ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-m394-8rww-3jr7
|
DOS vulnerability for Quoted Quality CSV headers
|
### Impact
When Jetty handles a request containing request headers with a large number of “quality” (i.e. q) parameters (such as what are seen on the `Accept`, `Accept-Encoding`, and `Accept-Language` request headers), the server may enter a denial of service (DoS) state due to high CPU usage while sorting the list of values based on their quality values. A single request can easily consume minutes of CPU time before it is even dispatched to the application.
The only features within Jetty that can trigger this behavior are:
- Default Error Handling - the `Accept` request header with the `QuotedQualityCSV` is used to determine what kind of content to send back to the client (html, text, json, xml, etc)
- `StatisticsServlet` - uses the `Accept` request header with the `QuotedQualityCSV` to determine what kind of content to send back to the client (xml, json, text, html, etc)
- `HttpServletRequest.getLocale()` - uses the `Accept-Language` request header with the `QuotedQualityCSV` to determine which “preferred” language is returned on this call.
- `HttpservletRequest.getLocales()` - is similar to the above, but returns an ordered list of locales based on the quality values on the `Accept-Language` request header.
- `DefaultServlet` - uses the `Accept-Encoding` request header with the `QuotedQualityCSV` to determine which kind of pre-compressed content should be sent back for static content (content that is not matched against a url-pattern in your web app)
### Versions
`QuotedQualityCSV` was introduced to Jetty 9.3.9.v20160517 and the bug that introduced the vulnerability was in 9.4.6.v20170531.
Currently, known vulnerable versions include:
- 9.4.6.v20170531 thru to 9.4.36.v20210114
- 10.0.0
- 11.0.0
### Workarounds
Quality ordered values are used infrequently by jetty so they can be avoided by:
* Do not use the default error page/handler.
* Do not deploy the `StatisticsServlet` exposed to the network
* Do not call `getLocale` API
* Do not enable precompressed static content in the `DefaultServlet`
### Patches
All patches are available for download from the Eclipse Jetty website at [https://www.eclipse.org/jetty/download.php](https://www.eclipse.org/jetty/download.php)
- 9.4.37.v20210219 and greater
- 10.0.1 and greater
- 11.0.1 and greater
|
{'CVE-2020-27223'}
|
2022-04-19T19:02:47Z
|
2021-03-10T03:46:47Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27223', 'https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7', 'https://security.netapp.com/advisory/ntap-20210401-0005/', 'https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E', 'https://github.com/advisories/GHSA-m394-8rww-3jr7', 'https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128'}
| null |
GHSA
|
GHSA-x5c7-x7m2-rhmf
|
Local directory executable lookup in sops (Windows-only)
|
### Impact
Windows users using the sops direct editor option (`sops file.yaml`) can have a local executable named either `vi`, `vim`, or `nano` executed if running sops from `cmd.exe`
This attack is only viable if an attacker is able to place a malicious binary within the directory you are running sops from. As well, this attack will only work when using `cmd.exe` or the Windows C library [SearchPath function](https://docs.microsoft.com/en-us/windows/win32/api/processenv/nf-processenv-searchpatha). This is a result of these Windows tools including `.` within their `PATH` by default.
**If you are using sops within untrusted directories on Windows via `cmd.exe`, please upgrade immediately**
**As well, if you have `.` within your default $PATH, please upgrade immediately.**
More information can be found on the official Go blog: https://blog.golang.org/path-security
### Patches
The problem has been resolved in v3.7.1
Now, if Windows users using cmd.exe run into this issue, a warning message will be printed:
`vim resolves to executable in current directory (.\vim.exe)`
### References
* https://blog.golang.org/path-security
### For more information
If you have any questions or comments about this advisory:
* Open a discussion in [sops](https://github.com/mozilla/sops/discussions)
| null |
2022-04-19T19:02:52Z
|
2021-05-20T16:50:34Z
|
LOW
| 0
| null |
{'https://github.com/mozilla/sops/security/advisories/GHSA-x5c7-x7m2-rhmf', 'https://github.com/advisories/GHSA-x5c7-x7m2-rhmf'}
| null |
GHSA
|
GHSA-5q54-8p9j-x74j
|
Cross-site Scripting in pandao editor.md
|
pandao Editor.md 1.5.0 allows XSS via the Javascript: string.
|
{'CVE-2019-14517'}
|
2021-08-17T21:59:59Z
|
2019-08-23T00:05:03Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5q54-8p9j-x74j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14517', 'https://github.com/pandao/editor.md/issues/709'}
| null |
GHSA
|
GHSA-f7xw-46vh-5jw2
|
livehelperchat is vulnerable to Cross-site Scripting
|
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4132'}
|
2022-01-05T20:33:47Z
|
2022-01-05T20:33:47Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132', 'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2', 'https://github.com/advisories/GHSA-f7xw-46vh-5jw2'}
| null |
GHSA
|
GHSA-69gw-hgj3-45m7
|
Memory corruption in smallvec
|
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is memory corruption for certain grow attempts with less than the current capacity.
|
{'CVE-2019-15554'}
|
2021-08-25T20:43:58Z
|
2021-08-25T20:43:58Z
|
CRITICAL
| 9.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-69gw-hgj3-45m7', 'https://github.com/servo/rust-smallvec/issues/149', 'https://rustsec.org/advisories/RUSTSEC-2019-0012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15554'}
| null |
GHSA
|
GHSA-gvm7-8fq3-qjj2
|
Malicious Package in bs85
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:50:16Z
|
2020-09-03T19:43:18Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1378', 'https://github.com/advisories/GHSA-gvm7-8fq3-qjj2'}
| null |
GHSA
|
GHSA-gx6h-936c-vrrr
|
Cross site scripting in registration template in xwiki-platform
|
### Impact
We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field.
This template is only used in the following conditions:
- the wiki must be open to registration for anyone
- the wiki must be closed to view for Guest users (more specifically the XWiki.Registration page must be forbidden in View for guest user)
A way to obtain the second condition is when administrators checked the "Prevent unregistered users from viewing pages, regardless of the page rights" box in the administration rights.
### Patches
The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3.
### Workarounds
There are two main ways for protecting against this vulnerability, the easiest and the best one is by applying a patch in the `registerinline.vm` template, the patch consists in checking the value of the xredirect field to ensure it matches the following:
```
<input type="hidden" name="xredirect" value="$escapetool.xml($!request.xredirect)" />
```
If for some reason it's not possible to patch this file, another workaround is to ensure "Prevent unregistered users from viewing pages, regardless of the page rights" is not checked in the rights and apply a better right scheme using groups and rights on spaces.
### References
https://jira.xwiki.org/browse/XWIKI-19291
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security mailing list](mailto:security@xwiki.org)
|
{'CVE-2022-23622'}
|
2022-02-11T15:00:09Z
|
2022-02-09T23:25:44Z
|
HIGH
| 7.4
|
{'CWE-79'}
|
{'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://jira.xwiki.org/browse/XWIKI-19291', 'https://github.com/advisories/GHSA-gx6h-936c-vrrr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622'}
| null |
GHSA
|
GHSA-g3r2-65gc-qpqc
|
Denial of Service in mqtt-packet
|
Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application.
## Recommendation
Version 3.x: Update to version 3.4.6 or later.
Version 4.x: Update to version 4.0.5 or later.
|
{'CVE-2016-10523'}
|
2021-01-08T18:50:03Z
|
2019-02-18T23:38:45Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://github.com/mqttjs/mqtt-packet/pull/8', 'https://github.com/mcollina/mosca/issues/393', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10523', 'https://www.npmjs.com/advisories/75', 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc', 'https://nodesecurity.io/advisories/75'}
| null |
GHSA
|
GHSA-rgcg-28xm-8mmw
|
Cross-Site Scripting in Backend Grid View
|
### Problem
Failing to properly encode settings for _backend layouts_, the corresponding grid view is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
### Credits
Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.
|
{'CVE-2021-32669'}
|
2022-04-19T19:02:59Z
|
2021-07-22T19:37:41Z
|
MODERATE
| 6.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32669', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-rgcg-28xm-8mmw', 'https://typo3.org/security/advisory/typo3-core-sa-2021-011', 'https://github.com/advisories/GHSA-rgcg-28xm-8mmw'}
| null |
GHSA
|
GHSA-8c5p-4362-9333
|
Path traversal in grav
|
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
{'CVE-2021-3924'}
|
2021-11-10T16:48:15Z
|
2021-11-10T16:48:15Z
|
HIGH
| 8.8
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3924', 'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/advisories/GHSA-8c5p-4362-9333', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
| null |
GHSA
|
GHSA-4wv4-mgfq-598v
|
Code injection in nobelprizeparser
|
Code injection through use of eval.
| null |
2021-03-12T23:00:19Z
|
2021-03-12T23:00:19Z
|
CRITICAL
| 0
|
{'CWE-94'}
|
{'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/advisories/GHSA-4wv4-mgfq-598v', 'https://www.npmjs.com/package/nobelprizeparser', 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}
| null |
GHSA
|
GHSA-r82c-j4mq-5xfw
|
Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs
|
### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.5.0 can generate an invalid short URL when a vanity domain exists.
### Patches
Upgrading `bitlyshortener` to 0.5.0 or newer will prevent the generation of any such invalid short URLs.
### References
* [Release notes](https://github.com/impredicative/bitlyshortener/releases)
| null |
2021-09-21T16:40:42Z
|
2020-10-27T19:19:56Z
|
HIGH
| 0
|
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-r82c-j4mq-5xfw', 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-r82c-j4mq-5xfw', 'https://pypi.org/project/bitlyshortener/', 'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.5.0'}
| null |
GHSA
|
GHSA-2w7w-2j92-44hx
|
HTTP Request Smuggling in akka-http-core
|
A vulnerable Akka HTTP server will accept a malformed message and hand it over to the user. If the user application proxies this message to another server unchanged and that server also accepts that message but interprets it as two HTTP messages, the second message has reached the second server without having been inspected by the proxy.
|
{'CVE-2021-23339'}
|
2021-05-10T15:17:09Z
|
2021-05-10T15:17:09Z
|
MODERATE
| 6.5
|
{'CWE-444'}
|
{'https://github.com/advisories/GHSA-2w7w-2j92-44hx', 'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34', 'https://snyk.io/vuln/SNYK-JAVA-COMTYPESAFEAKKA-1075043', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23339', 'https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.html', 'https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201'}
| null |
GHSA
|
GHSA-h95j-h2rv-qrg4
|
Moderate severity vulnerability that affects django
|
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
|
{'CVE-2011-4140'}
|
2021-09-14T17:15:59Z
|
2018-07-23T19:51:19Z
|
MODERATE
| 0
|
{'CWE-352'}
|
{'https://hermes.opensuse.org/messages/14700881', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4140', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'http://secunia.com/advisories/46614', 'https://github.com/advisories/GHSA-h95j-h2rv-qrg4', 'http://www.debian.org/security/2011/dsa-2332', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://openwall.com/lists/oss-security/2011/09/13/2'}
| null |
GHSA
|
GHSA-jxcc-g75x-qgw9
|
Arbitrary File Write via Archive Extraction (Zip Slip)
|
This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality.
|
{'CVE-2021-23391'}
|
2021-06-17T20:03:53Z
|
2021-06-08T18:47:18Z
|
HIGH
| 7.3
|
{'CWE-668', 'CWE-29'}
|
{'https://github.com/cliftonc/calipso', 'https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23391', 'https://github.com/advisories/GHSA-jxcc-g75x-qgw9'}
| null |
GHSA
|
GHSA-2v88-qq7x-xq5f
|
Improper Encoding or Escaping of Output in Asset Metadata Component
|
Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually.
|
{'CVE-2021-39170'}
|
2021-09-10T17:10:52Z
|
2021-09-01T18:21:55Z
|
HIGH
| 8
|
{'CWE-116', 'CWE-79'}
|
{'https://github.com/pimcore/pimcore/pull/10206', 'https://github.com/pimcore/pimcore/pull/10178.patch', 'https://huntr.dev/bounties/c3e4cf79-a4b5-4982-af27-729f66281501/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39170', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f', 'https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/', 'https://github.com/advisories/GHSA-2v88-qq7x-xq5f', 'https://github.com/pimcore/pimcore/pull/10178'}
| null |
GHSA
|
GHSA-gcm4-q2pg-xw89
|
Moderate severity vulnerability that affects ipycache
|
A code injection issue was discovered in ipycache through 2016-05-31.
|
{'CVE-2019-7539'}
|
2021-07-27T20:32:57Z
|
2019-03-25T16:16:55Z
|
HIGH
| 8.8
|
{'CWE-94', 'CWE-502'}
|
{'https://github.com/advisories/GHSA-gcm4-q2pg-xw89', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7539', 'https://github.com/rossant/ipycache/issues/47'}
| null |
GHSA
|
GHSA-m4vv-p6fq-jhqp
|
Directory Traversal in @vivaxy/here
|
The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root.
It is vulnerable to a directory traversal attack.
This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files.
Mitigating Factors:
If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information.
Proof of Concept:
```
curl "http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd"
```
## Recommendation
Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability.
| null |
2021-09-23T21:48:56Z
|
2020-09-01T19:04:07Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/557', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://github.com/advisories/GHSA-m4vv-p6fq-jhqp'}
| null |
GHSA
|
GHSA-5rcv-m4m3-hfh7
|
Infinite Loop in Go
|
Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
|
{'CVE-2020-14040'}
|
2021-05-18T18:34:35Z
|
2021-05-18T18:34:35Z
|
HIGH
| 6.7
|
{'CWE-835', 'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14040', 'https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/', 'https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0', 'https://go-review.googlesource.com/c/text/+/238238', 'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e', 'https://github.com/advisories/GHSA-5rcv-m4m3-hfh7', 'https://github.com/golang/go/issues/39491'}
| null |
GHSA
|
GHSA-mgg8-9pvp-6qcw
|
MvccRwLock allows data races & aliasing violations
|
Affected versions of the `noise_search` crate unconditionally implement Send/Sync for `MvccRwLock`.
This can lead to data races when types that are either `!Send` or `!Sync` (e.g. `Rc<T>`, `Arc<Cell<_>>`) are contained inside `MvccRwLock` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue).
Also, safe APIs of `MvccRwLock` allow aliasing violations by allowing `&T` and `LockResult<MutexGuard<Box<T>>>` to co-exist in conflicting lifetime regions. The APIs of `MvccRwLock` should either be marked as `unsafe` or `MbccRwLock` should be changed to private or pub(crate).
| null |
2021-08-25T20:59:59Z
|
2021-08-25T20:59:59Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0141.html', 'https://github.com/pipedown/noise/issues/72', 'https://github.com/advisories/GHSA-mgg8-9pvp-6qcw'}
| null |
GHSA
|
GHSA-pm9v-325f-5g74
|
Malicious Package in saync
|
All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-09-30T21:26:49Z
|
2020-09-02T21:30:11Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-pm9v-325f-5g74', 'https://www.npmjs.com/advisories/896'}
| null |
GHSA
|
GHSA-h86x-mv66-gr5q
|
OS Command Injection in Locutus
|
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
|
{'CVE-2020-13619'}
|
2021-07-26T21:21:43Z
|
2021-07-26T21:21:43Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-h86x-mv66-gr5q', 'https://reallinkers.github.io/CVE-2020-13619/', 'https://locutus.io/php/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13619', 'https://www.npmjs.com/package/locutus'}
| null |
GHSA
|
GHSA-wq7q-5v6j-xfv6
|
Command Injection in picotts
|
This affects all versions up to and including version 0.1.1 of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23378'}
|
2021-05-07T16:06:11Z
|
2021-05-07T16:06:11Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-wq7q-5v6j-xfv6', 'https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942398c8b/index.js%23L16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23378', 'https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539'}
| null |
GHSA
|
GHSA-w4cc-pc2h-whcj
|
Out-of-bounds Write in derive-com-impl
|
An issue was discovered in the derive-com-impl crate before 0.1.2 for Rust. An invalid reference (and memory corruption) can occur because AddRef might not be called before returning a pointer.
|
{'CVE-2021-45681'}
|
2022-01-07T16:17:29Z
|
2022-01-06T22:16:10Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0083.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45681', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/derive-com-impl/RUSTSEC-2021-0083.md', 'https://github.com/advisories/GHSA-w4cc-pc2h-whcj'}
| null |
GHSA
|
GHSA-3cf2-x423-x582
|
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
|
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
|
{'CVE-2021-4024'}
|
2022-02-09T18:28:06Z
|
2022-01-06T21:12:50Z
|
MODERATE
| 6.5
|
{'CWE-200', 'CWE-346'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4024', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/', 'https://bugzilla.redhat.com/show_bug.cgi?id=2026675,', 'https://github.com/advisories/GHSA-3cf2-x423-x582', 'https://github.com/containers/podman/releases/tag/v3.4.3'}
| null |
GHSA
|
GHSA-vp9c-fpxx-744v
|
Validation bypass vulnerability
|
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan)
| null |
2020-09-23T17:19:55Z
|
2020-09-23T17:19:55Z
|
LOW
| 0
| null |
{'https://github.com/personnummer/ruby/security/advisories/GHSA-vp9c-fpxx-744v', 'https://github.com/advisories/GHSA-vp9c-fpxx-744v'}
| null |
GHSA
|
GHSA-v3vf-2r98-xw8w
|
High severity vulnerability that affects org.apache.syncope:syncope-core
|
An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters.
|
{'CVE-2018-1322'}
|
2021-09-20T15:02:53Z
|
2018-11-06T23:17:25Z
|
MODERATE
| 4.9
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1322', 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w', 'https://www.exploit-db.com/exploits/45400/', 'http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting', 'http://www.securityfocus.com/bid/103507'}
| null |
GHSA
|
GHSA-4mg4-wvmx-5332
|
Server-Side Request Forgery in Plone
|
Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file.
|
{'CVE-2021-33510'}
|
2021-06-15T16:11:47Z
|
2021-06-15T16:11:47Z
|
MODERATE
| 4.3
|
{'CWE-918'}
|
{'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33510', 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url', 'https://github.com/advisories/GHSA-4mg4-wvmx-5332'}
| null |
GHSA
|
GHSA-w4g2-9hj6-5472
|
Moderate severity vulnerability that affects com.rabbitmq:amqp-client and org.springframework.amqp:spring-amqp
|
Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
|
{'CVE-2018-11087'}
|
2021-09-20T22:35:57Z
|
2018-10-18T18:06:08Z
|
MODERATE
| 5.9
|
{'CWE-295'}
|
{'https://pivotal.io/security/cve-2018-11087', 'https://github.com/advisories/GHSA-w4g2-9hj6-5472', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11087'}
| null |
GHSA
|
GHSA-hw7r-qrhp-5pff
|
Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20
|
Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors.
- https://vaadin.com/security/cve-2021-33605
| null |
2021-08-30T16:16:46Z
|
2021-08-30T16:16:46Z
|
MODERATE
| 4.3
| null |
{'https://github.com/advisories/GHSA-hw7r-qrhp-5pff', 'https://github.com/vaadin/platform/security/advisories/GHSA-hw7r-qrhp-5pff'}
| null |
GHSA
|
GHSA-p5f8-gfw5-33w4
|
Heap buffer overflow in Tensorflow
|
### Impact
The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, this code is prone to heap buffer overflow:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L248-L251
If `split_values` does not end with a value at least `num_values` then the `while` loop condition will trigger a read outside of the bounds of `split_values` once `batch_idx` grows too large.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2020-15201'}
|
2021-11-19T15:19:01Z
|
2020-09-25T18:28:34Z
|
MODERATE
| 4.8
|
{'CWE-20', 'CWE-787', 'CWE-122'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15201', 'https://github.com/advisories/GHSA-p5f8-gfw5-33w4'}
| null |
GHSA
|
GHSA-2cxf-6567-7pp6
|
Local Information Disclosure Vulnerability
|
### Impact
Local information disclosure of sensitive information downloaded via the API using the API Client.
### Finding
The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system.
Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue.
This vulnerability was found due to [this query](https://lgtm.com/query/8938575359870595124/) that [Jonathan Leitschuh](https://github.com/JLLeitschuh) contributed to the Semmle QL project.
### Patches
This issue has been patched in [version 1.0.0-beta.9](https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9).
See also [Remove unused downloadFile helpers](https://github.com/DataDog/datadog-api-client-java/pull/637).
### Workarounds
The recommended workaround is to specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`.
### References
* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [DataDog/datadog-api-client-java](https://github.com/DataDog/datadog-api-client-java)
* Email us at [security@datadoghq.com](mailto:security@datadoghq.com)
|
{'CVE-2021-21331'}
|
2022-04-19T19:03:02Z
|
2021-03-03T23:01:17Z
|
LOW
| 3
|
{'CWE-379', 'CWE-378'}
|
{'https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21331', 'https://github.com/advisories/GHSA-2cxf-6567-7pp6', 'https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6'}
| null |
GHSA
|
GHSA-3grc-fgh6-g5gp
|
Directory Traversal in http_static_simple
|
Affected versions of `http_static_simple` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16134'}
|
2021-09-16T20:57:43Z
|
2018-07-23T22:08:39Z
|
HIGH
| 0
|
{'CWE-12', 'CWE-22'}
|
{'https://github.com/advisories/GHSA-3grc-fgh6-g5gp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16134', 'https://nodesecurity.io/advisories/472', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple', 'https://www.npmjs.com/advisories/472'}
| null |
GHSA
|
GHSA-48rw-j489-928m
|
Signature wrapping vulnerability in Spring Security
|
Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
|
{'CVE-2020-5407'}
|
2021-06-15T17:44:45Z
|
2020-06-05T16:13:29Z
|
HIGH
| 8.8
|
{'CWE-347'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rd99601fbca514f214f88f9e53fd5be3cfbff05b350c994b4ec2e184c@%3Cdev.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r73af928cf64bebf78b7fa4bc56a5253273ec7829f5f5827f64c72fc7@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a@%3Cdev.geode.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2020-5407', 'https://github.com/advisories/GHSA-48rw-j489-928m', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5407'}
| null |
GHSA
|
GHSA-gvg7-pp82-cff3
|
Cross-Site Scripting in c3
|
Affected versions of `c3` are vulnerable to cross-site scripting via improper sanitization of HTML in rendered tooltips.
## Recommendation
Update to 0.4.11 or later.
|
{'CVE-2016-1000240'}
|
2021-09-23T21:36:09Z
|
2020-09-01T15:59:11Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/c3js/c3/issues/1536', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000240', 'https://www.npmjs.com/advisories/138', 'https://github.com/advisories/GHSA-gvg7-pp82-cff3'}
| null |
GHSA
|
GHSA-8hxh-r6f7-jf45
|
Memory exhaustion in http4s-async-http-client with large or malicious compressed responses
|
### Impact
A server we connect to with http4s-async-http-client could theoretically respond with a large or malicious compressed stream and exhaust memory in the client JVM. It does not affect http4s servers, other client backends, or clients that speak only to trusted servers. This is related to a transitive dependency on netty-codec-4.1.45.Final, which is affected by [CVE-2020-11612](https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897).
### Patches
Upgrade to http4s-async-http-client >= 0.21.8. All 1.0 milestones are also safe.
### Workarounds
Add an explicit runtime dependency on async-http-client's netty dependencies that evicts them to an unaffected version:
```scala
libraryDependencies ++= Seq(
"io.netty" % "netty-codec" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-codec-socks" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-handler-proxy" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-common" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-transport" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-handler" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-resolver-dns" % "4.1.53.Final" % Runtime
)
```
### References
* https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897
* https://github.com/http4s/http4s/issues/3681
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http4s](https://github.com/http4s/http4s/issues/new)
* Contact a maintainer privately per [http4s' security policy](https://github.com/http4s/http4s/blob/master/SECURITY.md#reporting-a-vulnerability)
| null |
2022-04-19T19:02:38Z
|
2020-10-16T17:03:43Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://github.com/http4s/http4s/security/advisories/GHSA-8hxh-r6f7-jf45', 'https://github.com/advisories/GHSA-8hxh-r6f7-jf45'}
| null |
GHSA
|
GHSA-73cw-jxmm-qpgh
|
Path Traversal in localhost-now
|
All versions of `localhost-now` are vulnerable to path traversal. This vulnerability is a bypass to the path traversal fix introduced in version 1.0.2
Proof of concept:
```
$ curl -v --path-as-is "http://IP:5432/..././..././..././..././..././..././..././..././..././..././etc/passwd"
```
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
| null |
2021-08-04T21:08:45Z
|
2019-06-11T16:40:48Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/329837', 'https://github.com/advisories/GHSA-73cw-jxmm-qpgh', 'https://github.com/DCKT/localhost-now/blob/master/lib/app.js#L17', 'https://nodesecurity.io/advisories/655', 'https://www.npmjs.com/advisories/655'}
| null |
GHSA
|
GHSA-xhjx-mfr6-9rr4
|
Command Injection in samsung-remote
|
Versions of `samsung-remote` before 1.3.5 are vulnerable to command injection. This vulnerability is exploitable if user input is passed into the `ip` option of the package constructor.
## Recommendation
Update to version 1.3.5 or later.
| null |
2021-09-24T21:50:46Z
|
2020-09-01T21:20:28Z
|
CRITICAL
| 0
|
{'CWE-77'}
|
{'https://hackerone.com/reports/394294', 'https://www.npmjs.com/advisories/734', 'https://github.com/advisories/GHSA-xhjx-mfr6-9rr4', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/465.json'}
| null |
GHSA
|
GHSA-39q4-p535-c852
|
Uncontrolled Resource Consumption in locutus
|
The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.
|
{'CVE-2021-23392'}
|
2021-06-16T20:02:15Z
|
2021-06-10T17:25:05Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392', 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e', 'https://github.com/locutusjs/locutus/pull/446', 'https://github.com/advisories/GHSA-39q4-p535-c852'}
| null |
GHSA
|
GHSA-6gw4-x63h-5499
|
Ability to switch customer email address on account detail page and stay verified
|
### Impact
The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one).
### Patches
Patch has been provided for Sylius 1.6.x and newer - 1.6.9, 1.7.9, 1.8.3. Versions older than 1.6 are not covered by our security support anymore.
### Workarounds
If for whatever reason you are not able to upgrade your application version, you may resolve this issue on your own by creating a custom event listener, which will listen to the `sylius.customer.pre_update` event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain `/admin` prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here.
### Acknowledgements
This security issue has been reported by Mircea Silviu (@decemvre), thanks a lot!
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@sylius.com](mailto:security@sylius.com)
|
{'CVE-2020-15245'}
|
2022-04-19T19:02:37Z
|
2020-10-19T20:40:59Z
|
MODERATE
| 4.3
|
{'CWE-862', 'CWE-79'}
|
{'https://github.com/advisories/GHSA-6gw4-x63h-5499', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15245'}
| null |
GHSA
|
GHSA-856q-xv3c-7f2f
|
Unauthenticated control plane denial of service attack in Istio
|
### Impact
The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker.
For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet.
### Patches
- Istio 1.13.1 and above
- Istio 1.12.4 and above
- Istio 1.11.7 and above
### Workarounds
There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent.
### References
More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-003)
### For more information
If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com)
|
{'CVE-2022-23635'}
|
2022-04-20T21:05:17Z
|
2022-02-23T14:59:08Z
|
HIGH
| 7.5
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23635', 'https://github.com/advisories/GHSA-856q-xv3c-7f2f', 'https://istio.io/latest/news/security/istio-security-2022-003', 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84', 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f'}
| null |
GHSA
|
GHSA-hvqc-pc78-x9wh
|
Soundness issue in raw-cpuid
|
An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It has unsound transmute calls within as_string() methods.
|
{'CVE-2021-26306'}
|
2021-08-25T20:53:10Z
|
2021-08-25T20:53:10Z
|
HIGH
| 7.5
|
{'CWE-198'}
|
{'https://github.com/advisories/GHSA-hvqc-pc78-x9wh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26306', 'https://github.com/RustSec/advisory-db/pull/614', 'https://github.com/gz/rust-cpuid/issues/40', 'https://rustsec.org/advisories/RUSTSEC-2021-0013.html'}
| null |
GHSA
|
GHSA-c2g6-57fp-22wp
|
Malicious Package in fuffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:14:29Z
|
2020-09-03T22:48:35Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-c2g6-57fp-22wp', 'https://www.npmjs.com/advisories/1271'}
| null |
GHSA
|
GHSA-pjxp-f379-6284
|
Malicious Package in @fangrong/xoc
|
Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T19:13:27Z
|
2020-09-03T19:13:27Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-pjxp-f379-6284', 'https://www.npmjs.com/advisories/1104'}
| null |
GHSA
|
GHSA-8459-6rc9-8vf8
|
Path traversal in github.com/cloudflare/cfrpki/cmd/octorpki
|
### Impact
In the case that a malicious TAL file is parsed pointing to a repository that provides a malicious ROA file which octorpki downloads, it is possible to bypass the current directory traversal mitigation to allow writing outside of the current directory.
### Patches
No patch release has been made
| null |
2022-02-15T00:14:52Z
|
2022-02-14T22:52:15Z
|
LOW
| 0
|
{'CWE-22'}
|
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8459-6rc9-8vf8', 'https://github.com/advisories/GHSA-8459-6rc9-8vf8'}
| null |
GHSA
|
GHSA-m658-p24x-p74r
|
TLS certificate validation error in Mellium
|
In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.
|
{'CVE-2022-24968'}
|
2022-02-24T13:14:02Z
|
2022-02-12T00:00:36Z
|
MODERATE
| 5.9
|
{'CWE-295'}
|
{'https://mellium.im/xmpp/', 'https://github.com/advisories/GHSA-m658-p24x-p74r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24968', 'https://mellium.im/cve/cve-2022-24968/'}
| null |
GHSA
|
GHSA-5p67-cp9c-hqw4
|
Out-of-bounds write in ChakraCore
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833.
|
{'CVE-2020-0848'}
|
2021-07-28T18:57:19Z
|
2021-07-28T18:57:19Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0848', 'https://github.com/advisories/GHSA-5p67-cp9c-hqw4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0848'}
| null |
GHSA
|
GHSA-hw4r-xr38-hm8j
|
Downloads Resources over HTTP in unicode-json
|
Affected versions of `unicode-json` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Install version 2.0.0 or greater.
|
{'CVE-2016-10610'}
|
2021-01-08T18:39:29Z
|
2019-02-18T23:47:59Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10610', 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j', 'https://nodesecurity.io/advisories/206', 'https://www.npmjs.com/advisories/206'}
| null |
GHSA
|
GHSA-m72g-42q6-gvc2
|
Cross-site Scripting in LaraCMS
|
LaraCMS contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.
|
{'CVE-2020-20129'}
|
2021-10-04T20:13:11Z
|
2021-10-04T20:13:11Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20129', 'https://github.com/advisories/GHSA-m72g-42q6-gvc2', 'https://github.com/wanglelecc/laracms/issues/34'}
| null |
GHSA
|
GHSA-f4hh-xxqh-wgpq
|
Exposure of Sensitive Information to an Unauthorized Actor in LibreNMS
|
An issue was discovered in LibreNMS through 1.47. Information disclosure can occur: an attacker can fingerprint the exact code version installed and disclose local file paths.
|
{'CVE-2019-10667'}
|
2021-08-18T17:23:14Z
|
2019-10-11T18:43:20Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-f4hh-xxqh-wgpq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10667', 'https://www.darkmatter.ae/xen1thlabs/librenms-information-disclosure-vulnerability-xl-19-018/'}
| null |
GHSA
|
GHSA-wvpv-ffcv-r6cw
|
Internal NCryptDecrypt method could be used externally from WindowsHello library.
|
### Impact
Every user of the library before version 1.0.4.
### Patches
Patched in 1.0.4+.
### Workarounds
None.
### References
https://github.com/SeppPenner/WindowsHello/issues/3
### For more information
It this library is used to encrypt text and write the output to a txt file, another executable could be able to decrypt the text using the static method NCryptDecrypt from this same library without the need to use Windows Hello Authentication again.
|
{'CVE-2020-11005'}
|
2021-01-08T20:22:39Z
|
2020-04-14T23:09:13Z
|
MODERATE
| 5.1
|
{'CWE-288'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11005', 'https://github.com/SeppPenner/WindowsHello/security/advisories/GHSA-wvpv-ffcv-r6cw', 'https://github.com/advisories/GHSA-wvpv-ffcv-r6cw', 'https://github.com/SeppPenner/WindowsHello/issues/3'}
| null |
GHSA
|
GHSA-6gf2-pvqw-37ph
|
Log entry injection in Spring Framework
|
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.
|
{'CVE-2021-22060'}
|
2022-04-22T15:35:43Z
|
2022-01-12T23:04:06Z
|
MODERATE
| 4.3
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22060', 'https://tanzu.vmware.com/security/cve-2021-22060', 'https://github.com/advisories/GHSA-6gf2-pvqw-37ph', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
| null |
GHSA
|
GHSA-9c22-pwxw-p6hx
|
Initializer reentrancy may lead to double initialization
|
### Impact
Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call.
Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution.
Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor.
### Patches
A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Avoid untrusted external calls during initialization.
### References
https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006
### Credits
This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
### For more information
If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
| null |
2021-12-14T21:47:33Z
|
2021-12-14T21:47:33Z
|
LOW
| 0
| null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx', 'https://github.com/advisories/GHSA-9c22-pwxw-p6hx', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}
| null |
GHSA
|
GHSA-26j7-6w8w-7922
|
Division by zero in optimized pooling implementations in TFLite
|
### Impact
Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling [`ComputePaddingHeightWidth`](https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90).
Since users can craft special models which will have `params->stride_{height,width}` be zero, this will result in a division by zero.
### Patches
We have patched the issue in GitHub commit [5f7975d09eac0f10ed8a17dbb6f5964977725adc](https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29586'}
|
2021-05-21T14:26:43Z
|
2021-05-21T14:26:43Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-26j7-6w8w-7922', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29586', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922', 'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'}
| null |
GHSA
|
GHSA-q8hg-pf8v-cxrv
|
Non-constant time comparison in UriSigner
|
When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability.
|
{'CVE-2019-18887'}
|
2022-03-26T00:33:03Z
|
2022-03-26T00:22:49Z
|
HIGH
| 8.1
| null |
{'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18887', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/', 'https://symfony.com/cve-2019-18887', 'https://github.com/advisories/GHSA-q8hg-pf8v-cxrv', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18887.yaml'}
| null |
GHSA
|
GHSA-wfwm-chj7-w59r
|
Moderate severity vulnerability that affects ox
|
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.
|
{'CVE-2017-16229'}
|
2021-09-21T18:33:56Z
|
2018-03-05T18:29:32Z
|
MODERATE
| 5.5
|
{'CWE-125'}
|
{'https://rubygems.org/gems/ox/versions/2.8.1', 'https://github.com/ohler55/ox/issues/195', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16229', 'https://github.com/advisories/GHSA-wfwm-chj7-w59r'}
| null |
GHSA
|
GHSA-crfx-5phg-hmw9
|
Cross-Site Scripting in ids-enterprise
|
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later
| null |
2021-08-04T21:15:58Z
|
2019-06-13T18:59:12Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-crfx-5phg-hmw9', 'https://www.npmjs.com/advisories/955', 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1', 'https://github.com/infor-design/enterprise-ng/issues/502'}
| null |
GHSA
|
GHSA-cwvc-87xq-pc5m
|
Out-of-bounds Write and Race Condition in metrics-util
|
An issue was discovered in the metrics-util crate before 0.7.0 for Rust. There is a data race and memory corruption because AtomicBucket<T> unconditionally implements the Send and Sync traits.
|
{'CVE-2021-45704'}
|
2022-01-07T17:39:56Z
|
2022-01-06T22:08:43Z
|
HIGH
| 8.1
|
{'CWE-362', 'CWE-787'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/metrics-util/RUSTSEC-2021-0113.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0113.html', 'https://github.com/advisories/GHSA-cwvc-87xq-pc5m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45704'}
| null |
GHSA
|
GHSA-278g-rq84-9hmg
|
`CHECK`-fail in `MapStage`
|
### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`:
```python
import tensorflow as tf
tf.raw_ops.MapStage(
key=tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64),
indices=tf.constant((0), dtype=tf.int32),
values=[tf.constant((0), dtype=tf.int32)],
dtypes=[tf.int32,
tf.int64],
capacity=0,
memory_limit=0,
container='',
shared_name='')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L513) does not check that the `key` input is a valid non-empty tensor.
### Patches
We have patched the issue in GitHub commit [d7de67733925de196ec8863a33445b73f9562d1d](https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-37673'}
|
2021-08-25T14:41:36Z
|
2021-08-25T14:41:36Z
|
MODERATE
| 5.5
|
{'CWE-20'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg', 'https://github.com/advisories/GHSA-278g-rq84-9hmg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37673', 'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'}
| null |
GHSA
|
GHSA-q674-xm3x-2926
|
Uncontrolled Resource Consumption in parse-link-header
|
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
|
{'CVE-2021-23490'}
|
2022-01-07T16:08:29Z
|
2022-01-06T21:37:02Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490', 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1', 'https://github.com/advisories/GHSA-q674-xm3x-2926'}
| null |
GHSA
|
GHSA-p2r2-h92r-w2mg
|
Directory Traversal in mfrserver
|
Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16213'}
|
2021-01-14T15:45:16Z
|
2020-09-01T18:11:03Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-p2r2-h92r-w2mg', 'https://nodesecurity.io/advisories/421', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver', 'https://www.npmjs.com/advisories/421', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213'}
| null |
GHSA
|
GHSA-fmm9-3gv8-58f4
|
Improper Handling of Missing Values in kaml
|
### Impact
Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service.
This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected.
YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue, for example:
```yaml
!<x>
```
The following is a sample application that demonstrates this issue:
```kotlin
import com.charleskorn.kaml.Yaml
import kotlinx.serialization.SerialName
import kotlinx.serialization.Serializable
@Serializable
private sealed class K {
@Serializable
@SerialName("x")
data class X(
val property: String? = null,
) : K()
}
const val s = """
!<x>
"""
fun main() {
println("Started.")
val result = Yaml.default.decodeFromString(K.serializer(), s)
println("Finished, result is $result")
}
```
On vulnerable versions of kaml, the `decodeFromString()` operation hangs and never returns.
### Patches
Version 0.35.3 or later contain the fix for this issue.
|
{'CVE-2021-39194'}
|
2021-09-08T14:47:33Z
|
2021-09-07T23:08:40Z
|
MODERATE
| 4.3
|
{'CWE-835', 'CWE-230'}
|
{'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://github.com/advisories/GHSA-fmm9-3gv8-58f4', 'https://github.com/charleskorn/kaml/issues/179', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194'}
| null |
GHSA
|
GHSA-7rr7-rcjw-56vj
|
High severity vulnerability that affects activestorage
|
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path.
|
{'CVE-2018-16477'}
|
2021-06-11T13:53:06Z
|
2018-12-05T17:17:02Z
|
MODERATE
| 6.5
|
{'CWE-200'}
|
{'https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ', 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16477', 'https://github.com/advisories/GHSA-7rr7-rcjw-56vj'}
| null |
GHSA
|
GHSA-gffv-5hr2-f9gj
|
Incorrect results in orion
|
An issue was discovered in the orion crate before 0.11.2 for Rust. reset() calls cause incorrect results.
|
{'CVE-2018-20999'}
|
2021-08-25T20:43:18Z
|
2021-08-25T20:43:18Z
|
HIGH
| 7.5
|
{'CWE-682'}
|
{'https://github.com/brycx/orion/issues/46', 'https://rustsec.org/advisories/RUSTSEC-2018-0012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20999', 'https://github.com/advisories/GHSA-gffv-5hr2-f9gj'}
| null |
GHSA
|
GHSA-pghf-347x-c2gj
|
SQL Injection via in django-debug-toolbar
|
### Impact
With Django Debug Toolbar attackers are able to execute SQL by changing the `raw_sql` input of the SQL explain, analyze or select forms and submitting the form.
**NOTE:** This is a high severity issue for anyone using the toolbar in a **production environment**.
Generally the Django Debug Toolbar team only maintains the latest version of django-debug-toolbar, but an exception was made because of the high severity of this issue.
### Patches
Please upgrade to one of the following versions, depending on the major version you're using:
- Version 1.x: [django-debug-toolbar 1.11.1](https://pypi.org/project/django-debug-toolbar/1.11.1/)
- Version 2.x: [django-debug-toolbar 2.2.1](https://pypi.org/project/django-debug-toolbar/2.2.1/)
- Version 3.x: [django-debug-toolbar 3.2.1](https://pypi.org/project/django-debug-toolbar/3.2.1/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [django-debug-toolbar repo](https://github.com/jazzband/django-debug-toolbar/issues/new) (Please NO SENSITIVE INFORMATION, send an email instead!)
* Email us at [security@jazzband.co](mailto:security@jazzband.co)
|
{'CVE-2021-30459'}
|
2022-04-19T19:02:53Z
|
2021-04-16T19:53:28Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30459', 'https://github.com/advisories/GHSA-pghf-347x-c2gj', 'https://github.com/jazzband/django-debug-toolbar/releases', 'https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj', 'https://www.djangoproject.com/weblog/2021/apr/14/debug-toolbar-security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30459'}
| null |
GHSA
|
GHSA-5x3v-2gxr-59m2
|
Directory traversal in Apache RocketMQ
|
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
|
{'CVE-2019-17572'}
|
2021-04-07T19:55:55Z
|
2020-07-01T17:26:15Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://seclists.org/oss-sec/2020/q2/112', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/advisories/GHSA-5x3v-2gxr-59m2', 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552', 'https://github.com/apache/rocketmq/issues/1637', 'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E'}
| null |
GHSA
|
GHSA-9g8h-pjm4-q92p
|
Out-of-bounds Write in OpenCV.
|
In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.
|
{'CVE-2018-5268'}
|
2021-11-18T15:31:48Z
|
2021-10-12T22:23:41Z
|
MODERATE
| 5.5
|
{'CWE-787'}
|
{'https://github.com/opencv/opencv/issues/10541', 'http://www.securityfocus.com/bid/106945', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268', 'https://github.com/advisories/GHSA-9g8h-pjm4-q92p'}
| null |
GHSA
|
GHSA-4fjv-pmhg-3rfg
|
Multiple cryptographic issues in Python oic
|
### Impact
* Client implementations using this library
### Issues
1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
2) JWA `none` algorithm was allowed in all flows.
3) `oic.consumer.Consumer.parse_authz` returns an unverified IdToken. The verification of the token was left to the discretion of the implementator.
4) `iat` claim was not checked for sanity (i.e. it could be in the future)
### Patches
1) IdToken signature is now always checked.
2) JWA `none` algorithm is now allowed only if using the `response_type` `code`
3) IdToken verification is now done automatically.
4) `iat` claim is now checked for sanity.
|
{'CVE-2020-26244'}
|
2022-04-19T19:02:41Z
|
2020-12-04T16:47:12Z
|
MODERATE
| 6.8
|
{'CWE-325', 'CWE-347'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26244', 'https://github.com/OpenIDC/pyoidc/releases/tag/1.2.1', 'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498', 'https://pypi.org/project/oic/', 'https://github.com/OpenIDC/pyoidc/security/advisories/GHSA-4fjv-pmhg-3rfg', 'https://github.com/advisories/GHSA-4fjv-pmhg-3rfg'}
| null |
GHSA
|
GHSA-mx67-wv8x-hvv9
|
Deserialization of Untrusted Data in msgpack
|
# Withdrawn
This advisory was withdrawn by its CNA (Snyk).
## Original advisory
All versions of package `msgpack` are vulnerable to Deserialization of Untrusted Data via the unpack function. This does not affect the similarly named package `@msgpack/msgpack`.
|
{'CVE-2021-23410'}
|
2021-09-15T19:12:52Z
|
2021-07-26T21:24:09Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://snyk.io/vuln/SNYK-JS-MSGPACK-1296122', 'https://github.com/advisories/GHSA-mx67-wv8x-hvv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23410', 'https://github.com/msgpack/msgpack-node/blob/master/src/msgpack.cc%23L302-L335'}
| null |
GHSA
|
GHSA-xhr8-mpwq-2rr2
|
Automatic named constructor discovery in Valinor
|
## Design issue - automatic constructor discovery
The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked.
Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228.
## Example exploit
Take following DTO example:
```php
final class UserDTO
{
public function __construct(
public int $id,
public string $name
) {}
public static function fromDb(
PDO $connection,
int $id
): self { /* ... code to fetch the DTO here ... */ }
}
```
There is nothing inherently unsafe about the above `UserDTO`, but when mixed with `cuyz/valinor:^0.5.0` ( specifically https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b ), it is an explosive mix:
```php
// this could be coming from user input:
$maliciousPayload = [
'connection' => [
'dsn' => 'mysql:host=some-host;database=some-database',
'username' => 'root',
'password' => 'root',
'options' => [
// PDO::MYSQL_ATTR_INIT_COMMAND === 1002
1002 => 'DROP DATABASE all-the-moneys'
]
],
'id' => 123,
];
$treeMapper->map(
UserDTO::class,
$maliciousPayload
); // your DB is gone :D
```
The above payload is represented in PHP form, but may as well be input JSON, HTML or x-form-urlencoded.
## Mitigation
Version 0.7.0 contains a patch for this issue.
Automatic named constructor resolution should be disabled - only explicitly mapped named constructors should be used/discovered.
| null |
2022-04-05T21:39:22Z
|
2022-04-01T13:39:45Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}
| null |
GHSA
|
GHSA-4q8f-5xxj-946r
|
Command Injection in addax
|
Versions of `addax` prior to 1.1.0 are vulnerable to Command Injection. The package does not validate user input on the `presignPath` function which receives input directly from the API endpoint. Exploiting the vulnerability requires authentication. This may allow attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.1.0 or later.
| null |
2021-09-28T15:17:49Z
|
2020-09-03T02:40:51Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-4q8f-5xxj-946r', 'https://www.npmjs.com/advisories/954'}
| null |
GHSA
|
GHSA-226w-6hhj-69hp
|
Malicious Package in cal_rd
|
Version 0.1.1 of `rc_cal` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-30T20:07:00Z
|
2020-09-03T19:06:52Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1098', 'https://github.com/advisories/GHSA-226w-6hhj-69hp'}
| null |
GHSA
|
GHSA-mm6g-mmq6-53ff
|
Path Traversal in SharpZipLib
|
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.
|
{'CVE-2021-32842'}
|
2022-02-08T19:44:21Z
|
2022-02-01T16:23:00Z
|
MODERATE
| 4
|
{'CWE-22'}
|
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32842', 'https://github.com/advisories/GHSA-mm6g-mmq6-53ff', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'}
| null |
GHSA
|
GHSA-3rmv-2pg5-xvqj
|
High severity vulnerability that affects org.springframework:spring-core
|
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
|
{'CVE-2018-1275'}
|
2021-10-21T21:29:18Z
|
2018-10-17T20:28:00Z
|
CRITICAL
| 9.8
|
{'CWE-94', 'CWE-358'}
|
{'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1275', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2939', 'http://www.securitytracker.com/id/1041301', 'https://pivotal.io/security/cve-2018-1275', 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-3rmv-2pg5-xvqj', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.securityfocus.com/bid/103771'}
| null |
GHSA
|
GHSA-p225-pc2x-4jpm
|
Incorrect Authorization in keycloak
|
A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.
|
{'CVE-2020-1725'}
|
2022-02-09T00:58:52Z
|
2022-02-09T00:58:52Z
|
MODERATE
| 5.4
|
{'CWE-668', 'CWE-863'}
|
{'https://issues.redhat.com/browse/KEYCLOAK-16550', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1725', 'https://github.com/advisories/GHSA-p225-pc2x-4jpm', 'https://bugzilla.redhat.com/show_bug.cgi?id=1765129'}
| null |
GHSA
|
GHSA-f6g6-54hm-fhxv
|
Data races in libsbc
|
Affected versions of this crate implements `Send` for `Decoder<R>` for any `R: Read`. This allows `Decoder<R>` to contain `R: !Send` and carry (move) it to another thread.
This can result in undefined behavior such as memory corruption from data race on `R`, or dropping `R = MutexGuard<_>` from a thread that didn't lock the mutex.
The flaw was corrected in commit a34d6e1 by adding trait bound `R: Send` to the `Send` impl for `Decoder<R>`.
|
{'CVE-2020-36440'}
|
2021-08-25T20:59:02Z
|
2021-08-25T20:59:02Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36440', 'https://github.com/advisories/GHSA-f6g6-54hm-fhxv', 'https://rustsec.org/advisories/RUSTSEC-2020-0120.html', 'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'}
| null |
GHSA
|
GHSA-cfwc-xjfp-44jg
|
Command Injection in gnuplot
|
All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory:
```
var gnuplot = require('gnuplot');
const title = '"\nset title system("touch testing")\n#';
gnuplot()
.set('term png')
.set('output "out.png"')
.set(`title "${title}"`)
.set('xrange [-10:10]')
.set('yrange [-2:2]')
.set('zeroaxis')
.plot('(x/4)**2, sin(x), 1/x')
.end();
```
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-04T20:36:00Z
|
2020-09-04T17:19:48Z
|
CRITICAL
| 0
|
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/1440', 'https://github.com/advisories/GHSA-cfwc-xjfp-44jg'}
| null |
GHSA
|
GHSA-xcf7-cj8q-pcjm
|
XSS vulnerability in Author URL of themes in Mautic
|
### Impact
An XSS vulnerability was discovered in Mautic 2.13.1 in the Author URL of themes.
### Patches
Update to 2.14 or later
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.14.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2018-11198'}
|
2022-04-19T19:02:45Z
|
2021-01-19T21:16:14Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://github.com/mautic/mautic/releases/tag/2.14.0', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11198', 'https://github.com/mautic/mautic/releases', 'https://github.com/advisories/GHSA-xcf7-cj8q-pcjm', 'https://github.com/mautic/mautic/security/advisories/GHSA-xcf7-cj8q-pcjm'}
| null |
GHSA
|
GHSA-x8rq-rc7x-5fg5
|
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF)
|
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses.
|
{'CVE-2022-0086'}
|
2022-04-19T19:03:24Z
|
2022-01-06T22:24:35Z
|
HIGH
| 8.2
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0086', 'https://github.com/transloadit/uppy/releases/tag/uppy%402.3.3', 'https://github.com/advisories/GHSA-x8rq-rc7x-5fg5', 'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f', 'https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122', 'https://github.com/transloadit/uppy/pull/3403'}
| null |
GHSA
|
GHSA-mm7v-vpv8-xfc3
|
Double free in smallvec
|
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is a double free for certain grow attempts with the current capacity.
|
{'CVE-2019-15551'}
|
2021-08-25T20:44:59Z
|
2021-08-25T20:44:59Z
|
CRITICAL
| 9.8
|
{'CWE-415'}
|
{'https://github.com/advisories/GHSA-mm7v-vpv8-xfc3', 'https://rustsec.org/advisories/RUSTSEC-2019-0009.html', 'https://github.com/servo/rust-smallvec/issues/148', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15551'}
| null |
GHSA
|
GHSA-89px-ww3j-g2mm
|
2FA bypass in Wagtail through new device path
|
## 2FA bypass through new device path
### Impact
If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.
### Patches
This problem has been patched in version 1.3.0.
### Workarounds
There is no workaround at the moment.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa)
* Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
|
{'CVE-2019-16766'}
|
2021-01-08T21:28:09Z
|
2019-11-29T17:05:59Z
|
HIGH
| 8.7
|
{'CWE-304', 'CWE-290'}
|
{'https://github.com/advisories/GHSA-89px-ww3j-g2mm', 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766', 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm'}
| null |
GHSA
|
GHSA-hj69-c76v-86wr
|
Out-of-bounds Read in Pillow
|
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
|
{'CVE-2020-5313'}
|
2021-08-23T15:05:21Z
|
2020-04-01T16:36:00Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-hj69-c76v-86wr', 'https://usn.ubuntu.com/4272-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5313', 'https://www.debian.org/security/2020/dsa-4631', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}
| null |
GHSA
|
GHSA-v585-23hc-c647
|
Unsafe Deserialization in jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.
|
{'CVE-2020-36186'}
|
2022-04-22T17:30:13Z
|
2021-11-19T20:13:06Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36186', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-v585-23hc-c647', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2997', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
| null |
GHSA
|
GHSA-5jfw-35xp-5m42
|
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
|
### Impact
`LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negative signed int32), causing `BinaryStream->get()` to throw an exception.
In the context of PocketMine-MP, this leads to a server crash when the vulnerability is exploited.
### Patches
e3fce7632b94e83fd6a518a87dcaf6a11681c4ac
### Workarounds
This can be worked around by registering a custom `LoginPacket` implementation into `PacketPool` which overrides [this code](https://github.com/pmmp/BedrockProtocol/blob/47532c95ea37d5f0365b23f734d70d943ff95295/src/LoginPacket.php#L54) to patch it.
### For more information
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-04-06T18:43:19Z
|
2022-04-05T17:53:22Z
|
HIGH
| 7.5
|
{'CWE-124'}
|
{'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac', 'https://github.com/advisories/GHSA-5jfw-35xp-5m42'}
| null |
GHSA
|
GHSA-jfh8-c2jp-5v3q
|
Remote code injection in Log4j
|
# Summary
Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default.
Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory.
# Impact
Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input.
# Affected versions
Any Log4J version prior to v2.15.0 is affected to this specific issue.
The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible.
## Security releases
Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3
## Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
# Remediation Advice
## Updated advice for version 2.16.0
The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0).
Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33).
Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221).
Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.
|
{'CVE-2021-44228'}
|
2022-04-26T20:57:16Z
|
2021-12-10T00:40:56Z
|
CRITICAL
| 10
|
{'CWE-20', 'CWE-502', 'CWE-400'}
|
{'http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html', 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2021/dsa-5020', 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf', 'https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md', 'https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/', 'http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html', 'http://www.openwall.com/lists/oss-security/2021/12/13/2', 'https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/', 'http://seclists.org/fulldisclosure/2022/Mar/23', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://support.apple.com/kb/HT213189', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'http://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://github.com/apache/logging-log4j2/pull/608', 'https://logging.apache.org/log4j/2.x/manual/migration.html', 'https://github.com/advisories/GHSA-7rjr-3q55-vv33', 'http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html', 'http://www.openwall.com/lists/oss-security/2021/12/10/1', 'http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html', 'https://issues.apache.org/jira/browse/LOG4J2-3198', 'https://github.com/tangxiaofeng7/apache-log4j-poc', 'http://www.openwall.com/lists/oss-security/2021/12/10/2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf', 'https://twitter.com/kurtseifried/status/1469345530182455296', 'https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/', 'https://issues.apache.org/jira/browse/LOG4J2-3221', 'http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://www.openwall.com/lists/oss-security/2021/12/13/1', 'http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html', 'https://issues.apache.org/jira/browse/LOG4J2-3214', 'http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html', 'http://www.openwall.com/lists/oss-security/2021/12/15/3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf', 'http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228', 'https://www.kb.cert.org/vuls/id/930724', 'http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html', 'https://github.com/cisagov/log4j-affected-db', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032', 'http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html', 'https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0', 'https://issues.apache.org/jira/browse/LOG4J2-3201', 'http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html', 'http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html', 'https://security.netapp.com/advisory/ntap-20211210-0007/', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'http://www.openwall.com/lists/oss-security/2021/12/10/3', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html', 'http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html'}
| null |
GHSA
|
GHSA-xcp8-hh74-f6mc
|
Moderate severity vulnerability that affects oslo.middleware
|
python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
|
{'CVE-2017-2592'}
|
2021-09-21T22:29:19Z
|
2018-07-13T15:16:45Z
|
MODERATE
| 5.5
|
{'CWE-532'}
|
{'https://github.com/advisories/GHSA-xcp8-hh74-f6mc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2592'}
| null |
GHSA
|
GHSA-j52r-xc68-q8f4
|
Insufficiently Protected Credentials in Pivotal Reactor Netty
|
Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.
|
{'CVE-2019-11284'}
|
2021-08-18T21:52:59Z
|
2019-10-23T14:14:32Z
|
HIGH
| 8.6
|
{'CWE-522'}
|
{'https://pivotal.io/security/cve-2019-11284', 'https://github.com/advisories/GHSA-j52r-xc68-q8f4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11284'}
| null |
GHSA
|
GHSA-vcjj-xf2r-mwvc
|
XSS in knockout
|
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
|
{'CVE-2019-14862'}
|
2022-04-25T23:07:31Z
|
2020-04-01T15:47:45Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/knockout/knockout/issues/1244', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14862', 'https://github.com/knockout/knockout/pull/2345', 'https://snyk.io/vuln/npm:knockout:20180213', 'https://github.com/advisories/GHSA-vcjj-xf2r-mwvc', 'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862'}
| null |
GHSA
|
GHSA-fmj5-wv96-r2ch
|
Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient
|
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
|
{'CVE-2015-5262'}
|
2021-09-10T18:42:14Z
|
2018-10-17T00:05:29Z
|
MODERATE
| 0
| null |
{'http://www.securitytracker.com/id/1033743', 'https://issues.apache.org/jira/browse/HTTPCLIENT-1478', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5262', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://jenkins.io/security/advisory/2018-02-26/', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://svn.apache.org/viewvc?view=revision&revision=1626784', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html', 'http://www.ubuntu.com/usn/USN-2769-1', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1261538', 'https://github.com/advisories/GHSA-fmj5-wv96-r2ch'}
| null |
GHSA
|
GHSA-653m-r33x-39ff
|
Moderate severity vulnerability that affects geminabox
|
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
|
{'CVE-2017-16792'}
|
2021-09-01T22:38:12Z
|
2017-11-29T23:20:14Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://rubygems.org/gems/geminabox/versions/0.13.10', 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}
| null |
GHSA
|
GHSA-57qf-82hh-2hmc
|
Cross-site Scripting in LiveHelperChat
|
LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting.
|
{'CVE-2022-0502'}
|
2022-02-14T22:30:21Z
|
2022-02-07T00:00:30Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-57qf-82hh-2hmc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706', 'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f'}
| null |
GHSA
|
GHSA-8c9x-wfgj-v78w
|
Open Redirect in showdoc
|
showdoc is vulnerable to URL Redirection to Untrusted Site
|
{'CVE-2021-4000'}
|
2021-12-16T15:31:58Z
|
2021-12-16T15:31:58Z
|
MODERATE
| 6.5
|
{'CWE-601'}
|
{'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000', 'https://github.com/advisories/GHSA-8c9x-wfgj-v78w', 'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962'}
| null |
GHSA
|
GHSA-7rjp-fgwj-47rw
|
Missing authentication in ShenYu
|
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
|
{'CVE-2022-23945'}
|
2022-02-02T16:17:08Z
|
2022-01-28T22:14:11Z
|
HIGH
| 7.5
|
{'CWE-862', 'CWE-306'}
|
{'https://github.com/advisories/GHSA-7rjp-fgwj-47rw', 'http://www.openwall.com/lists/oss-security/2022/01/25/6', 'http://www.openwall.com/lists/oss-security/2022/01/26/3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23945', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s'}
| null |
GHSA
|
GHSA-7j34-xq9v-9mqg
|
Out-of-bounds write in ChakraCore
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
|
{'CVE-2020-0827'}
|
2021-07-28T18:56:52Z
|
2021-07-28T18:56:52Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-7j34-xq9v-9mqg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0827'}
| null |
GHSA
|
GHSA-j3ch-vjph-8q6v
|
Command injection in Alluxio
|
In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.
|
{'CVE-2022-23848'}
|
2022-03-01T22:31:19Z
|
2022-02-21T00:00:19Z
|
CRITICAL
| 9.8
| null |
{'https://www.alluxio.io/download/releases/alluxio-2-7-3-release/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23848', 'https://github.com/advisories/GHSA-j3ch-vjph-8q6v'}
| null |
GHSA
|
GHSA-4ppp-gpcr-7qf6
|
HTTP Request Smuggling: Content-Length Sent Twice in Waitress
|
### Impact
Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally.
So a request with:
```
Content-Length: 10
Content-Length: 10
```
would get transformed to:
```
Content-Length: 10, 10
```
Which would Waitress would then internally set to `Content-Lenght: 0`.
Waitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining.
### Patches
This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies.
The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior.
### Workarounds
Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method).
### Issues/more security issues:
* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related)
* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
| null |
2022-03-24T17:52:21Z
|
2019-12-20T23:04:35Z
|
CRITICAL
| 0
|
{'CWE-444'}
|
{'https://github.com/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}
| null |
GHSA
|
GHSA-px4h-xg32-q955
|
ReDoS in normalize-url
|
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
|
{'CVE-2021-33502'}
|
2021-10-27T17:04:16Z
|
2021-06-08T23:11:43Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33502', 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103', 'https://github.com/advisories/GHSA-px4h-xg32-q955', 'https://security.netapp.com/advisory/ntap-20210706-0001/', 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}
| null |
GHSA
|
GHSA-6x33-pw7p-hmpq
|
Denial of Service in http-proxy
|
Versions of `http-proxy` prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an `ERR_HTTP_HEADERS_SENT` unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the `proxyReq.setHeader` function.
For a proxy server running on `http://localhost:3000`, the following curl request triggers the unhandled exception:
```curl -XPOST http://localhost:3000 -d "$(python -c 'print("x"*1025)')"```
## Recommendation
Upgrade to version 1.18.1 or later
| null |
2020-09-04T17:59:49Z
|
2020-09-04T17:59:49Z
|
HIGH
| 0
| null |
{'https://github.com/http-party/node-http-proxy/pull/1447/files', 'https://www.npmjs.com/advisories/1486', 'https://github.com/advisories/GHSA-6x33-pw7p-hmpq'}
| null |
GHSA
|
GHSA-h4pc-gx2w-f2xv
|
Heap OOB read in TFLite
|
### Impact
A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of [`Split_V`](https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99):
```cc
const int input_size = SizeOfDimension(input, axis_value);
```
If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the [`SizeOfDimension` function](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/kernel_util.h#L148-L150) will access data outside the bounds of the tensor shape array:
```cc
inline int SizeOfDimension(const TfLiteTensor* t, int dim) {
return t->dims->data[dim];
}
```
### Patches
We have patched the issue in GitHub commit [ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412](https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29606'}
|
2021-05-21T14:28:24Z
|
2021-05-21T14:28:24Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv', 'https://github.com/advisories/GHSA-h4pc-gx2w-f2xv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29606'}
| null |
GHSA
|
GHSA-35fr-h7jr-hh86
|
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria
|
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response.
### Impact
1. Cross-User Defacement
2. Cache Poisoning
3. Cross-Site Scripting (XSS)
4. Page Hijacking
### Root Cause
The root cause is due to the usage of Netty without the HTTP header validation.
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23
### Patches
This vulnerability has been patched in 0.97.0.
### References
[CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)
https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](https://github.com/line/armeria/issues)
| null |
2022-04-19T19:02:55Z
|
2019-12-06T18:55:47Z
|
MODERATE
| 6.5
|
{'CWE-113', 'CWE-74'}
|
{'https://github.com/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.