERATE | null | {'CWE-352'} | {'https://github.com/yetiforcecompany/yetiforcecrm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23', 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'} |
Packagist | GHSA-m8rp-q82r-c5mf | Cross-site Scripting in microweber | Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0278'} | 2022-01-27T18:31:46Z | 2022-01-21T18:06:49Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'} | {'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'} |
Packagist | GHSA-x3g3-jh26-76cf | Cross-site Scripting in livehelperchat | LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration. | {'CVE-2022-0375'} | 2022-02-02T16:05:32Z | 2022-01-28T23:06:00Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0375', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://github.com/livehelperchat/livehelperchat/', 'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} |
Packagist | GHSA-6vx5-cg2p-7g5v | Unrestricted Upload of File with Dangerous Type in microweber | Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12. | {'CVE-2022-0912'} | 2022-03-22T21:37:48Z | 2022-03-12T00:00:35Z | MODERATE | null | {'CWE-434'} | {'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'} | null | {'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'} | {'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'} |
Packagist | GHSA-qjhr-c23f-w76q | Inline JS XSS vulnerability in Mautic | ### Impact
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form.
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.12.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org) | {'CVE-2017-1000488'} | 2021-01-19T21:14:13Z | 2021-01-19T21:16:24Z | MODERATE | null | {'CWE-79'} | {'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488'} | null | {'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'} | {'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'} |
Packagist | GHSA-8rc5-hx3v-2jg7 | Sanitizer bypass in svg-sanitizer | It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer. | {'CVE-2019-10772'} | 2021-08-19T19:25:06Z | 2020-02-27T20:36:29Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969', 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'} | null | {'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'} | {'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'} |
Packagist | GHSA-vhfp-9wvj-gwvg | XML External Entity vulnerability in MODX CMS | A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). | {'CVE-2020-25911'} | 2021-11-03T14:51:31Z | 2021-11-01T19:19:43Z | CRITICAL | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/modxcms/revolution', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md', 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution/issues/15237', 'https://github.com/modxcms/revolution/pull/15238'} | null | {'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'} | {'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'} |
Packagist | GHSA-cxg7-84wp-8pcq | yetiforcecrm is vulnerable to Business Logic Errors | yetiforcecrm is vulnerable to Business Logic Errors. | {'CVE-2021-4117'} | 2022-01-03T15:47:42Z | 2021-12-16T21:01:07Z | HIGH | null | null | {'https://github.com/yetiforcecompany/yetiforcecrm', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117'} | null | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'} | {'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'} |
Packagist | GHSA-5rg2-6qr5-2xp8 | Cross-site Scripting in snipe-it | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3863'} | 2021-10-25T20:08:18Z | 2021-10-21T17:49:18Z | MODERATE | null | {'CWE-79'} | {'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'} | null | {'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'} | {'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'} |
Packagist | GHSA-9vh6-qfv6-vcqp | snipe-IT vulnerable to host header injection | Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This can lead to account take over. | {'CVE-2022-23064'} | 2022-05-03T06:29:50Z | 2022-05-03T00:00:43Z | HIGH | null | {'CWE-74'} | {'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064', 'https://github.com/snipe/snipe-it', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064'} | null | {'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'} | {'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'} |
Packagist | GHSA-p3w3-4ppm-c3f6 | Cross site scripting in FacturaScripts | FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format. | {'CVE-2022-1514'} | 2022-04-29T21:02:47Z | 2022-04-29T00:00:23Z | CRITICAL | null | {'CWE-79'} | {'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e', 'https://github.com/NeoRazorX/facturascripts', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c'} | null | {'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'} | {'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'} |
Packagist | GHSA-2v7p-f4qm-r5pc | SQL Injection found in Pimcore | Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. | {'CVE-2022-1429'} | 2022-05-03T21:01:41Z | 2022-04-23T00:03:03Z | HIGH | null | {'CWE-89'} | {'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'} | null | {'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'} | {'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'} |
Packagist | GHSA-6gm7-j668-w6h9 | SQL Injection in Pimcore | Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality. | {'CVE-2022-1219'} | 2022-04-22T20:42:11Z | 2022-04-09T00:00:30Z | HIGH | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'} | null | {'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'} | {'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'} |
Packagist | GHSA-m4hj-wg2r-qpcr | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3776'} | 2021-11-17T21:10:57Z | 2021-11-15T23:13:34Z | MODERATE | null | {'CWE-352'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'} | null | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.