ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-m394-8rww-3jr7
DOS vulnerability for Quoted Quality CSV headers
### Impact When Jetty handles a request containing request headers with a large number of “quality” (i.e. q) parameters (such as what are seen on the `Accept`, `Accept-Encoding`, and `Accept-Language` request headers), the server may enter a denial of service (DoS) state due to high CPU usage while sorting the list of values based on their quality values. A single request can easily consume minutes of CPU time before it is even dispatched to the application. The only features within Jetty that can trigger this behavior are: - Default Error Handling - the `Accept` request header with the `QuotedQualityCSV` is used to determine what kind of content to send back to the client (html, text, json, xml, etc) - `StatisticsServlet` - uses the `Accept` request header with the `QuotedQualityCSV` to determine what kind of content to send back to the client (xml, json, text, html, etc) - `HttpServletRequest.getLocale()` - uses the `Accept-Language` request header with the `QuotedQualityCSV` to determine which “preferred” language is returned on this call. - `HttpservletRequest.getLocales()` - is similar to the above, but returns an ordered list of locales based on the quality values on the `Accept-Language` request header. - `DefaultServlet` - uses the `Accept-Encoding` request header with the `QuotedQualityCSV` to determine which kind of pre-compressed content should be sent back for static content (content that is not matched against a url-pattern in your web app) ### Versions `QuotedQualityCSV` was introduced to Jetty 9.3.9.v20160517 and the bug that introduced the vulnerability was in 9.4.6.v20170531. Currently, known vulnerable versions include: - 9.4.6.v20170531 thru to 9.4.36.v20210114 - 10.0.0 - 11.0.0 ### Workarounds Quality ordered values are used infrequently by jetty so they can be avoided by: * Do not use the default error page/handler. * Do not deploy the `StatisticsServlet` exposed to the network * Do not call `getLocale` API * Do not enable precompressed static content in the `DefaultServlet` ### Patches All patches are available for download from the Eclipse Jetty website at [https://www.eclipse.org/jetty/download.php](https://www.eclipse.org/jetty/download.php) - 9.4.37.v20210219 and greater - 10.0.1 and greater - 11.0.1 and greater
{'CVE-2020-27223'}
2022-04-19T19:02:47Z
2021-03-10T03:46:47Z
MODERATE
5.3
{'CWE-400'}
{'https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27223', 'https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7', 'https://security.netapp.com/advisory/ntap-20210401-0005/', 'https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E', 'https://github.com/advisories/GHSA-m394-8rww-3jr7', 'https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128'}
null
GHSA
GHSA-x5c7-x7m2-rhmf
Local directory executable lookup in sops (Windows-only)
### Impact Windows users using the sops direct editor option (`sops file.yaml`) can have a local executable named either `vi`, `vim`, or `nano` executed if running sops from `cmd.exe` This attack is only viable if an attacker is able to place a malicious binary within the directory you are running sops from. As well, this attack will only work when using `cmd.exe` or the Windows C library [SearchPath function](https://docs.microsoft.com/en-us/windows/win32/api/processenv/nf-processenv-searchpatha). This is a result of these Windows tools including `.` within their `PATH` by default. **If you are using sops within untrusted directories on Windows via `cmd.exe`, please upgrade immediately** **As well, if you have `.` within your default $PATH, please upgrade immediately.** More information can be found on the official Go blog: https://blog.golang.org/path-security ### Patches The problem has been resolved in v3.7.1 Now, if Windows users using cmd.exe run into this issue, a warning message will be printed: `vim resolves to executable in current directory (.\vim.exe)` ### References * https://blog.golang.org/path-security ### For more information If you have any questions or comments about this advisory: * Open a discussion in [sops](https://github.com/mozilla/sops/discussions)
null
2022-04-19T19:02:52Z
2021-05-20T16:50:34Z
LOW
0
null
{'https://github.com/mozilla/sops/security/advisories/GHSA-x5c7-x7m2-rhmf', 'https://github.com/advisories/GHSA-x5c7-x7m2-rhmf'}
null
GHSA
GHSA-5q54-8p9j-x74j
Cross-site Scripting in pandao editor.md
pandao Editor.md 1.5.0 allows XSS via the Javascript: string.
{'CVE-2019-14517'}
2021-08-17T21:59:59Z
2019-08-23T00:05:03Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-5q54-8p9j-x74j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14517', 'https://github.com/pandao/editor.md/issues/709'}
null
GHSA
GHSA-f7xw-46vh-5jw2
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4132'}
2022-01-05T20:33:47Z
2022-01-05T20:33:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132', 'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2', 'https://github.com/advisories/GHSA-f7xw-46vh-5jw2'}
null
GHSA
GHSA-69gw-hgj3-45m7
Memory corruption in smallvec
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is memory corruption for certain grow attempts with less than the current capacity.
{'CVE-2019-15554'}
2021-08-25T20:43:58Z
2021-08-25T20:43:58Z
CRITICAL
9.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-69gw-hgj3-45m7', 'https://github.com/servo/rust-smallvec/issues/149', 'https://rustsec.org/advisories/RUSTSEC-2019-0012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15554'}
null
GHSA
GHSA-gvm7-8fq3-qjj2
Malicious Package in bs85
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:50:16Z
2020-09-03T19:43:18Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1378', 'https://github.com/advisories/GHSA-gvm7-8fq3-qjj2'}
null
GHSA
GHSA-gx6h-936c-vrrr
Cross site scripting in registration template in xwiki-platform
### Impact We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: - the wiki must be open to registration for anyone - the wiki must be closed to view for Guest users (more specifically the XWiki.Registration page must be forbidden in View for guest user) A way to obtain the second condition is when administrators checked the "Prevent unregistered users from viewing pages, regardless of the page rights" box in the administration rights. ### Patches The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3. ### Workarounds There are two main ways for protecting against this vulnerability, the easiest and the best one is by applying a patch in the `registerinline.vm` template, the patch consists in checking the value of the xredirect field to ensure it matches the following: ``` <input type="hidden" name="xredirect" value="$escapetool.xml($!request.xredirect)" /> ``` If for some reason it's not possible to patch this file, another workaround is to ensure "Prevent unregistered users from viewing pages, regardless of the page rights" is not checked in the rights and apply a better right scheme using groups and rights on spaces. ### References https://jira.xwiki.org/browse/XWIKI-19291 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security mailing list](mailto:security@xwiki.org)
{'CVE-2022-23622'}
2022-02-11T15:00:09Z
2022-02-09T23:25:44Z
HIGH
7.4
{'CWE-79'}
{'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://jira.xwiki.org/browse/XWIKI-19291', 'https://github.com/advisories/GHSA-gx6h-936c-vrrr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622'}
null
GHSA
GHSA-g3r2-65gc-qpqc
Denial of Service in mqtt-packet
Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application. ## Recommendation Version 3.x: Update to version 3.4.6 or later. Version 4.x: Update to version 4.0.5 or later.
{'CVE-2016-10523'}
2021-01-08T18:50:03Z
2019-02-18T23:38:45Z
HIGH
0
{'CWE-400'}
{'https://github.com/mqttjs/mqtt-packet/pull/8', 'https://github.com/mcollina/mosca/issues/393', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10523', 'https://www.npmjs.com/advisories/75', 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc', 'https://nodesecurity.io/advisories/75'}
null
GHSA
GHSA-rgcg-28xm-8mmw
Cross-Site Scripting in Backend Grid View
### Problem Failing to properly encode settings for _backend layouts_, the corresponding grid view is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described. ### Credits Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.
{'CVE-2021-32669'}
2022-04-19T19:02:59Z
2021-07-22T19:37:41Z
MODERATE
6.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32669', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-rgcg-28xm-8mmw', 'https://typo3.org/security/advisory/typo3-core-sa-2021-011', 'https://github.com/advisories/GHSA-rgcg-28xm-8mmw'}
null
GHSA
GHSA-8c5p-4362-9333
Path traversal in grav
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
{'CVE-2021-3924'}
2021-11-10T16:48:15Z
2021-11-10T16:48:15Z
HIGH
8.8
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3924', 'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/advisories/GHSA-8c5p-4362-9333', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
null
GHSA
GHSA-4wv4-mgfq-598v
Code injection in nobelprizeparser
Code injection through use of eval.
null
2021-03-12T23:00:19Z
2021-03-12T23:00:19Z
CRITICAL
0
{'CWE-94'}
{'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/advisories/GHSA-4wv4-mgfq-598v', 'https://www.npmjs.com/package/nobelprizeparser', 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}
null
GHSA
GHSA-r82c-j4mq-5xfw
Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs
### Impact Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.5.0 can generate an invalid short URL when a vanity domain exists. ### Patches Upgrading `bitlyshortener` to 0.5.0 or newer will prevent the generation of any such invalid short URLs. ### References * [Release notes](https://github.com/impredicative/bitlyshortener/releases)
null
2021-09-21T16:40:42Z
2020-10-27T19:19:56Z
HIGH
0
{'CWE-601'}
{'https://github.com/advisories/GHSA-r82c-j4mq-5xfw', 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-r82c-j4mq-5xfw', 'https://pypi.org/project/bitlyshortener/', 'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.5.0'}
null
GHSA
GHSA-2w7w-2j92-44hx
HTTP Request Smuggling in akka-http-core
A vulnerable Akka HTTP server will accept a malformed message and hand it over to the user. If the user application proxies this message to another server unchanged and that server also accepts that message but interprets it as two HTTP messages, the second message has reached the second server without having been inspected by the proxy.
{'CVE-2021-23339'}
2021-05-10T15:17:09Z
2021-05-10T15:17:09Z
MODERATE
6.5
{'CWE-444'}
{'https://github.com/advisories/GHSA-2w7w-2j92-44hx', 'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34', 'https://snyk.io/vuln/SNYK-JAVA-COMTYPESAFEAKKA-1075043', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23339', 'https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.html', 'https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201'}
null
GHSA
GHSA-h95j-h2rv-qrg4
Moderate severity vulnerability that affects django
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not properly handle web-server configurations supporting arbitrary HTTP Host headers, which allows remote attackers to trigger unauthenticated forged requests via vectors involving a DNS CNAME record and a web page containing JavaScript code.
{'CVE-2011-4140'}
2021-09-14T17:15:59Z
2018-07-23T19:51:19Z
MODERATE
0
{'CWE-352'}
{'https://hermes.opensuse.org/messages/14700881', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4140', 'https://www.djangoproject.com/weblog/2011/sep/09/', 'https://www.djangoproject.com/weblog/2011/sep/10/127/', 'http://openwall.com/lists/oss-security/2011/09/11/1', 'http://secunia.com/advisories/46614', 'https://github.com/advisories/GHSA-h95j-h2rv-qrg4', 'http://www.debian.org/security/2011/dsa-2332', 'https://bugzilla.redhat.com/show_bug.cgi?id=737366', 'http://openwall.com/lists/oss-security/2011/09/13/2'}
null
GHSA
GHSA-jxcc-g75x-qgw9
Arbitrary File Write via Archive Extraction (Zip Slip)
This affects all versions of package calipso. It is possible for a malicious module to overwrite files on an arbitrary file system through the module install functionality.
{'CVE-2021-23391'}
2021-06-17T20:03:53Z
2021-06-08T18:47:18Z
HIGH
7.3
{'CWE-668', 'CWE-29'}
{'https://github.com/cliftonc/calipso', 'https://snyk.io/vuln/SNYK-JS-CALIPSO-1300555', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23391', 'https://github.com/advisories/GHSA-jxcc-g75x-qgw9'}
null
GHSA
GHSA-2v88-qq7x-xq5f
Improper Encoding or Escaping of Output in Asset Metadata Component
Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually.
{'CVE-2021-39170'}
2021-09-10T17:10:52Z
2021-09-01T18:21:55Z
HIGH
8
{'CWE-116', 'CWE-79'}
{'https://github.com/pimcore/pimcore/pull/10206', 'https://github.com/pimcore/pimcore/pull/10178.patch', 'https://huntr.dev/bounties/c3e4cf79-a4b5-4982-af27-729f66281501/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39170', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-2v88-qq7x-xq5f', 'https://huntr.dev/bounties/e4cb9cd8-89cf-427c-8d2e-37ca40099bf2/', 'https://github.com/advisories/GHSA-2v88-qq7x-xq5f', 'https://github.com/pimcore/pimcore/pull/10178'}
null
GHSA
GHSA-gcm4-q2pg-xw89
Moderate severity vulnerability that affects ipycache
A code injection issue was discovered in ipycache through 2016-05-31.
{'CVE-2019-7539'}
2021-07-27T20:32:57Z
2019-03-25T16:16:55Z
HIGH
8.8
{'CWE-94', 'CWE-502'}
{'https://github.com/advisories/GHSA-gcm4-q2pg-xw89', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7539', 'https://github.com/rossant/ipycache/issues/47'}
null
GHSA
GHSA-m4vv-p6fq-jhqp
Directory Traversal in @vivaxy/here
The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root. It is vulnerable to a directory traversal attack. This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confidential files. Mitigating Factors: If the node process is run as a user with very limited filesystem permissions, there is significantly less risk of exposing confidential/private information. Proof of Concept: ``` curl "http://${SERVER_IP}:${SERVER_PORT}/..%2f..%2fetc/passwd" ``` ## Recommendation Run `npm i @vivaxy/here` to install the latest version that addresses this vulnerability.
null
2021-09-23T21:48:56Z
2020-09-01T19:04:07Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/557', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://github.com/advisories/GHSA-m4vv-p6fq-jhqp'}
null
GHSA
GHSA-5rcv-m4m3-hfh7
Infinite Loop in Go
Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
{'CVE-2020-14040'}
2021-05-18T18:34:35Z
2021-05-18T18:34:35Z
HIGH
6.7
{'CWE-835', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14040', 'https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/', 'https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0', 'https://go-review.googlesource.com/c/text/+/238238', 'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e', 'https://github.com/advisories/GHSA-5rcv-m4m3-hfh7', 'https://github.com/golang/go/issues/39491'}
null
GHSA
GHSA-mgg8-9pvp-6qcw
MvccRwLock allows data races & aliasing violations
Affected versions of the `noise_search` crate unconditionally implement Send/Sync for `MvccRwLock`. This can lead to data races when types that are either `!Send` or `!Sync` (e.g. `Rc<T>`, `Arc<Cell<_>>`) are contained inside `MvccRwLock` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). Also, safe APIs of `MvccRwLock` allow aliasing violations by allowing `&T` and `LockResult<MutexGuard<Box<T>>>` to co-exist in conflicting lifetime regions. The APIs of `MvccRwLock` should either be marked as `unsafe` or `MbccRwLock` should be changed to private or pub(crate).
null
2021-08-25T20:59:59Z
2021-08-25T20:59:59Z
MODERATE
0
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0141.html', 'https://github.com/pipedown/noise/issues/72', 'https://github.com/advisories/GHSA-mgg8-9pvp-6qcw'}
null
GHSA
GHSA-pm9v-325f-5g74
Malicious Package in saync
All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T21:26:49Z
2020-09-02T21:30:11Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-pm9v-325f-5g74', 'https://www.npmjs.com/advisories/896'}
null
GHSA
GHSA-h86x-mv66-gr5q
OS Command Injection in Locutus
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
{'CVE-2020-13619'}
2021-07-26T21:21:43Z
2021-07-26T21:21:43Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-h86x-mv66-gr5q', 'https://reallinkers.github.io/CVE-2020-13619/', 'https://locutus.io/php/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13619', 'https://www.npmjs.com/package/locutus'}
null
GHSA
GHSA-wq7q-5v6j-xfv6
Command Injection in picotts
This affects all versions up to and including version 0.1.1 of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23378'}
2021-05-07T16:06:11Z
2021-05-07T16:06:11Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-wq7q-5v6j-xfv6', 'https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942398c8b/index.js%23L16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23378', 'https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539'}
null
GHSA
GHSA-w4cc-pc2h-whcj
Out-of-bounds Write in derive-com-impl
An issue was discovered in the derive-com-impl crate before 0.1.2 for Rust. An invalid reference (and memory corruption) can occur because AddRef might not be called before returning a pointer.
{'CVE-2021-45681'}
2022-01-07T16:17:29Z
2022-01-06T22:16:10Z
HIGH
7.5
{'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0083.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45681', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/derive-com-impl/RUSTSEC-2021-0083.md', 'https://github.com/advisories/GHSA-w4cc-pc2h-whcj'}
null
GHSA
GHSA-3cf2-x423-x582
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
{'CVE-2021-4024'}
2022-02-09T18:28:06Z
2022-01-06T21:12:50Z
MODERATE
6.5
{'CWE-200', 'CWE-346'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4024', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/', 'https://bugzilla.redhat.com/show_bug.cgi?id=2026675,', 'https://github.com/advisories/GHSA-3cf2-x423-x582', 'https://github.com/containers/podman/releases/tag/v3.4.3'}
null
GHSA
GHSA-vp9c-fpxx-744v
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-23T17:19:55Z
2020-09-23T17:19:55Z
LOW
0
null
{'https://github.com/personnummer/ruby/security/advisories/GHSA-vp9c-fpxx-744v', 'https://github.com/advisories/GHSA-vp9c-fpxx-744v'}
null
GHSA
GHSA-v3vf-2r98-xw8w
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters.
{'CVE-2018-1322'}
2021-09-20T15:02:53Z
2018-11-06T23:17:25Z
MODERATE
4.9
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1322', 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w', 'https://www.exploit-db.com/exploits/45400/', 'http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting', 'http://www.securityfocus.com/bid/103507'}
null
GHSA
GHSA-4mg4-wvmx-5332
Server-Side Request Forgery in Plone
Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file.
{'CVE-2021-33510'}
2021-06-15T16:11:47Z
2021-06-15T16:11:47Z
MODERATE
4.3
{'CWE-918'}
{'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33510', 'https://plone.org/security/hotfix/20210518/server-side-request-forgery-via-event-ical-url', 'https://github.com/advisories/GHSA-4mg4-wvmx-5332'}
null
GHSA
GHSA-w4g2-9hj6-5472
Moderate severity vulnerability that affects com.rabbitmq:amqp-client and org.springframework.amqp:spring-amqp
Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit.
{'CVE-2018-11087'}
2021-09-20T22:35:57Z
2018-10-18T18:06:08Z
MODERATE
5.9
{'CWE-295'}
{'https://pivotal.io/security/cve-2018-11087', 'https://github.com/advisories/GHSA-w4g2-9hj6-5472', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11087'}
null
GHSA
GHSA-hw7r-qrhp-5pff
Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20
Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors. - https://vaadin.com/security/cve-2021-33605
null
2021-08-30T16:16:46Z
2021-08-30T16:16:46Z
MODERATE
4.3
null
{'https://github.com/advisories/GHSA-hw7r-qrhp-5pff', 'https://github.com/vaadin/platform/security/advisories/GHSA-hw7r-qrhp-5pff'}
null
GHSA
GHSA-p5f8-gfw5-33w4
Heap buffer overflow in Tensorflow
### Impact The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, this code is prone to heap buffer overflow: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L248-L251 If `split_values` does not end with a value at least `num_values` then the `while` loop condition will trigger a read outside of the bounds of `split_values` once `batch_idx` grows too large. ### Patches We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release. We recommend users to upgrade to TensorFlow 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15201'}
2021-11-19T15:19:01Z
2020-09-25T18:28:34Z
MODERATE
4.8
{'CWE-20', 'CWE-787', 'CWE-122'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15201', 'https://github.com/advisories/GHSA-p5f8-gfw5-33w4'}
null
GHSA
GHSA-2cxf-6567-7pp6
Local Information Disclosure Vulnerability
### Impact Local information disclosure of sensitive information downloaded via the API using the API Client. ### Finding The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system. Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue. This vulnerability was found due to [this query](https://lgtm.com/query/8938575359870595124/) that [Jonathan Leitschuh](https://github.com/JLLeitschuh) contributed to the Semmle QL project. ### Patches This issue has been patched in [version 1.0.0-beta.9](https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9). See also [Remove unused downloadFile helpers](https://github.com/DataDog/datadog-api-client-java/pull/637). ### Workarounds The recommended workaround is to specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`. ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [DataDog/datadog-api-client-java](https://github.com/DataDog/datadog-api-client-java) * Email us at [security@datadoghq.com](mailto:security@datadoghq.com)
{'CVE-2021-21331'}
2022-04-19T19:03:02Z
2021-03-03T23:01:17Z
LOW
3
{'CWE-379', 'CWE-378'}
{'https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21331', 'https://github.com/advisories/GHSA-2cxf-6567-7pp6', 'https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6'}
null
GHSA
GHSA-3grc-fgh6-g5gp
Directory Traversal in http_static_simple
Affected versions of `http_static_simple` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16134'}
2021-09-16T20:57:43Z
2018-07-23T22:08:39Z
HIGH
0
{'CWE-12', 'CWE-22'}
{'https://github.com/advisories/GHSA-3grc-fgh6-g5gp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16134', 'https://nodesecurity.io/advisories/472', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/http_static_simple', 'https://www.npmjs.com/advisories/472'}
null
GHSA
GHSA-48rw-j489-928m
Signature wrapping vulnerability in Spring Security
Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid.
{'CVE-2020-5407'}
2021-06-15T17:44:45Z
2020-06-05T16:13:29Z
HIGH
8.8
{'CWE-347'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rd99601fbca514f214f88f9e53fd5be3cfbff05b350c994b4ec2e184c@%3Cdev.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r73af928cf64bebf78b7fa4bc56a5253273ec7829f5f5827f64c72fc7@%3Cissues.servicemix.apache.org%3E', 'https://lists.apache.org/thread.html/ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a@%3Cdev.geode.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2020-5407', 'https://github.com/advisories/GHSA-48rw-j489-928m', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5407'}
null
GHSA
GHSA-gvg7-pp82-cff3
Cross-Site Scripting in c3
Affected versions of `c3` are vulnerable to cross-site scripting via improper sanitization of HTML in rendered tooltips. ## Recommendation Update to 0.4.11 or later.
{'CVE-2016-1000240'}
2021-09-23T21:36:09Z
2020-09-01T15:59:11Z
MODERATE
0
{'CWE-79'}
{'https://github.com/c3js/c3/issues/1536', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000240', 'https://www.npmjs.com/advisories/138', 'https://github.com/advisories/GHSA-gvg7-pp82-cff3'}
null
GHSA
GHSA-8hxh-r6f7-jf45
Memory exhaustion in http4s-async-http-client with large or malicious compressed responses
### Impact A server we connect to with http4s-async-http-client could theoretically respond with a large or malicious compressed stream and exhaust memory in the client JVM. It does not affect http4s servers, other client backends, or clients that speak only to trusted servers. This is related to a transitive dependency on netty-codec-4.1.45.Final, which is affected by [CVE-2020-11612](https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897). ### Patches Upgrade to http4s-async-http-client >= 0.21.8. All 1.0 milestones are also safe. ### Workarounds Add an explicit runtime dependency on async-http-client's netty dependencies that evicts them to an unaffected version: ```scala libraryDependencies ++= Seq( "io.netty" % "netty-codec" % "4.1.53.Final" % Runtime, "io.netty" % "netty-codec-socks" % "4.1.53.Final" % Runtime, "io.netty" % "netty-handler-proxy" % "4.1.53.Final" % Runtime, "io.netty" % "netty-common" % "4.1.53.Final" % Runtime, "io.netty" % "netty-transport" % "4.1.53.Final" % Runtime, "io.netty" % "netty-handler" % "4.1.53.Final" % Runtime, "io.netty" % "netty-resolver-dns" % "4.1.53.Final" % Runtime ) ``` ### References * https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897 * https://github.com/http4s/http4s/issues/3681 ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s](https://github.com/http4s/http4s/issues/new) * Contact a maintainer privately per [http4s' security policy](https://github.com/http4s/http4s/blob/master/SECURITY.md#reporting-a-vulnerability)
null
2022-04-19T19:02:38Z
2020-10-16T17:03:43Z
LOW
0
{'CWE-400'}
{'https://github.com/http4s/http4s/security/advisories/GHSA-8hxh-r6f7-jf45', 'https://github.com/advisories/GHSA-8hxh-r6f7-jf45'}
null
GHSA
GHSA-73cw-jxmm-qpgh
Path Traversal in localhost-now
All versions of `localhost-now` are vulnerable to path traversal. This vulnerability is a bypass to the path traversal fix introduced in version 1.0.2 Proof of concept: ``` $ curl -v --path-as-is "http://IP:5432/..././..././..././..././..././..././..././..././..././..././etc/passwd" ``` ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
null
2021-08-04T21:08:45Z
2019-06-11T16:40:48Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/329837', 'https://github.com/advisories/GHSA-73cw-jxmm-qpgh', 'https://github.com/DCKT/localhost-now/blob/master/lib/app.js#L17', 'https://nodesecurity.io/advisories/655', 'https://www.npmjs.com/advisories/655'}
null
GHSA
GHSA-xhjx-mfr6-9rr4
Command Injection in samsung-remote
Versions of `samsung-remote` before 1.3.5 are vulnerable to command injection. This vulnerability is exploitable if user input is passed into the `ip` option of the package constructor. ## Recommendation Update to version 1.3.5 or later.
null
2021-09-24T21:50:46Z
2020-09-01T21:20:28Z
CRITICAL
0
{'CWE-77'}
{'https://hackerone.com/reports/394294', 'https://www.npmjs.com/advisories/734', 'https://github.com/advisories/GHSA-xhjx-mfr6-9rr4', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/465.json'}
null
GHSA
GHSA-39q4-p535-c852
Uncontrolled Resource Consumption in locutus
The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.
{'CVE-2021-23392'}
2021-06-16T20:02:15Z
2021-06-10T17:25:05Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392', 'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e', 'https://github.com/locutusjs/locutus/pull/446', 'https://github.com/advisories/GHSA-39q4-p535-c852'}
null
GHSA
GHSA-6gw4-x63h-5499
Ability to switch customer email address on account detail page and stay verified
### Impact The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one). ### Patches Patch has been provided for Sylius 1.6.x and newer - 1.6.9, 1.7.9, 1.8.3. Versions older than 1.6 are not covered by our security support anymore. ### Workarounds If for whatever reason you are not able to upgrade your application version, you may resolve this issue on your own by creating a custom event listener, which will listen to the `sylius.customer.pre_update` event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain `/admin` prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here. ### Acknowledgements This security issue has been reported by Mircea Silviu (@decemvre), thanks a lot! ### For more information If you have any questions or comments about this advisory: * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2020-15245'}
2022-04-19T19:02:37Z
2020-10-19T20:40:59Z
MODERATE
4.3
{'CWE-862', 'CWE-79'}
{'https://github.com/advisories/GHSA-6gw4-x63h-5499', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15245'}
null
GHSA
GHSA-856q-xv3c-7f2f
Unauthenticated control plane denial of service attack in Istio
### Impact The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially [multicluster](https://istio.io/latest/docs/setup/install/multicluster/primary-remote/) topologies, this port is exposed over the public internet. ### Patches - Istio 1.13.1 and above - Istio 1.12.4 and above - Istio 1.11.7 and above ### Workarounds There are no effective workarounds, beyond upgrading. Limiting network access to Istiod to the minimal set of clients can help lessen the scope of the vulnerability to some extent. ### References More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2022-003) ### For more information If you have any questions or comments about this advisory, please email us at [istio-security-vulnerability-reports@googlegroups.com](mailto:istio-security-vulnerability-reports@googlegroups.com)
{'CVE-2022-23635'}
2022-04-20T21:05:17Z
2022-02-23T14:59:08Z
HIGH
7.5
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23635', 'https://github.com/advisories/GHSA-856q-xv3c-7f2f', 'https://istio.io/latest/news/security/istio-security-2022-003', 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84', 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f'}
null
GHSA
GHSA-hvqc-pc78-x9wh
Soundness issue in raw-cpuid
An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It has unsound transmute calls within as_string() methods.
{'CVE-2021-26306'}
2021-08-25T20:53:10Z
2021-08-25T20:53:10Z
HIGH
7.5
{'CWE-198'}
{'https://github.com/advisories/GHSA-hvqc-pc78-x9wh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26306', 'https://github.com/RustSec/advisory-db/pull/614', 'https://github.com/gz/rust-cpuid/issues/40', 'https://rustsec.org/advisories/RUSTSEC-2021-0013.html'}
null
GHSA
GHSA-c2g6-57fp-22wp
Malicious Package in fuffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:14:29Z
2020-09-03T22:48:35Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-c2g6-57fp-22wp', 'https://www.npmjs.com/advisories/1271'}
null
GHSA
GHSA-pjxp-f379-6284
Malicious Package in @fangrong/xoc
Version 1.0.6 of `@fangrong/xoc` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:13:27Z
2020-09-03T19:13:27Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-pjxp-f379-6284', 'https://www.npmjs.com/advisories/1104'}
null
GHSA
GHSA-8459-6rc9-8vf8
Path traversal in github.com/cloudflare/cfrpki/cmd/octorpki
### Impact In the case that a malicious TAL file is parsed pointing to a repository that provides a malicious ROA file which octorpki downloads, it is possible to bypass the current directory traversal mitigation to allow writing outside of the current directory. ### Patches No patch release has been made
null
2022-02-15T00:14:52Z
2022-02-14T22:52:15Z
LOW
0
{'CWE-22'}
{'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8459-6rc9-8vf8', 'https://github.com/advisories/GHSA-8459-6rc9-8vf8'}
null
GHSA
GHSA-m658-p24x-p74r
TLS certificate validation error in Mellium
In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.
{'CVE-2022-24968'}
2022-02-24T13:14:02Z
2022-02-12T00:00:36Z
MODERATE
5.9
{'CWE-295'}
{'https://mellium.im/xmpp/', 'https://github.com/advisories/GHSA-m658-p24x-p74r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24968', 'https://mellium.im/cve/cve-2022-24968/'}
null
GHSA
GHSA-5p67-cp9c-hqw4
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833.
{'CVE-2020-0848'}
2021-07-28T18:57:19Z
2021-07-28T18:57:19Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0848', 'https://github.com/advisories/GHSA-5p67-cp9c-hqw4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0848'}
null
GHSA
GHSA-hw4r-xr38-hm8j
Downloads Resources over HTTP in unicode-json
Affected versions of `unicode-json` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Install version 2.0.0 or greater.
{'CVE-2016-10610'}
2021-01-08T18:39:29Z
2019-02-18T23:47:59Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10610', 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j', 'https://nodesecurity.io/advisories/206', 'https://www.npmjs.com/advisories/206'}
null
GHSA
GHSA-m72g-42q6-gvc2
Cross-site Scripting in LaraCMS
LaraCMS contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.
{'CVE-2020-20129'}
2021-10-04T20:13:11Z
2021-10-04T20:13:11Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-20129', 'https://github.com/advisories/GHSA-m72g-42q6-gvc2', 'https://github.com/wanglelecc/laracms/issues/34'}
null
GHSA
GHSA-f4hh-xxqh-wgpq
Exposure of Sensitive Information to an Unauthorized Actor in LibreNMS
An issue was discovered in LibreNMS through 1.47. Information disclosure can occur: an attacker can fingerprint the exact code version installed and disclose local file paths.
{'CVE-2019-10667'}
2021-08-18T17:23:14Z
2019-10-11T18:43:20Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-f4hh-xxqh-wgpq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10667', 'https://www.darkmatter.ae/xen1thlabs/librenms-information-disclosure-vulnerability-xl-19-018/'}
null
GHSA
GHSA-wvpv-ffcv-r6cw
Internal NCryptDecrypt method could be used externally from WindowsHello library.
### Impact Every user of the library before version 1.0.4. ### Patches Patched in 1.0.4+. ### Workarounds None. ### References https://github.com/SeppPenner/WindowsHello/issues/3 ### For more information It this library is used to encrypt text and write the output to a txt file, another executable could be able to decrypt the text using the static method NCryptDecrypt from this same library without the need to use Windows Hello Authentication again.
{'CVE-2020-11005'}
2021-01-08T20:22:39Z
2020-04-14T23:09:13Z
MODERATE
5.1
{'CWE-288'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11005', 'https://github.com/SeppPenner/WindowsHello/security/advisories/GHSA-wvpv-ffcv-r6cw', 'https://github.com/advisories/GHSA-wvpv-ffcv-r6cw', 'https://github.com/SeppPenner/WindowsHello/issues/3'}
null
GHSA
GHSA-6gf2-pvqw-37ph
Log entry injection in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.
{'CVE-2021-22060'}
2022-04-22T15:35:43Z
2022-01-12T23:04:06Z
MODERATE
4.3
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22060', 'https://tanzu.vmware.com/security/cve-2021-22060', 'https://github.com/advisories/GHSA-6gf2-pvqw-37ph', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
GHSA
GHSA-9c22-pwxw-p6hx
Initializer reentrancy may lead to double initialization
### Impact Initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution. Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor. ### Patches A fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ### Workarounds Avoid untrusted external calls during initialization. ### References https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006 ### Credits This issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
null
2021-12-14T21:47:33Z
2021-12-14T21:47:33Z
LOW
0
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx', 'https://github.com/advisories/GHSA-9c22-pwxw-p6hx', 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}
null
GHSA
GHSA-26j7-6w8w-7922
Division by zero in optimized pooling implementations in TFLite
### Impact Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling [`ComputePaddingHeightWidth`](https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90). Since users can craft special models which will have `params->stride_{height,width}` be zero, this will result in a division by zero. ### Patches We have patched the issue in GitHub commit [5f7975d09eac0f10ed8a17dbb6f5964977725adc](https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29586'}
2021-05-21T14:26:43Z
2021-05-21T14:26:43Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-26j7-6w8w-7922', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29586', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922', 'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'}
null
GHSA
GHSA-q8hg-pf8v-cxrv
Non-constant time comparison in UriSigner
When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability.
{'CVE-2019-18887'}
2022-03-26T00:33:03Z
2022-03-26T00:22:49Z
HIGH
8.1
null
{'https://github.com/symfony/symfony/releases/tag/v4.3.8', 'https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/', 'https://symfony.com/blog/symfony-4-3-8-released', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18887', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/', 'https://symfony.com/cve-2019-18887', 'https://github.com/advisories/GHSA-q8hg-pf8v-cxrv', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18887.yaml'}
null
GHSA
GHSA-wfwm-chj7-w59r
Moderate severity vulnerability that affects ox
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.
{'CVE-2017-16229'}
2021-09-21T18:33:56Z
2018-03-05T18:29:32Z
MODERATE
5.5
{'CWE-125'}
{'https://rubygems.org/gems/ox/versions/2.8.1', 'https://github.com/ohler55/ox/issues/195', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16229', 'https://github.com/advisories/GHSA-wfwm-chj7-w59r'}
null
GHSA
GHSA-crfx-5phg-hmw9
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2021-08-04T21:15:58Z
2019-06-13T18:59:12Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-crfx-5phg-hmw9', 'https://www.npmjs.com/advisories/955', 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1', 'https://github.com/infor-design/enterprise-ng/issues/502'}
null
GHSA
GHSA-cwvc-87xq-pc5m
Out-of-bounds Write and Race Condition in metrics-util
An issue was discovered in the metrics-util crate before 0.7.0 for Rust. There is a data race and memory corruption because AtomicBucket<T> unconditionally implements the Send and Sync traits.
{'CVE-2021-45704'}
2022-01-07T17:39:56Z
2022-01-06T22:08:43Z
HIGH
8.1
{'CWE-362', 'CWE-787'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/metrics-util/RUSTSEC-2021-0113.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0113.html', 'https://github.com/advisories/GHSA-cwvc-87xq-pc5m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45704'}
null
GHSA
GHSA-278g-rq84-9hmg
`CHECK`-fail in `MapStage`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`: ```python import tensorflow as tf tf.raw_ops.MapStage( key=tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), indices=tf.constant((0), dtype=tf.int32), values=[tf.constant((0), dtype=tf.int32)], dtypes=[tf.int32, tf.int64], capacity=0, memory_limit=0, container='', shared_name='') ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L513) does not check that the `key` input is a valid non-empty tensor. ### Patches We have patched the issue in GitHub commit [d7de67733925de196ec8863a33445b73f9562d1d](https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-37673'}
2021-08-25T14:41:36Z
2021-08-25T14:41:36Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg', 'https://github.com/advisories/GHSA-278g-rq84-9hmg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37673', 'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'}
null
GHSA
GHSA-q674-xm3x-2926
Uncontrolled Resource Consumption in parse-link-header
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
{'CVE-2021-23490'}
2022-01-07T16:08:29Z
2022-01-06T21:37:02Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490', 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1', 'https://github.com/advisories/GHSA-q674-xm3x-2926'}
null
GHSA
GHSA-p2r2-h92r-w2mg
Directory Traversal in mfrserver
Affected versions of `mfrserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16213'}
2021-01-14T15:45:16Z
2020-09-01T18:11:03Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-p2r2-h92r-w2mg', 'https://nodesecurity.io/advisories/421', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/mfrserver', 'https://www.npmjs.com/advisories/421', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16213'}
null
GHSA
GHSA-fmm9-3gv8-58f4
Improper Handling of Missing Values in kaml
### Impact Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service. This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected. YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue, for example: ```yaml !<x> ``` The following is a sample application that demonstrates this issue: ```kotlin import com.charleskorn.kaml.Yaml import kotlinx.serialization.SerialName import kotlinx.serialization.Serializable @Serializable private sealed class K { @Serializable @SerialName("x") data class X( val property: String? = null, ) : K() } const val s = """ !<x> """ fun main() { println("Started.") val result = Yaml.default.decodeFromString(K.serializer(), s) println("Finished, result is $result") } ``` On vulnerable versions of kaml, the `decodeFromString()` operation hangs and never returns. ### Patches Version 0.35.3 or later contain the fix for this issue.
{'CVE-2021-39194'}
2021-09-08T14:47:33Z
2021-09-07T23:08:40Z
MODERATE
4.3
{'CWE-835', 'CWE-230'}
{'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://github.com/advisories/GHSA-fmm9-3gv8-58f4', 'https://github.com/charleskorn/kaml/issues/179', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194'}
null
GHSA
GHSA-7rr7-rcjw-56vj
High severity vulnerability that affects activestorage
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path.
{'CVE-2018-16477'}
2021-06-11T13:53:06Z
2018-12-05T17:17:02Z
MODERATE
6.5
{'CWE-200'}
{'https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ', 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16477', 'https://github.com/advisories/GHSA-7rr7-rcjw-56vj'}
null
GHSA
GHSA-gffv-5hr2-f9gj
Incorrect results in orion
An issue was discovered in the orion crate before 0.11.2 for Rust. reset() calls cause incorrect results.
{'CVE-2018-20999'}
2021-08-25T20:43:18Z
2021-08-25T20:43:18Z
HIGH
7.5
{'CWE-682'}
{'https://github.com/brycx/orion/issues/46', 'https://rustsec.org/advisories/RUSTSEC-2018-0012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20999', 'https://github.com/advisories/GHSA-gffv-5hr2-f9gj'}
null
GHSA
GHSA-pghf-347x-c2gj
SQL Injection via in django-debug-toolbar
### Impact With Django Debug Toolbar attackers are able to execute SQL by changing the `raw_sql` input of the SQL explain, analyze or select forms and submitting the form. **NOTE:** This is a high severity issue for anyone using the toolbar in a **production environment**. Generally the Django Debug Toolbar team only maintains the latest version of django-debug-toolbar, but an exception was made because of the high severity of this issue. ### Patches Please upgrade to one of the following versions, depending on the major version you're using: - Version 1.x: [django-debug-toolbar 1.11.1](https://pypi.org/project/django-debug-toolbar/1.11.1/) - Version 2.x: [django-debug-toolbar 2.2.1](https://pypi.org/project/django-debug-toolbar/2.2.1/) - Version 3.x: [django-debug-toolbar 3.2.1](https://pypi.org/project/django-debug-toolbar/3.2.1/) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [django-debug-toolbar repo](https://github.com/jazzband/django-debug-toolbar/issues/new) (Please NO SENSITIVE INFORMATION, send an email instead!) * Email us at [security@jazzband.co](mailto:security@jazzband.co)
{'CVE-2021-30459'}
2022-04-19T19:02:53Z
2021-04-16T19:53:28Z
HIGH
0
{'CWE-89'}
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30459', 'https://github.com/advisories/GHSA-pghf-347x-c2gj', 'https://github.com/jazzband/django-debug-toolbar/releases', 'https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj', 'https://www.djangoproject.com/weblog/2021/apr/14/debug-toolbar-security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30459'}
null
GHSA
GHSA-5x3v-2gxr-59m2
Directory traversal in Apache RocketMQ
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later.
{'CVE-2019-17572'}
2021-04-07T19:55:55Z
2020-07-01T17:26:15Z
MODERATE
0
{'CWE-22'}
{'https://seclists.org/oss-sec/2020/q2/112', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/advisories/GHSA-5x3v-2gxr-59m2', 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552', 'https://github.com/apache/rocketmq/issues/1637', 'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E'}
null
GHSA
GHSA-9g8h-pjm4-q92p
Out-of-bounds Write in OpenCV.
In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.
{'CVE-2018-5268'}
2021-11-18T15:31:48Z
2021-10-12T22:23:41Z
MODERATE
5.5
{'CWE-787'}
{'https://github.com/opencv/opencv/issues/10541', 'http://www.securityfocus.com/bid/106945', 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268', 'https://github.com/advisories/GHSA-9g8h-pjm4-q92p'}
null
GHSA
GHSA-4fjv-pmhg-3rfg
Multiple cryptographic issues in Python oic
### Impact * Client implementations using this library ### Issues 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) `oic.consumer.Consumer.parse_authz` returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) `iat` claim was not checked for sanity (i.e. it could be in the future) ### Patches 1) IdToken signature is now always checked. 2) JWA `none` algorithm is now allowed only if using the `response_type` `code` 3) IdToken verification is now done automatically. 4) `iat` claim is now checked for sanity.
{'CVE-2020-26244'}
2022-04-19T19:02:41Z
2020-12-04T16:47:12Z
MODERATE
6.8
{'CWE-325', 'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26244', 'https://github.com/OpenIDC/pyoidc/releases/tag/1.2.1', 'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498', 'https://pypi.org/project/oic/', 'https://github.com/OpenIDC/pyoidc/security/advisories/GHSA-4fjv-pmhg-3rfg', 'https://github.com/advisories/GHSA-4fjv-pmhg-3rfg'}
null
GHSA
GHSA-mx67-wv8x-hvv9
Deserialization of Untrusted Data in msgpack
# Withdrawn This advisory was withdrawn by its CNA (Snyk). ## Original advisory All versions of package `msgpack` are vulnerable to Deserialization of Untrusted Data via the unpack function. This does not affect the similarly named package `@msgpack/msgpack`.
{'CVE-2021-23410'}
2021-09-15T19:12:52Z
2021-07-26T21:24:09Z
CRITICAL
9.8
{'CWE-502'}
{'https://snyk.io/vuln/SNYK-JS-MSGPACK-1296122', 'https://github.com/advisories/GHSA-mx67-wv8x-hvv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23410', 'https://github.com/msgpack/msgpack-node/blob/master/src/msgpack.cc%23L302-L335'}
null
GHSA
GHSA-xhr8-mpwq-2rr2
Automatic named constructor discovery in Valinor
## Design issue - automatic constructor discovery The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked. Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228. ## Example exploit Take following DTO example: ```php final class UserDTO { public function __construct( public int $id, public string $name ) {} public static function fromDb( PDO $connection, int $id ): self { /* ... code to fetch the DTO here ... */ } } ``` There is nothing inherently unsafe about the above `UserDTO`, but when mixed with `cuyz/valinor:^0.5.0` ( specifically https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b ), it is an explosive mix: ```php // this could be coming from user input: $maliciousPayload = [ 'connection' => [ 'dsn' => 'mysql:host=some-host;database=some-database', 'username' => 'root', 'password' => 'root', 'options' => [ // PDO::MYSQL_ATTR_INIT_COMMAND === 1002 1002 => 'DROP DATABASE all-the-moneys' ] ], 'id' => 123, ]; $treeMapper->map( UserDTO::class, $maliciousPayload ); // your DB is gone :D ``` The above payload is represented in PHP form, but may as well be input JSON, HTML or x-form-urlencoded. ## Mitigation Version 0.7.0 contains a patch for this issue. Automatic named constructor resolution should be disabled - only explicitly mapped named constructors should be used/discovered.
null
2022-04-05T21:39:22Z
2022-04-01T13:39:45Z
HIGH
0
null
{'https://github.com/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}
null
GHSA
GHSA-4q8f-5xxj-946r
Command Injection in addax
Versions of `addax` prior to 1.1.0 are vulnerable to Command Injection. The package does not validate user input on the `presignPath` function which receives input directly from the API endpoint. Exploiting the vulnerability requires authentication. This may allow attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 1.1.0 or later.
null
2021-09-28T15:17:49Z
2020-09-03T02:40:51Z
HIGH
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-4q8f-5xxj-946r', 'https://www.npmjs.com/advisories/954'}
null
GHSA
GHSA-226w-6hhj-69hp
Malicious Package in cal_rd
Version 0.1.1 of `rc_cal` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T20:07:00Z
2020-09-03T19:06:52Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1098', 'https://github.com/advisories/GHSA-226w-6hhj-69hp'}
null
GHSA
GHSA-mm6g-mmq6-53ff
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.
{'CVE-2021-32842'}
2022-02-08T19:44:21Z
2022-02-01T16:23:00Z
MODERATE
4
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32842', 'https://github.com/advisories/GHSA-mm6g-mmq6-53ff', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'}
null
GHSA
GHSA-3rmv-2pg5-xvqj
High severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework.
{'CVE-2018-1275'}
2021-10-21T21:29:18Z
2018-10-17T20:28:00Z
CRITICAL
9.8
{'CWE-94', 'CWE-358'}
{'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1275', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2939', 'http://www.securitytracker.com/id/1041301', 'https://pivotal.io/security/cve-2018-1275', 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-3rmv-2pg5-xvqj', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.securityfocus.com/bid/103771'}
null
GHSA
GHSA-p225-pc2x-4jpm
Incorrect Authorization in keycloak
A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.
{'CVE-2020-1725'}
2022-02-09T00:58:52Z
2022-02-09T00:58:52Z
MODERATE
5.4
{'CWE-668', 'CWE-863'}
{'https://issues.redhat.com/browse/KEYCLOAK-16550', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1725', 'https://github.com/advisories/GHSA-p225-pc2x-4jpm', 'https://bugzilla.redhat.com/show_bug.cgi?id=1765129'}
null
GHSA
GHSA-f6g6-54hm-fhxv
Data races in libsbc
Affected versions of this crate implements `Send` for `Decoder<R>` for any `R: Read`. This allows `Decoder<R>` to contain `R: !Send` and carry (move) it to another thread. This can result in undefined behavior such as memory corruption from data race on `R`, or dropping `R = MutexGuard<_>` from a thread that didn't lock the mutex. The flaw was corrected in commit a34d6e1 by adding trait bound `R: Send` to the `Send` impl for `Decoder<R>`.
{'CVE-2020-36440'}
2021-08-25T20:59:02Z
2021-08-25T20:59:02Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36440', 'https://github.com/advisories/GHSA-f6g6-54hm-fhxv', 'https://rustsec.org/advisories/RUSTSEC-2020-0120.html', 'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'}
null
GHSA
GHSA-cfwc-xjfp-44jg
Command Injection in gnuplot
All versions of `gnuplot` are vulnerable to Command Injection. The package fails to sanitize plot titles, which may allow attackers to execute arbitrary code in the system if the title value is supplied by a user. The following proof-of-concept creates a `testing` file in the current directory: ``` var gnuplot = require('gnuplot'); const title = '"\nset title system("touch testing")\n#'; gnuplot() .set('term png') .set('output "out.png"') .set(`title "${title}"`) .set('xrange [-10:10]') .set('yrange [-2:2]') .set('zeroaxis') .plot('(x/4)**2, sin(x), 1/x') .end(); ``` ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:36:00Z
2020-09-04T17:19:48Z
CRITICAL
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/1440', 'https://github.com/advisories/GHSA-cfwc-xjfp-44jg'}
null
GHSA
GHSA-xcf7-cj8q-pcjm
XSS vulnerability in Author URL of themes in Mautic
### Impact An XSS vulnerability was discovered in Mautic 2.13.1 in the Author URL of themes. ### Patches Update to 2.14 or later ### Workarounds None ### References https://github.com/mautic/mautic/releases/tag/2.14.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-11198'}
2022-04-19T19:02:45Z
2021-01-19T21:16:14Z
LOW
0
{'CWE-79'}
{'https://github.com/mautic/mautic/releases/tag/2.14.0', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11198', 'https://github.com/mautic/mautic/releases', 'https://github.com/advisories/GHSA-xcf7-cj8q-pcjm', 'https://github.com/mautic/mautic/security/advisories/GHSA-xcf7-cj8q-pcjm'}
null
GHSA
GHSA-x8rq-rc7x-5fg5
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF)
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses.
{'CVE-2022-0086'}
2022-04-19T19:03:24Z
2022-01-06T22:24:35Z
HIGH
8.2
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0086', 'https://github.com/transloadit/uppy/releases/tag/uppy%402.3.3', 'https://github.com/advisories/GHSA-x8rq-rc7x-5fg5', 'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f', 'https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122', 'https://github.com/transloadit/uppy/pull/3403'}
null
GHSA
GHSA-mm7v-vpv8-xfc3
Double free in smallvec
An issue was discovered in the smallvec crate before 0.6.10 for Rust. There is a double free for certain grow attempts with the current capacity.
{'CVE-2019-15551'}
2021-08-25T20:44:59Z
2021-08-25T20:44:59Z
CRITICAL
9.8
{'CWE-415'}
{'https://github.com/advisories/GHSA-mm7v-vpv8-xfc3', 'https://rustsec.org/advisories/RUSTSEC-2019-0009.html', 'https://github.com/servo/rust-smallvec/issues/148', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15551'}
null
GHSA
GHSA-89px-ww3j-g2mm
2FA bypass in Wagtail through new device path
## 2FA bypass through new device path ### Impact If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. ### Patches This problem has been patched in version 1.3.0. ### Workarounds There is no workaround at the moment. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) * Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
{'CVE-2019-16766'}
2021-01-08T21:28:09Z
2019-11-29T17:05:59Z
HIGH
8.7
{'CWE-304', 'CWE-290'}
{'https://github.com/advisories/GHSA-89px-ww3j-g2mm', 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766', 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm'}
null
GHSA
GHSA-hj69-c76v-86wr
Out-of-bounds Read in Pillow
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
{'CVE-2020-5313'}
2021-08-23T15:05:21Z
2020-04-01T16:36:00Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-hj69-c76v-86wr', 'https://usn.ubuntu.com/4272-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5313', 'https://www.debian.org/security/2020/dsa-4631', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}
null
GHSA
GHSA-v585-23hc-c647
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.
{'CVE-2020-36186'}
2022-04-22T17:30:13Z
2021-11-19T20:13:06Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36186', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-v585-23hc-c647', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2997', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-5jfw-35xp-5m42
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
### Impact `LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negative signed int32), causing `BinaryStream->get()` to throw an exception. In the context of PocketMine-MP, this leads to a server crash when the vulnerability is exploited. ### Patches e3fce7632b94e83fd6a518a87dcaf6a11681c4ac ### Workarounds This can be worked around by registering a custom `LoginPacket` implementation into `PacketPool` which overrides [this code](https://github.com/pmmp/BedrockProtocol/blob/47532c95ea37d5f0365b23f734d70d943ff95295/src/LoginPacket.php#L54) to patch it. ### For more information * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-04-06T18:43:19Z
2022-04-05T17:53:22Z
HIGH
7.5
{'CWE-124'}
{'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac', 'https://github.com/advisories/GHSA-5jfw-35xp-5m42'}
null
GHSA
GHSA-jfh8-c2jp-5v3q
Remote code injection in Log4j
# Summary Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default. Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory. # Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. # Affected versions Any Log4J version prior to v2.15.0 is affected to this specific issue. The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible. ## Security releases Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3 ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Remediation Advice ## Updated advice for version 2.16.0 The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0). Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33). Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221). Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.
{'CVE-2021-44228'}
2022-04-26T20:57:16Z
2021-12-10T00:40:56Z
CRITICAL
10
{'CWE-20', 'CWE-502', 'CWE-400'}
{'http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html', 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2021/dsa-5020', 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf', 'https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md', 'https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/', 'http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html', 'http://www.openwall.com/lists/oss-security/2021/12/13/2', 'https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/', 'http://seclists.org/fulldisclosure/2022/Mar/23', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://support.apple.com/kb/HT213189', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'http://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://github.com/apache/logging-log4j2/pull/608', 'https://logging.apache.org/log4j/2.x/manual/migration.html', 'https://github.com/advisories/GHSA-7rjr-3q55-vv33', 'http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html', 'http://www.openwall.com/lists/oss-security/2021/12/10/1', 'http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html', 'https://issues.apache.org/jira/browse/LOG4J2-3198', 'https://github.com/tangxiaofeng7/apache-log4j-poc', 'http://www.openwall.com/lists/oss-security/2021/12/10/2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf', 'https://twitter.com/kurtseifried/status/1469345530182455296', 'https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/', 'https://issues.apache.org/jira/browse/LOG4J2-3221', 'http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://www.openwall.com/lists/oss-security/2021/12/13/1', 'http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html', 'https://issues.apache.org/jira/browse/LOG4J2-3214', 'http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html', 'http://www.openwall.com/lists/oss-security/2021/12/15/3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf', 'http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228', 'https://www.kb.cert.org/vuls/id/930724', 'http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html', 'https://github.com/cisagov/log4j-affected-db', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032', 'http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html', 'https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0', 'https://issues.apache.org/jira/browse/LOG4J2-3201', 'http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html', 'http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html', 'https://security.netapp.com/advisory/ntap-20211210-0007/', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'http://www.openwall.com/lists/oss-security/2021/12/10/3', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html', 'http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html'}
null
GHSA
GHSA-xcp8-hh74-f6mc
Moderate severity vulnerability that affects oslo.middleware
python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
{'CVE-2017-2592'}
2021-09-21T22:29:19Z
2018-07-13T15:16:45Z
MODERATE
5.5
{'CWE-532'}
{'https://github.com/advisories/GHSA-xcp8-hh74-f6mc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2592'}
null
GHSA
GHSA-j52r-xc68-q8f4
Insufficiently Protected Credentials in Pivotal Reactor Netty
Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.
{'CVE-2019-11284'}
2021-08-18T21:52:59Z
2019-10-23T14:14:32Z
HIGH
8.6
{'CWE-522'}
{'https://pivotal.io/security/cve-2019-11284', 'https://github.com/advisories/GHSA-j52r-xc68-q8f4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11284'}
null
GHSA
GHSA-vcjj-xf2r-mwvc
XSS in knockout
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
{'CVE-2019-14862'}
2022-04-25T23:07:31Z
2020-04-01T15:47:45Z
MODERATE
6.1
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/knockout/knockout/issues/1244', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14862', 'https://github.com/knockout/knockout/pull/2345', 'https://snyk.io/vuln/npm:knockout:20180213', 'https://github.com/advisories/GHSA-vcjj-xf2r-mwvc', 'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862'}
null
GHSA
GHSA-fmj5-wv96-r2ch
Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient
http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
{'CVE-2015-5262'}
2021-09-10T18:42:14Z
2018-10-17T00:05:29Z
MODERATE
0
null
{'http://www.securitytracker.com/id/1033743', 'https://issues.apache.org/jira/browse/HTTPCLIENT-1478', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5262', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://jenkins.io/security/advisory/2018-02-26/', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://svn.apache.org/viewvc?view=revision&revision=1626784', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html', 'http://www.ubuntu.com/usn/USN-2769-1', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1261538', 'https://github.com/advisories/GHSA-fmj5-wv96-r2ch'}
null
GHSA
GHSA-653m-r33x-39ff
Moderate severity vulnerability that affects geminabox
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
{'CVE-2017-16792'}
2021-09-01T22:38:12Z
2017-11-29T23:20:14Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://rubygems.org/gems/geminabox/versions/0.13.10', 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}
null
GHSA
GHSA-57qf-82hh-2hmc
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting.
{'CVE-2022-0502'}
2022-02-14T22:30:21Z
2022-02-07T00:00:30Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-57qf-82hh-2hmc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706', 'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f'}
null
GHSA
GHSA-8c9x-wfgj-v78w
Open Redirect in showdoc
showdoc is vulnerable to URL Redirection to Untrusted Site
{'CVE-2021-4000'}
2021-12-16T15:31:58Z
2021-12-16T15:31:58Z
MODERATE
6.5
{'CWE-601'}
{'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000', 'https://github.com/advisories/GHSA-8c9x-wfgj-v78w', 'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962'}
null
GHSA
GHSA-7rjp-fgwj-47rw
Missing authentication in ShenYu
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2022-23945'}
2022-02-02T16:17:08Z
2022-01-28T22:14:11Z
HIGH
7.5
{'CWE-862', 'CWE-306'}
{'https://github.com/advisories/GHSA-7rjp-fgwj-47rw', 'http://www.openwall.com/lists/oss-security/2022/01/25/6', 'http://www.openwall.com/lists/oss-security/2022/01/26/3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23945', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s'}
null
GHSA
GHSA-7j34-xq9v-9mqg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0827'}
2021-07-28T18:56:52Z
2021-07-28T18:56:52Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-7j34-xq9v-9mqg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0827'}
null
GHSA
GHSA-j3ch-vjph-8q6v
Command injection in Alluxio
In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.
{'CVE-2022-23848'}
2022-03-01T22:31:19Z
2022-02-21T00:00:19Z
CRITICAL
9.8
null
{'https://www.alluxio.io/download/releases/alluxio-2-7-3-release/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23848', 'https://github.com/advisories/GHSA-j3ch-vjph-8q6v'}
null
GHSA
GHSA-4ppp-gpcr-7qf6
HTTP Request Smuggling: Content-Length Sent Twice in Waitress
### Impact Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally. So a request with: ``` Content-Length: 10 Content-Length: 10 ``` would get transformed to: ``` Content-Length: 10, 10 ``` Which would Waitress would then internally set to `Content-Lenght: 0`. Waitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. ### Patches This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior. ### Workarounds Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method). ### Issues/more security issues: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
null
2022-03-24T17:52:21Z
2019-12-20T23:04:35Z
CRITICAL
0
{'CWE-444'}
{'https://github.com/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}
null
GHSA
GHSA-px4h-xg32-q955
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
{'CVE-2021-33502'}
2021-10-27T17:04:16Z
2021-06-08T23:11:43Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33502', 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103', 'https://github.com/advisories/GHSA-px4h-xg32-q955', 'https://security.netapp.com/advisory/ntap-20210706-0001/', 'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1'}
null
GHSA
GHSA-6x33-pw7p-hmpq
Denial of Service in http-proxy
Versions of `http-proxy` prior to 1.18.1 are vulnerable to Denial of Service. An HTTP request with a long body triggers an `ERR_HTTP_HEADERS_SENT` unhandled exception that crashes the proxy server. This is only possible when the proxy server sets headers in the proxy request using the `proxyReq.setHeader` function. For a proxy server running on `http://localhost:3000`, the following curl request triggers the unhandled exception: ```curl -XPOST http://localhost:3000 -d "$(python -c 'print("x"*1025)')"``` ## Recommendation Upgrade to version 1.18.1 or later
null
2020-09-04T17:59:49Z
2020-09-04T17:59:49Z
HIGH
0
null
{'https://github.com/http-party/node-http-proxy/pull/1447/files', 'https://www.npmjs.com/advisories/1486', 'https://github.com/advisories/GHSA-6x33-pw7p-hmpq'}
null
GHSA
GHSA-h4pc-gx2w-f2xv
Heap OOB read in TFLite
### Impact A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of [`Split_V`](https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99): ```cc const int input_size = SizeOfDimension(input, axis_value); ``` If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the [`SizeOfDimension` function](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/kernel_util.h#L148-L150) will access data outside the bounds of the tensor shape array: ```cc inline int SizeOfDimension(const TfLiteTensor* t, int dim) { return t->dims->data[dim]; } ``` ### Patches We have patched the issue in GitHub commit [ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412](https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29606'}
2021-05-21T14:28:24Z
2021-05-21T14:28:24Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv', 'https://github.com/advisories/GHSA-h4pc-gx2w-f2xv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29606'}
null
GHSA
GHSA-35fr-h7jr-hh86
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. ### Impact 1. Cross-User Defacement 2. Cache Poisoning 3. Cross-Site Scripting (XSS) 4. Page Hijacking ### Root Cause The root cause is due to the usage of Netty without the HTTP header validation. https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23 ### Patches This vulnerability has been patched in 0.97.0. ### References [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](https://github.com/line/armeria/issues)
null
2022-04-19T19:02:55Z
2019-12-06T18:55:47Z
MODERATE
6.5
{'CWE-113', 'CWE-74'}
{'https://github.com/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}
null