ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-657v-jjf8-83gh
|
Malicious Package in jsmsha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:37:41Z
|
2020-09-03T23:14:55Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1295', 'https://github.com/advisories/GHSA-657v-jjf8-83gh'}
| null |
GHSA
|
GHSA-h8jc-jmrf-9h8f
|
Improper Authentication and Insecure Default Initialization of Resource in Argo API
|
As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
|
{'CVE-2020-8828'}
|
2021-07-26T21:19:27Z
|
2021-07-26T21:19:27Z
|
HIGH
| 8.8
|
{'CWE-287', 'CWE-1188'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8828', 'https://github.com/advisories/GHSA-h8jc-jmrf-9h8f', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo/releases', 'https://argoproj.github.io/argo-cd/security_considerations/'}
| null |
GHSA
|
GHSA-vpx7-vm66-qx8r
|
Path Traversal in github.com/unknwon/cae/zip
|
The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.
|
{'CVE-2020-7664'}
|
2022-01-04T19:33:01Z
|
2021-05-18T20:31:06Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-vpx7-vm66-qx8r', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7664'}
| null |
GHSA
|
GHSA-h9vc-2p9g-63gp
|
Exposure of Sensitive Information to an Unauthorized Actor in pimcore
|
Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.
|
{'CVE-2022-0565'}
|
2022-02-24T13:10:52Z
|
2022-02-15T00:02:47Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-h9vc-2p9g-63gp', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565', 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
| null |
GHSA
|
GHSA-4cfr-gjfx-fj3x
|
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
|
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
|
{'CVE-2021-40324'}
|
2021-10-13T17:27:07Z
|
2021-10-05T17:53:11Z
|
HIGH
| 0
|
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40324', 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://github.com/advisories/GHSA-4cfr-gjfx-fj3x'}
| null |
GHSA
|
GHSA-vm64-cfqx-3698
|
Code Injection in jsen
|
This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so I assume that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a Function.apply();, leading to an Arbitrary Code Execution.
|
{'CVE-2020-7777'}
|
2022-02-10T20:18:51Z
|
2022-02-10T20:18:37Z
|
HIGH
| 7.2
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-vm64-cfqx-3698', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7777'}
| null |
GHSA
|
GHSA-g7p8-r2ch-4rmf
|
Malicious Atomix node queries expose sensitive information
|
An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states.
|
{'CVE-2020-35215'}
|
2022-01-04T18:56:54Z
|
2021-12-17T20:41:45Z
|
MODERATE
| 6.5
|
{'CWE-668'}
|
{'https://docs.google.com/presentation/d/1pRRLfdSUqUZ688CZ9e9AyceuXPGp9oyGj7j4bdSsBcw/edit?usp=sharing', 'https://github.com/advisories/GHSA-g7p8-r2ch-4rmf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35215'}
| null |
GHSA
|
GHSA-qxmr-qxh6-2cc9
|
ReDos vulnerability on guest checkout email validation
|
### Impact
Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`.
Before the patch, it can be reproduced in the console like this:
```ruby
irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match "a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@"
processing time: 54.293660s
=> nil
```
To reproduce in the browser, fill in the "Customer Email" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the "Save & Continue" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources.
### Patches
Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression.
There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that:
```bash
bin/rails solidus:check_orders_with_invalid_email
```
The above will print information for every affected order if any.
### Workarounds
If a prompt upgrade is not an option, please, add the following to `config/application.rb`:
```ruby
config.after_initialize do
Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP)
Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP
end
```
### References
- https://en.wikipedia.org/wiki/ReDoS
- https://snyk.io/blog/redos-and-catastrophic-backtracking/
### For more information
If you have any questions or comments about this advisory:
* Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus.
* Email us at [security@solidus.io](mailto:security@soliidus.io)
* Contact the core team on [Slack](http://slack.solidus.io/)
|
{'CVE-2021-43805'}
|
2022-04-19T19:03:16Z
|
2021-12-07T22:01:47Z
|
HIGH
| 7.5
|
{'CWE-1333'}
|
{'https://github.com/advisories/GHSA-qxmr-qxh6-2cc9', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71', 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9'}
| null |
GHSA
|
GHSA-j7xg-5549-jr3j
|
Improper Certificate Validation in OWASP ZAP
|
OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server.
|
{'CVE-2022-27820'}
|
2022-04-05T20:53:46Z
|
2022-03-25T00:00:34Z
|
MODERATE
| 4
|
{'CWE-295'}
|
{'http://www.openwall.com/lists/oss-security/2022/03/24/3', 'https://github.com/zaproxy/zaproxy/issues/7165', 'https://github.com/zaproxy/zaproxy/releases', 'https://www.openwall.com/lists/oss-security/2022/03/23/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27820', 'https://github.com/advisories/GHSA-j7xg-5549-jr3j'}
| null |
GHSA
|
GHSA-hcw3-j74m-qc58
|
Incorrect Calculation in github.com/open-policy-agent/opa
|
### Impact
Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below.
**All of these** three conditions have to be met to create an adverse effect:
1. An AST of Rego had to be **created programmatically** such that it ends up containing terms without a location (such as wildcard variables).
2. The AST had to be **pretty-printed** using the `github.com/open-policy-agent/opa/format` package.
3. The result of the pretty-printing had to be **parsed and evaluated again** via an OPA instance using the bundles, or the Golang packages.
If any of these three conditions are not met, you are not affected.
Notably, all three would be true if using **optimized bundles**, i.e. bundles created with `opa build -O=1` or higher.
In that case, the optimizer would fulfil condition (1.), the result of that would be pretty-printed when writing the bundle to disk, fulfilling (2.). When the bundle was then used, we'd satisfy (3.).
#### Example
For example, the process outlined above could turn
this rule
```rego
hello {
["foo", _] = split(input.resource, "/")
}
```
into
```rego
hello {
[_, "foo"] = split(input.resource, "/")
}
```
with an input of
```rego
{
"resource": "foo/bar"
}
```
the result would change from
```rego
{
"hello": true
}
```
to (no default value of hello)
```rego
{}
```
The severity was determined to be *moderate* because the conditions are quite particular. Please note that its only the OPA bundle build process thats affected. An OPA sidecar of version 0.36.0 with an optimized bundle built by OPA 0.32.1 would not face this bug.
### Patches
Fixed in version 0.37.2.
### Workarounds
- Disabling optimization when creating bundles.
### References
- Introduced in https://github.com/open-policy-agent/opa/pull/3851
- Backported for the 0.33.1 patch release: https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717
- Fixed by https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239 and https://github.com/open-policy-agent/opa/commit/2bd8edab9e10e2dc9cf76ae8335ced0c224f3055
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Community Discussions](https://github.com/open-policy-agent/community/discussions/categories/opa-and-rego)
* Ask in Slack: https://slack.openpolicyagent.org/
|
{'CVE-2022-23628'}
|
2022-04-19T19:03:21Z
|
2022-02-09T22:17:37Z
|
MODERATE
| 6.3
|
{'CWE-682'}
|
{'https://github.com/advisories/GHSA-hcw3-j74m-qc58', 'https://github.com/open-policy-agent/opa/pull/3851', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239', 'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628'}
| null |
GHSA
|
GHSA-4hjg-cx88-g9f9
|
Data races in futures-intrusive
|
An issue was discovered in the futures-intrusive crate before 0.4.0 for Rust. GenericMutexGuard allows cross-thread data races of non-Sync types.
|
{'CVE-2020-35915'}
|
2021-08-25T20:49:58Z
|
2021-08-25T20:49:58Z
|
MODERATE
| 5.5
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35915', 'https://github.com/Matthias247/futures-intrusive/issues/53', 'https://rustsec.org/advisories/RUSTSEC-2020-0072.html', 'https://github.com/advisories/GHSA-4hjg-cx88-g9f9'}
| null |
GHSA
|
GHSA-7vxc-chqj-h83g
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-4168'}
|
2022-01-07T16:11:22Z
|
2022-01-06T22:02:18Z
|
MODERATE
| 6.3
|
{'CWE-352'}
|
{'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168', 'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://github.com/advisories/GHSA-7vxc-chqj-h83g'}
| null |
GHSA
|
GHSA-xp9c-82x8-7f67
|
Prototype Pollution in Node-Red
|
### Impact
Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime.
### Patches
The vulnerability is patched in the 1.2.8 release.
### Workarounds
A workaround is to ensure only authorised users are able to access the editor url.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@nodered.org](mailto:team@nodered.org)
### Acknowledgements
Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
|
{'CVE-2021-21297'}
|
2021-09-22T13:55:00Z
|
2021-02-26T16:31:05Z
|
HIGH
| 7.7
|
{'CWE-1321', 'CWE-915'}
|
{'https://github.com/advisories/GHSA-xp9c-82x8-7f67', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21297', 'https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67', 'https://www.npmjs.com/package/@node-red/runtime', 'https://www.npmjs.com/package/@node-red/editor-api'}
| null |
GHSA
|
GHSA-qjmq-8hjr-qcv6
|
SQL Injection when creating an application with Reactive SQL backend
|
### Impact
SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected.
If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default.
Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria.
## Impacted applications
- Monolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities)
- Gateway applications with SQL database (issue will appear only when generating entities)
### Patches
Patched in v7.8.1
The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications.
If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions.
### Workarounds
The problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`.
`just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL
So be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`.
### Example
```java
Criteria criteria = Criteria.where("name").is("foobar';DROP TABLE example;--"); // parameter is user provided input
criteria.toString(); // --> "'foobar';DROP TABLE example;--'"
```
### References
[More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
|
{'CVE-2022-24815'}
|
2022-04-18T22:20:12Z
|
2022-04-07T15:18:05Z
|
HIGH
| 8.1
|
{'CWE-89'}
|
{'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6', 'https://github.com/jhipster/generator-jhipster/issues/18269', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815', 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98', 'https://github.com/advisories/GHSA-qjmq-8hjr-qcv6'}
| null |
GHSA
|
GHSA-7xwj-5r4v-429p
|
NPE in TFLite
|
### Impact
The implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313):
```cc
TfLiteTensor* state = GetVariableInput(context, node, kStateTensor);
// ...
GetTensorData<float>(state)
```
The [`GetVariableInput` function](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L115-L119) can return a null pointer but `GetTensorData` assumes that the argument is always a valid tensor.
```cc
TfLiteTensor* GetVariableInput(TfLiteContext* context, const TfLiteNode* node,
int index) {
TfLiteTensor* tensor = GetMutableInput(context, node, index);
return tensor->is_variable ? tensor : nullptr;
}
```
Furthermore, because `GetVariableInput` calls [`GetMutableInput`](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L82-L90) which might return `nullptr`, the `tensor->is_variable` expression can also trigger a null pointer exception.
### Patches
We have patched the issue in GitHub commit [5b048e87e4e55990dae6b547add4dae59f4e1c76](https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37681'}
|
2021-08-25T14:40:35Z
|
2021-08-25T14:40:35Z
|
HIGH
| 7.8
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37681', 'https://github.com/advisories/GHSA-7xwj-5r4v-429p', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p'}
| null |
GHSA
|
GHSA-xhfx-hgmf-v6vp
|
Potential Host Header Poisoning on misconfigured servers
|
### Impact
When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Poisoning:
- https://portswigger.net/web-security/host-header
- https://dzone.com/articles/what-is-a-host-header-attack
### Patches
A feature has been added in v1.1.2 to allow a set of trusted hosts to be specified in the application.
### Workarounds
- Apply https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6 & https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0 to your installation manually if unable to upgrade to v1.1.2.
- Check that the configuration setting `cms.linkPolicy` is set to `force`.
### Alternative Workaround
Check to make sure that your web server does not accept any hostname when serving your web application.
1. Add an entry called `testing.tld` to your computer's host file and direct it to your server's IP address
2. Open the address `testing.tld` in your web browser
3. Make sure an October CMS website is not available at this address
If an October CMS website is returned, configure your webserver to only allow known hostnames. If you require assistance with this, please contact your server administrator.
### References
Reported by [Abdullah Hussam](https://github.com/ahussam)
### For More Information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat Assessment
<img width="1108" alt="Screen Shot 2021-01-15 at 4 12 57 PM" src="https://user-images.githubusercontent.com/7253840/104783859-92fb3600-574c-11eb-9e21-c0dc05d230a9.png">
|
{'CVE-2021-21265'}
|
2021-03-11T02:18:01Z
|
2021-03-10T21:07:25Z
|
LOW
| 0
|
{'CWE-644'}
|
{'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/advisories/GHSA-xhfx-hgmf-v6vp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp', 'https://packagist.org/packages/october/backend'}
| null |
GHSA
|
GHSA-8gwj-8hxc-285w
|
Prototype Pollution in json-ptr
|
This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
|
{'CVE-2021-23509'}
|
2021-11-08T17:43:27Z
|
2021-11-08T17:43:27Z
|
MODERATE
| 5.6
|
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/advisories/GHSA-8gwj-8hxc-285w', 'https://github.com/flitbit/json-ptr/pull/42', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509', 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291', 'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved'}
| null |
GHSA
|
GHSA-g2q5-5433-rhrf
|
Embedded malware in rc
|
The npm package `rc` had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-11-04T18:47:01Z
|
2021-11-04T16:24:44Z
|
CRITICAL
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/package/rc', 'https://github.com/dominictarr/rc', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/advisories/GHSA-g2q5-5433-rhrf'}
| null |
GHSA
|
GHSA-58f5-hfqc-jgch
|
Padding Oracle Attack due to Observable Timing Discrepancy in jose
|
jose is an npm library providing a number of cryptographic operations.
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`.
Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4)
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
|
{'CVE-2021-29443'}
|
2021-04-19T18:27:27Z
|
2021-04-19T14:57:22Z
|
MODERATE
| 5.9
|
{'CWE-696', 'CWE-203'}
|
{'https://www.npmjs.com/package/jose', 'https://github.com/advisories/GHSA-58f5-hfqc-jgch', 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}
| null |
GHSA
|
GHSA-hpqh-2wqx-7qp5
|
Memory access due to code generation flaw in Cranelift module
|
There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0.73.1 or 0.74 if they were not using the old default backend.
### Description
This bug was introduced in the new backend on 2020-09-08 and first included in a release on 2020-09-30, but the new backend was not the default prior to 0.73.0. The recently-released version 0.73.0 with default settings, and prior versions with an explicit build flag to select the new backend, are vulnerable. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, under a specific set of circumstances. If those circumstances occur, the bug could allow access to memory addresses up to 2GiB before the start of the heap allocated for the WebAssembly module.
If the heap bound is larger than 2GiB, then it would be possible to read memory from a computable range dependent on the size of the heap's bound.
The impact of this bug is highly dependent on heap implementation; specifically:
* if the heap has bounds checks, and
* does not rely exclusively on guard pages, and
* the heap bound is 2GiB or smaller
then this bug cannot be used to reach memory from another WebAssembly module heap.
The impact of the vulnerability is mitigated if there is no memory mapped in the range accessible using this bug, for example, if there is a 2 GiB guard region before the WebAssembly module heap.
The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack when the register allocator reloads a spilled integer value narrower than 64 bits. This interacts poorly with another optimization: the instruction selector elides a 32-to-64-bit zero-extend operator when we know that an instruction producing a 32-bit value actually zeros the upper 32 bits of its destination register. Hence, we rely on these zeroed bits, but the type of the value is still i32, and the spill/reload reconstitutes those bits as the sign extension of the i32’s MSB.
The issue would thus occur when:
* An i32 value is greater than or equal to 0x8000_0000;
* The value is spilled and reloaded by the register allocator due to high register pressure in the program between the value’s definition and its use;
* The value is produced by an instruction that we know to be "special" in that it zeroes the upper 32 bits of its destination: add, sub, mul, and, or;
* The value is then zero-extended to 64 bits;
* The resulting 64-bit value is used.
Under these circumstances there is a potential sandbox escape when the i32 value is a pointer. The usual code emitted for heap accesses zero-extends the WebAssembly heap address, adds it to a 64-bit heap base, and accesses the resulting address. If the zero-extend becomes a sign-extend, the module could reach backward and access memory up to 2GiB before the start of its heap.
This bug was identified by developers at Fastly following a report from Javier Cabrera Arteaga, KTH Royal Institute of Technology, with support from project Trustful of Stiftelsen för Strategisk Forskning. In addition to supporting the analysis and remediation of this vulnerability, Fastly will publish a related Fastly Security Advisory at [https://www.fastly.com/security-advisories](https://www.fastly.com/security-advisories).
In addition to assessing the nature of the code generation bug in Cranelift, we have also determined that under specific circumstances, both Lucet and Wasmtime using this version of Cranelift may be exploitable.
### General Impact to Lucet
Lucet inherits the heap address computation and bounds-checks of Cranelift, which it uses as its backend code generator. Of particular importance specifically is the address-space layout used by Lucet. In the default configuration for Lucet, only a single module is running, and therefore it is not possible to access memory from another module.
By default, the open source implementation of Lucet uses a maximum heap size of 4 GiB, and an instance slot size of 8 GiB, when invoking an instance from the lucet-wasi command-line tool. These settings are within the range of vulnerability described above, but only a single instance is running, so there is no other instance to read. When embedding the runtime (for example, in a long-running daemon), the default for the heap size as described in the source is 1MB; with this setting, the runtime is not vulnerable.
Lucet allocates its WebAssembly module instances into "instance slots", which are contiguous zones of virtual address space that contain the VM context at the bottom, the WebAssembly heap in the next page after that, a guard region in the middle, and other data at the top: the stack and the globals.
If the instance slot size is less than (max heap) + 2GiB, then the lowest accessible address using the bug will overlap with the prior instance’s heap. If the size of VM context + stack + globals is greater than (4GiB - heap limit), then the highest accessible address using the bug will overlap with this critical data. If neither of these conditions are true, the bug should only result in an access to the prior instance’s guard region.
Generally, if the limit is between 2GiB and 4GiB - ~1MB (depending on stack/global size) and the instance slot size is less than 6GiB, the configuration is vulnerable. If the limit is greater than 4GiB - ~1MB, the configuration is vulnerable regardless of instance slot size. Otherwise, the configuration is not vulnerable.
### General Impact on Wasmtime
In Wasmtime, the same Cranelift heap address computations and heap types are used as above. The memory layout, however, is slightly different, with different outcomes:
* With the mmap implementation impact is mitigated probabilistically if ASLR is enabled.
* With the pooling allocator, the vulnerability only exists if a memory reservation size lower than the default of 6GB is used.
With the default mmap-based instance memory implementation, Wasmtime uses mmap() to allocate a block of memory large enough for the heap and guard region, as specified in its configuration. If the underlying OS implements ASLR (modern Linux, macOS and Windows do) then this address will be randomized, and the region below it will (probabilistically) be free. Hence, the bug is mitigated probabilistically in the default configuration if ASLR is enabled.
If using the pooling allocator, the vulnerability exists if instance memory size (`memory_reservation_size` in InstanceLimit) is strictly less than 6GiB (4 GiB + 2 GiB of guard pages). The default is 6GiB, so the vulnerability is masked in the default pooling allocator configuration.
|
{'CVE-2021-32629'}
|
2022-04-26T18:11:38Z
|
2021-08-25T21:01:55Z
|
HIGH
| 7.2
|
{'CWE-125'}
|
{'https://github.com/RustSec/advisory-db/blob/main/crates/cranelift-codegen/RUSTSEC-2021-0067.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32629', 'https://github.com/advisories/GHSA-hpqh-2wqx-7qp5', 'https://www.fastly.com/security-advisories/memory-access-due-to-code-generation-flaw-in-cranelift-module', 'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0', 'https://crates.io/crates/cranelift-codegen', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5'}
| null |
GHSA
|
GHSA-7f53-fmmv-mfjv
|
Regular expression denial of service in react-native
|
A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.
|
{'CVE-2020-1920'}
|
2021-07-20T17:35:28Z
|
2021-07-20T17:33:28Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://securitylab.github.com/advisories/GHSL-2020-293-redos-react-native/', 'https://github.com/advisories/GHSA-7f53-fmmv-mfjv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920', 'https://github.com/facebook/react-native/releases/tag/v0.64.1', 'https://github.com/facebook/react-native/releases/tag/v0.62.3', 'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7', 'https://www.npmjs.com/package/react-native'}
| null |
GHSA
|
GHSA-2r2c-g63r-vccr
|
Improper Verification of Cryptographic Signature in `node-forge`
|
### Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at [example email address](mailto:security@digitalbazaar.com)
|
{'CVE-2022-24773'}
|
2022-03-22T19:33:03Z
|
2022-03-18T23:10:48Z
|
MODERATE
| 5.3
|
{'CWE-347'}
|
{'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr', 'https://github.com/advisories/GHSA-2r2c-g63r-vccr'}
| null |
GHSA
|
GHSA-7534-mm45-c74v
|
Buffer Overflow in Pillow
|
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
|
{'CVE-2021-34552'}
|
2022-03-22T22:28:38Z
|
2021-10-05T20:24:41Z
|
CRITICAL
| 9.8
|
{'CWE-120'}
|
{'https://github.com/advisories/GHSA-7534-mm45-c74v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34552', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://github.com/python-pillow/Pillow/pull/5567', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/'}
| null |
GHSA
|
GHSA-f6hm-88x3-mfjv
|
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
|
### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21349](https://x-stream.github.io/CVE-2021-21349.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21349'}
|
2022-02-08T21:32:21Z
|
2021-03-22T23:29:19Z
|
MODERATE
| 6.1
|
{'CWE-502', 'CWE-918'}
|
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21349', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://github.com/advisories/GHSA-f6hm-88x3-mfjv', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-21349.html'}
| null |
GHSA
|
GHSA-9chx-2vqw-8vq5
|
Path Traversal in the Logs plugin for Craft CMS
|
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
|
{'CVE-2022-23409'}
|
2022-02-10T22:32:15Z
|
2022-02-01T00:01:00Z
|
MODERATE
| 4.9
|
{'CWE-22'}
|
{'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html', 'https://plugins.craftcms.com/logs', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/advisories/GHSA-9chx-2vqw-8vq5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://sec-consult.com/vulnerability-lab/'}
| null |
GHSA
|
GHSA-4446-656p-f54g
|
Deserialization of Untrusted Data in Bouncy castle
|
Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later.
|
{'CVE-2018-1000613'}
|
2022-04-27T17:25:45Z
|
2018-10-17T16:23:12Z
|
CRITICAL
| 9.8
|
{'CWE-470', 'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-4446-656p-f54g', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190204-0003/', 'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html'}
| null |
GHSA
|
GHSA-wg6g-ppvx-927h
|
Prototype Pollution in cached-path-relative
|
The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573
|
{'CVE-2021-23518'}
|
2022-01-27T14:27:53Z
|
2022-01-27T14:27:53Z
|
HIGH
| 7.3
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23518', 'https://github.com/advisories/GHSA-wg6g-ppvx-927h', 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'}
| null |
GHSA
|
GHSA-3gh2-xw74-jmcw
|
SQL injection in Django
|
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
|
{'CVE-2020-9402'}
|
2021-08-25T21:54:33Z
|
2020-06-05T14:52:07Z
|
HIGH
| 8.8
|
{'CWE-89'}
|
{'https://security.gentoo.org/glsa/202004-17', 'https://usn.ubuntu.com/4296-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://www.djangoproject.com/weblog/2020/mar/04/security-releases/', 'https://www.debian.org/security/2020/dsa-4705', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9402', 'https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY', 'https://github.com/advisories/GHSA-3gh2-xw74-jmcw', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://security.netapp.com/advisory/ntap-20200327-0004/'}
| null |
GHSA
|
GHSA-4gr7-qw2q-jxh6
|
Cross-site Scripting in Nacos
|
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
|
{'CVE-2021-44667'}
|
2022-03-22T21:37:09Z
|
2022-03-12T00:00:27Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-4gr7-qw2q-jxh6', 'https://github.com/alibaba/nacos/issues/7359', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667'}
| null |
GHSA
|
GHSA-mpjf-8cmf-p789
|
Cross-Site Scripting in jingo
|
Versions of `jingo` prior to 1.9.2 are vulnerable to Cross-Site Scripting (XSS). If malicious input such as `<script>alert(1)</script>` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text.
## Recommendation
Upgrade to version 1.9.2
| null |
2021-09-27T13:33:39Z
|
2020-09-01T21:25:46Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mpjf-8cmf-p789', 'https://www.npmjs.com/advisories/750'}
| null |
GHSA
|
GHSA-wrp6-9w7f-3wxg
|
calibre-web is vulnerable to Cross-site Scripting
|
calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4170'}
|
2022-01-21T23:55:34Z
|
2022-01-21T23:55:34Z
|
HIGH
| 7.3
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4170', 'https://github.com/advisories/GHSA-wrp6-9w7f-3wxg', 'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5', 'https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0'}
| null |
GHSA
|
GHSA-j79j-cx3h-g27h
|
Out of bounds write in traitobject
|
An issue was discovered in the traitobject crate through 2020-06-01 for Rust. It has false expectations about fat pointers, possibly causing memory corruption in, for example, Rust 2.x.
|
{'CVE-2020-35881'}
|
2021-08-25T20:48:02Z
|
2021-08-25T20:48:02Z
|
CRITICAL
| 9.8
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35881', 'https://github.com/advisories/GHSA-j79j-cx3h-g27h', 'https://github.com/reem/rust-traitobject/issues/7', 'https://rustsec.org/advisories/RUSTSEC-2020-0027.html'}
| null |
GHSA
|
GHSA-mcrf-7hf9-f6q5
|
Unchecked vector pre-allocation
|
Affected versions of this crate pre-allocate memory on deserializing raw
buffers without checking whether there is sufficient data available.
This allows an attacker to do denial-of-service attacks by sending small
msgpack messages that allocate gigabytes of memory.
| null |
2021-08-25T21:00:09Z
|
2021-08-25T21:00:09Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-mcrf-7hf9-f6q5', 'https://rustsec.org/advisories/RUSTSEC-2017-0006.html', 'https://github.com/3Hren/msgpack-rust/issues/151'}
| null |
GHSA
|
GHSA-cw7p-q79f-m2v7
|
incomplete JupyterHub logout with simultaneous JupyterLab sessions
|
### Impact
Users of JupyterLab with JupyterHub who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place.
### Patches
Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment.
### Workarounds
The only workaround is to make sure that only one JupyterLab tab is open when you log out.
|
{'CVE-2021-41247'}
|
2022-04-19T19:03:13Z
|
2021-11-08T18:02:37Z
|
LOW
| 3.5
|
{'CWE-613'}
|
{'https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41247', 'https://github.com/advisories/GHSA-cw7p-q79f-m2v7', 'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'}
| null |
GHSA
|
GHSA-h87q-g2wp-47pj
|
Signatures are mistakenly recognized to be valid in jsrsasign
|
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
| null |
2022-02-09T22:41:37Z
|
2022-02-09T22:41:19Z
|
MODERATE
| 0
|
{'CWE-347'}
|
{'https://github.com/kjur/jsrsasign/releases/tag/10.2.0', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://github.com/advisories/GHSA-h87q-g2wp-47pj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://github.com/kjur/jsrsasign/issues/478'}
| null |
GHSA
|
GHSA-77pw-c3j2-5fc8
|
Plaintext password leak in Apache Superset
|
In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2.
|
{'CVE-2020-13952'}
|
2021-04-30T17:34:03Z
|
2021-04-30T17:34:03Z
|
HIGH
| 8.1
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-77pw-c3j2-5fc8', 'https://lists.apache.org/thread.html/rf1faa368f580d2cb691576bee1277855f769667f3114d5df1dacbea6%40%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13952'}
| null |
GHSA
|
GHSA-hvf8-h2qh-37m9
|
IPC messages delivered to the wrong frame in Electron
|
### Impact
IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame.
If your app does ANY of the following, then it is impacted by this issue:
- Uses `remote`
- Calls `webContents.sendToFrame`
- Calls `event.reply` in an IPC message handler
### Patches
This has been fixed in the following versions:
- 9.4.0
- 10.2.0
- 11.1.0
- 12.0.0-beta.9
### Workarounds
There are no workarounds for this issue.
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
|
{'CVE-2020-26272'}
|
2022-04-19T19:02:42Z
|
2021-01-28T19:11:34Z
|
MODERATE
| 5.4
|
{'CWE-668'}
|
{'https://github.com/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/pull/26875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26272', 'https://www.electronjs.org/releases/stable?version=9#9.4.0', 'https://github.com/electron/electron/releases/tag/v9.4.0', 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'}
| null |
GHSA
|
GHSA-224h-p7p5-rh85
|
Directory Traversal in wenluhong1
|
Affected versions of `wenluhong1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2021-09-23T21:43:30Z
|
2020-09-01T17:32:26Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/409', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wenluhong1', 'https://github.com/advisories/GHSA-224h-p7p5-rh85', 'https://snyk.io/vuln/npm:wenluhong1:20170509'}
| null |
GHSA
|
GHSA-42fp-4hm3-j8r7
|
Moderate severity vulnerability that affects moin
|
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
{'CVE-2017-5934'}
|
2021-08-31T21:37:19Z
|
2019-01-04T17:46:08Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html', 'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html', 'http://moinmo.in/SecurityFixes', 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024', 'https://www.debian.org/security/2018/dsa-4318', 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934', 'https://usn.ubuntu.com/3794-1/'}
| null |
GHSA
|
GHSA-g556-x5vx-qh59
|
Moderate severity vulnerability that affects com.caverock:androidsvg
|
AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution
|
{'CVE-2017-1000498'}
|
2021-09-10T20:26:22Z
|
2018-10-19T16:50:33Z
|
HIGH
| 7.8
|
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000498', 'https://github.com/BigBadaboom/androidsvg/issues/122', 'https://github.com/advisories/GHSA-g556-x5vx-qh59'}
| null |
GHSA
|
GHSA-fvfc-8pqr-wjpv
|
Missing Authorization in Jenkins S3 publisher Plugin
|
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.
|
{'CVE-2021-21650'}
|
2021-06-16T17:29:08Z
|
2021-06-16T17:29:08Z
|
MODERATE
| 4.3
|
{'CWE-862'}
|
{'https://github.com/advisories/GHSA-fvfc-8pqr-wjpv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21650', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2200'}
| null |
GHSA
|
GHSA-x27v-x225-gq8g
|
Server-Side Request Forgery in Recurly
|
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
|
{'CVE-2017-0905'}
|
2021-12-01T21:50:52Z
|
2017-12-06T16:43:00Z
|
CRITICAL
| 9.8
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-x27v-x225-gq8g', 'https://hackerone.com/reports/288635', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://dev.recurly.com/page/ruby-updates'}
| null |
GHSA
|
GHSA-rv95-4wxj-6fqq
|
Low severity vulnerability that affects colander
|
In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis.
|
{'CVE-2017-18361'}
|
2021-09-17T20:46:05Z
|
2019-02-07T18:18:22Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://github.com/Pylons/colander/issues/290', 'https://github.com/Pylons/colander/pull/323', 'https://github.com/advisories/GHSA-rv95-4wxj-6fqq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18361'}
| null |
GHSA
|
GHSA-hh27-ffr2-f2jc
|
Open redirect in url-parse
|
# Overview
Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.
# Impact
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
|
{'CVE-2021-3664'}
|
2021-08-10T16:07:08Z
|
2021-08-10T16:07:08Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0', 'https://github.com/unshiftio/url-parse/issues/205', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3664', 'https://github.com/unshiftio/url-parse/issues/206', 'https://github.com/advisories/GHSA-hh27-ffr2-f2jc', 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse'}
| null |
GHSA
|
GHSA-r28v-mw67-m5p9
|
Moderate severity vulnerability that affects django
|
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
|
{'CVE-2018-7536'}
|
2021-08-31T21:17:02Z
|
2019-01-04T17:50:07Z
|
MODERATE
| 5.3
|
{'CWE-185'}
|
{'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'http://www.securityfocus.com/bid/103361', 'https://access.redhat.com/errata/RHSA-2019:0051', 'https://access.redhat.com/errata/RHSA-2019:0082', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536', 'https://github.com/advisories/GHSA-r28v-mw67-m5p9', 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://usn.ubuntu.com/3591-1/', 'https://access.redhat.com/errata/RHSA-2019:0265'}
| null |
GHSA
|
GHSA-7chv-rrw6-w6fc
|
XStream is vulnerable to a Remote Command Execution attack
|
### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.17.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-29505](https://x-stream.github.io/CVE-2021-29505.html).
### Credits
V3geB1rd, white hat hacker from Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-29505'}
|
2022-04-22T15:48:50Z
|
2021-05-18T18:36:27Z
|
HIGH
| 7.5
|
{'CWE-94', 'CWE-74', 'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-29505.html', 'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://github.com/advisories/GHSA-7chv-rrw6-w6fc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://security.netapp.com/advisory/ntap-20210708-0007/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc', 'https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E'}
| null |
GHSA
|
GHSA-frxg-hf44-q765
|
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp
|
### Impact
Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server is owned and operated by DisCatSharp's development team. The tokens were not logged, yet it is still advisable to reset the tokens of potentially affected bots.
### Patches
9.9.1 has been released to patch the issue for the current stable release and the current 10.0.0 prereleases are also no longer affected.
### Workarounds
Remove all uses of the two `RequireDisCatSharpDeveloperAttribute`s and all direct calls to `BaseDiscordClient.LibraryDeveloperTeam`.
### Details
The `HttpClient` responsible for sending requests to the Discord API was erroneously reused to send requests to our website when DisCatSharp's team members were to be fetched.
### For more information
If you have any questions or comments about this advisory:
* Join our [Discord server](https://discord.gg/GGYSywkxwN)
* Email us at [ottero@aitsys.dev](mailto:ottero@aitsys.dev)
|
{'CVE-2022-24849'}
|
2022-04-22T20:39:48Z
|
2022-04-22T20:39:47Z
|
MODERATE
| 6.5
|
{'CWE-200'}
|
{'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849', 'https://github.com/advisories/GHSA-frxg-hf44-q765'}
| null |
GHSA
|
GHSA-mx7p-6679-8g3q
|
Polymorphic Typing in FasterXML jackson-databind
|
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
|
{'CVE-2019-16942'}
|
2021-06-15T17:11:27Z
|
2019-10-28T20:51:15Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/7782a937c9259a58337ee36b2961f00e2d744feafc13084e176d0df5@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/b2e23c94f9dfef53e04c492e5d02e5c75201734be7adc73a49ef2370@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/a430dbc9be874c41314cc69e697384567a9a24025e819d9485547954@%3Cissues.geode.apache.org%3E', 'https://issues.apache.org/jira/browse/GEODE-7255', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-mx7p-6679-8g3q', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2478', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16942', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164'}
| null |
GHSA
|
GHSA-6fjr-m7v6-fpg9
|
Exfiltrates data on installation in jquey
|
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `jquey` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16204'}
|
2021-01-08T19:45:25Z
|
2018-08-06T21:41:38Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9', 'https://www.npmjs.com/advisories/544', 'https://nodesecurity.io/advisories/544', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16204'}
| null |
GHSA
|
GHSA-r24h-634p-m72x
|
Validation Bypass in schema-inspector
|
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
|
{'CVE-2019-10781'}
|
2021-08-30T13:35:23Z
|
2020-06-10T20:02:47Z
|
CRITICAL
| 9.8
|
{'CWE-668'}
|
{'https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10781', 'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d', 'https://github.com/advisories/GHSA-r24h-634p-m72x'}
| null |
GHSA
|
GHSA-gqcf-83rq-gpfr
|
Any storage file can be downloaded from p.sh if full server path is known
|
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
| null |
2021-09-14T20:24:44Z
|
2021-09-14T20:24:44Z
|
HIGH
| 0
|
{'CWE-200'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known', 'https://github.com/ibexa/post-install/security/advisories/GHSA-gqcf-83rq-gpfr', 'https://github.com/advisories/GHSA-gqcf-83rq-gpfr'}
| null |
GHSA
|
GHSA-cmx4-p4v5-hmr5
|
Server-side request forgery (SSRF) in Apache Batik
|
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
|
{'CVE-2019-17566'}
|
2022-02-09T00:46:46Z
|
2022-02-09T00:46:46Z
|
HIGH
| 7.5
|
{'CWE-20', 'CWE-918'}
|
{'https://lists.apache.org/thread.html/rab94fe68b180d2e2fba97abf6fe1ec83cff826be25f86cd90f047171@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-cmx4-p4v5-hmr5', 'https://lists.apache.org/thread.html/rcab14a9ec91aa4c151e0729966282920423eff50a22759fd21db6509@%3Ccommits.myfaces.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17566', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-rj5f-7c8x-gjg4
|
Prototype Pollution in promisehelpers
|
All versions of package promisehelpers up to and including version 0.0.5 are vulnerable to Prototype Pollution via the insert function.
|
{'CVE-2020-7723'}
|
2021-07-29T22:08:52Z
|
2021-05-06T18:26:07Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7723', 'https://github.com/advisories/GHSA-rj5f-7c8x-gjg4', 'https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686'}
| null |
GHSA
|
GHSA-p69g-f978-xxv9
|
Moderate severity vulnerability that affects luigi
|
Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
|
{'CVE-2018-1000843'}
|
2021-09-15T21:55:41Z
|
2018-12-20T22:01:39Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-p69g-f978-xxv9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000843', 'https://groups.google.com/forum/#!topic/luigi-user/ZgfRTpBsVUY', 'https://github.com/spotify/luigi/pull/1870', 'https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67'}
| null |
GHSA
|
GHSA-2wmv-37vq-52g5
|
FPE in `tf.raw_ops.UnravelIndex`
|
### Impact
An attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0:
```python
import tensorflow as tf
tf.raw_ops.UnravelIndex(indices=-1, dims=[1,0,2])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unravel_index_op.cc#L36) does not check that the tensor subsumed by `dims` is not empty. Hence, if one element of `dims` is 0, the implementation does a division by 0.
### Patches
We have patched the issue in GitHub commit [a776040a5e7ebf76eeb7eb923bf1ae417dd4d233](https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37668'}
|
2021-08-25T14:42:06Z
|
2021-08-25T14:42:06Z
|
MODERATE
| 5.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5', 'https://github.com/advisories/GHSA-2wmv-37vq-52g5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37668', 'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'}
| null |
GHSA
|
GHSA-8hfj-j24r-96c4
|
Path Traversal: 'dir/../../filename' in moment.locale
|
### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarounds
Sanitize user-provided locale name before passing it to moment.js.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [moment repo](https://github.com/moment/moment)
|
{'CVE-2022-24785'}
|
2022-04-26T20:56:20Z
|
2022-04-04T21:25:48Z
|
HIGH
| 7.5
|
{'CWE-27', 'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-8hfj-j24r-96c4'}
| null |
GHSA
|
GHSA-49pj-69vf-c689
|
Incorrect Default Permissions in netaddr
|
The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
|
{'CVE-2019-17383'}
|
2021-08-18T21:45:01Z
|
2019-10-14T21:43:19Z
|
CRITICAL
| 9.8
|
{'CWE-276'}
|
{'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://github.com/advisories/GHSA-49pj-69vf-c689', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17383', 'https://rubygems.org/gems/netaddr/versions'}
| null |
GHSA
|
GHSA-4jhc-wjr3-pwh2
|
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node.
|
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
|
{'CVE-2020-35211'}
|
2022-01-04T18:59:32Z
|
2021-12-17T20:40:38Z
|
HIGH
| 7.5
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35211', 'https://github.com/advisories/GHSA-4jhc-wjr3-pwh2', 'https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing'}
| null |
GHSA
|
GHSA-rrvg-2c69-p9rf
|
Cross-Site Request Forgery in Jenkins Xray
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
{'CVE-2021-21652'}
|
2021-06-16T17:28:58Z
|
2021-06-16T17:28:58Z
|
HIGH
| 7.1
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-rrvg-2c69-p9rf', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21652'}
| null |
GHSA
|
GHSA-2jx8-v4hv-gx3h
|
XXE vulnerability in Launch import
|
| Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk |
|--------------|-------------------|-------------------|---------------|---------------|
| Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium |
### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser.
We advise our users install the latest releases we built specifically to address this issue.
### Patches
Fixed with https://github.com/reportportal/service-api/pull/1201
### Binary Download
https://bintray.com/epam/reportportal/service-api/5.1.1
https://bintray.com/epam/reportportal/service-api/4.3.12
### Docker Container Download
* RP v4: `docker pull reportportal/service-api:4.3.12`
* RP v5: `docker pull reportportal/service-api:5.1.1`
### Acknowledgement
The issue was reported to Report Portal Team by an external security researcher.
Our Team thanks Julien M. for reporting the issue.
### For more information
If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
|
{'CVE-2020-12642'}
|
2021-10-05T17:29:41Z
|
2021-06-28T16:45:47Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'}
| null |
GHSA
|
GHSA-gh4g-3gm9-5wrq
|
Cross-Site Scripting in shave
|
Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to version 2.5.3 or later.
|
{'CVE-2019-12313'}
|
2021-08-04T16:06:35Z
|
2019-05-29T18:38:08Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313', 'https://www.npmjs.com/advisories/822', 'https://github.com/dollarshaveclub/shave/compare/852b537...da7371b', 'https://github.com/advisories/GHSA-gh4g-3gm9-5wrq'}
| null |
GHSA
|
GHSA-rr8m-29g8-8cgc
|
SQL Injection in Fork CMS
|
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
|
{'CVE-2022-1064'}
|
2022-04-05T20:55:35Z
|
2022-03-26T00:00:32Z
|
HIGH
| 8.8
|
{'CWE-89'}
|
{'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/advisories/GHSA-rr8m-29g8-8cgc'}
| null |
GHSA
|
GHSA-38w8-h222-wrpp
|
Improper Restriction of XML External Entity Reference in Jenkins Chef Sinatra
|
Jenkins Chef Sinatra Plugin 1.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
{'CVE-2022-25209'}
|
2022-02-24T13:54:41Z
|
2022-02-16T00:01:14Z
|
HIGH
| 8.8
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-38w8-h222-wrpp', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25209'}
| null |
GHSA
|
GHSA-f9cm-qmx5-m98h
|
Prototype Pollution in merge
|
Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype.
## Recommendation
Update to version 1.2.1 or later.
|
{'CVE-2018-16469'}
|
2021-01-08T18:53:33Z
|
2018-11-01T14:45:42Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/722', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469', 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h', 'https://hackerone.com/reports/381194'}
| null |
GHSA
|
GHSA-jqj4-r483-4gvr
|
Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13
|
Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-25027
| null |
2021-10-08T21:24:02Z
|
2021-04-19T14:48:51Z
|
MODERATE
| 6.1
|
{'CWE-81'}
|
{'https://github.com/advisories/GHSA-jqj4-r483-4gvr', 'https://vaadin.com/security/cve-2019-25027', 'https://github.com/vaadin/platform/security/advisories/GHSA-jqj4-r483-4gvr'}
| null |
GHSA
|
GHSA-2xhg-w2g5-w95x
|
CSV Injection in symfony/serializer
|
Description
-----------
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker.
In Symfony 4.1, we've added the opt-in `csv_escape_formulas` option in `CsvEncoder`, to prefix all cells starting by `=`, `+`, `-` or `@` by a tab `\t`.
Since then, OWASP added 2 chars in that list:
- Tab (0x09)
- Carriage return (0x0D)
This makes our previous prefix char (Tab `\t`) part of the vulnerable characters, and [OWASP suggests](https://owasp.org/www-community/attacks/CSV_Injection) using the single quote `'` for prefixing the value.
Resolution
----------
Symfony now follows the OWASP recommendations and use the single quote `'` to prefix formulas and adds the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8) for branch 4.4.
Credits
-------
We would like to thank Jake Barwell for reporting the issue and Jérémy Derussé for fixing the issue.
|
{'CVE-2021-41270'}
|
2022-04-19T19:03:15Z
|
2021-11-24T21:01:23Z
|
MODERATE
| 6.5
|
{'CWE-1236'}
|
{'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/pull/44243', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/'}
| null |
GHSA
|
GHSA-273r-rm8g-7f3x
|
Uncaught Exception in mercurius
|
### Impact
Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler.
### Patches
The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2.
### Workarounds
Use a custom error handler.
### References
See https://github.com/mercurius-js/mercurius/issues/677
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/mercurius-js/mercurius
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
|
{'CVE-2021-43801'}
|
2021-12-14T15:26:38Z
|
2021-12-13T21:33:04Z
|
HIGH
| 7.5
|
{'CWE-754'}
|
{'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801', 'https://github.com/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/mercurius-js/mercurius/issues/677', 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}
| null |
GHSA
|
GHSA-x7g2-wrrp-r6h3
|
Use of a Broken or Risky Cryptographic Algorithm
|
## ✍️ Description
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control
## 🕵️♂️ Proof of Concept
Numerous examples and attack implementations can be found in this paper . If you're looking for a practical tool that can crack your mt_rand implementation's seed value, see this project and run the following commands in a console with php5 and OpenWall's tool installed:
`root$ php -r 'mt_srand(13333337); echo mt_rand( ), "\n";'`
After that, copy the output (1863134308) and execute the following commands:
`root$ gcc php_mt_seed.c -o php_mt_seedroot$ ./php_mt_seed 1863134308`
After waiting ~1 minute you should have a few possible seeds corresponding to their PHP versions, next to your installed PHP version you should see something akin to:
seed = 0x00cb7359 = 13333337 (PHP 7.1.0+)
Hey, that's your seed!
## 💥 Impact
An attacker could takeover accounts at random by enumerating and using access tokens.
## 📝 References
- https://openwall.com/php_mt_seedhttps://crypto.di.uoa.gr/CRYPTO.SEC/Randomness_Attacks_files/paper.pdf
- https://github.com/mautic/mautic/blob/5213e320b4ef4d0c51bb84c1d46a1071e8e4f7fc/app/bundles/PointBundle/Controller/TriggerController.php#L187
- https://github.com/mautic/mautic/releases/tag/3.3.4
- https://github.com/mautic/mautic/releases/tag/4.0.0
|
{'CVE-2021-27913'}
|
2022-04-19T19:03:06Z
|
2021-09-01T18:41:06Z
|
LOW
| 3.5
|
{'CWE-327'}
|
{'https://github.com/advisories/GHSA-x7g2-wrrp-r6h3', 'https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27913'}
| null |
GHSA
|
GHSA-rf3w-29h3-r636
|
Arbitrary Code Execution in feehi/cms
|
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
|
{'CVE-2020-21322'}
|
2021-09-29T18:02:51Z
|
2021-09-20T20:45:35Z
|
HIGH
| 0
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-rf3w-29h3-r636', 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms/issues/44', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322'}
| null |
GHSA
|
GHSA-vxr4-rxw7-g7v6
|
Prototype Pollution in comb.
|
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.
|
{'CVE-2021-23561'}
|
2021-12-16T14:30:56Z
|
2021-12-16T14:30:56Z
|
MODERATE
| 6.5
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-COMB-1730083', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23561', 'https://github.com/advisories/GHSA-vxr4-rxw7-g7v6'}
| null |
GHSA
|
GHSA-vf4q-8mr7-5c5c
|
Camel-castor component in Apache Camel is vulnerable to Java object de-serialisation
|
The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
|
{'CVE-2017-12634'}
|
2022-04-26T19:18:09Z
|
2018-10-16T23:05:58Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'http://camel.apache.org/security-advisories.data/CVE-2017-12634.txt.asc', 'https://issues.apache.org/jira/browse/CAMEL-11929', 'http://www.securityfocus.com/bid/101876', 'https://github.com/advisories/GHSA-vf4q-8mr7-5c5c', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0319', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12634', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
| null |
GHSA
|
GHSA-7j93-2h6r-hm49
|
Cross-Site Scripting in http-file-server
|
All versions of `http-file-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5458'}
|
2021-01-08T20:42:41Z
|
2019-07-31T04:22:36Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5458', 'https://www.npmjs.com/advisories/1110', 'https://github.com/advisories/GHSA-7j93-2h6r-hm49', 'https://hackerone.com/reports/570563'}
| null |
GHSA
|
GHSA-8v5f-hp78-jgxq
|
Signature Verification Bypass in jwt-simple
|
Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm).
## Recommendation
Upgrade to version 0.5.3 or later.
| null |
2021-08-04T20:57:39Z
|
2019-06-06T15:30:33Z
|
HIGH
| 0
|
{'CWE-347'}
|
{'https://www.npmjs.com/advisories/831', 'https://github.com/advisories/GHSA-8v5f-hp78-jgxq', 'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}
| null |
GHSA
|
GHSA-hhx9-p69v-cx2j
|
Authentication bypass in Apache Airflow
|
"The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default"
|
{'CVE-2020-13927'}
|
2021-06-03T15:21:59Z
|
2021-04-30T17:34:13Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-hhx9-p69v-cx2j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13927', 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e', 'https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E', 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication', 'https://github.com/apache/airflow/releases/tag/1.10.11', 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}
| null |
GHSA
|
GHSA-58v3-j75h-xr49
|
Improper Input Validation in libseccomp-golang
|
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
|
{'CVE-2017-18367'}
|
2021-05-18T15:44:30Z
|
2021-05-18T15:44:30Z
|
HIGH
| 4.8
|
{'CWE-284'}
|
{'http://www.openwall.com/lists/oss-security/2019/04/25/6', 'https://github.com/seccomp/libseccomp-golang/issues/22', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18367', 'https://github.com/advisories/GHSA-58v3-j75h-xr49', 'https://access.redhat.com/errata/RHSA-2019:4087', 'https://usn.ubuntu.com/4574-1/', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:4090', 'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}
| null |
GHSA
|
GHSA-6fmm-47qc-p4m4
|
Unauthorized File Access in harp
|
All versions of `harp` are vulnerable to Unauthorized File Access. If a symlink in the project's base directory points to a file outside of the directory, the file is served. This could allow an attacker to access sensitive files on the server.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2019-5438'}
|
2021-06-07T16:43:15Z
|
2019-06-13T16:12:26Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/816', 'https://github.com/advisories/GHSA-6fmm-47qc-p4m4', 'https://hackerone.com/reports/530289', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5438'}
| null |
GHSA
|
GHSA-w6cx-qg2q-rvq8
|
Path Traversal in @finastra/ssr-pages
|
A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/1
- https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
|
{'CVE-2022-24718'}
|
2022-04-19T19:03:25Z
|
2022-03-01T22:09:18Z
|
HIGH
| 7.6
|
{'CWE-22'}
|
{'https://github.com/Finastra/ssr-pages/pull/1', 'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718', 'https://github.com/advisories/GHSA-w6cx-qg2q-rvq8', 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8'}
| null |
GHSA
|
GHSA-5r2v-6gm6-vpvh
|
Insecure Permissions in Gogs
|
routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.
|
{'CVE-2019-14544'}
|
2021-05-18T17:33:58Z
|
2021-05-18T17:33:58Z
|
CRITICAL
| 9.8
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-5r2v-6gm6-vpvh', 'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14544', 'https://github.com/gogs/gogs/issues/5764'}
| null |
GHSA
|
GHSA-9vrw-m88g-w75q
|
Denial of Service in @hapi/accept
|
Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 3.2.4 or 5.0.1.
| null |
2020-09-03T15:45:53Z
|
2020-09-03T15:45:53Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-9vrw-m88g-w75q', 'https://www.npmjs.com/advisories/1475'}
| null |
GHSA
|
GHSA-6gjf-7w99-j7x7
|
Deleted Admin Can Sign In to Admin Interface
|
### Impact
Assuming an administrator once had previous access to the admin interface, they may still be able to sign in to the backend using October CMS v2.0.
### Patches
The issue has been patched in v2.1.12
### Workarounds
- Reset the password of the deleted accounts to prevent them from signing in.
- Please contact hello@octobercms.com for code change instructions if you are unable to upgrade.
### References
Credits to:
• Daniel Bidala
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2021-41126'}
|
2021-11-09T20:32:25Z
|
2021-10-06T17:46:40Z
|
HIGH
| 7.2
|
{'CWE-287'}
|
{'https://octobercms.com/changelog', 'https://github.com/advisories/GHSA-6gjf-7w99-j7x7', 'https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41126'}
| null |
GHSA
|
GHSA-pphf-f93w-gc84
|
Data race in may_queue
|
An issue was discovered in the may_queue crate through 2020-11-10 for Rust. Because Queue does not have bounds on its Send trait or Sync trait, memory corruption can occur.
|
{'CVE-2020-36217'}
|
2021-08-25T20:51:47Z
|
2021-08-25T20:51:47Z
|
MODERATE
| 5.9
|
{'CWE-662', 'CWE-787'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0111.html', 'https://github.com/Xudong-Huang/may/issues/88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36217', 'https://github.com/advisories/GHSA-pphf-f93w-gc84'}
| null |
GHSA
|
GHSA-mg98-x2cm-4cpf
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.
|
{'CVE-2019-1106'}
|
2021-03-29T20:59:15Z
|
2021-03-29T20:59:15Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106', 'https://github.com/advisories/GHSA-mg98-x2cm-4cpf'}
| null |
GHSA
|
GHSA-rfx6-vp9g-rh7v
|
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
|
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
|
{'CVE-2017-17485'}
|
2021-09-17T17:46:35Z
|
2018-10-18T17:42:48Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://access.redhat.com/errata/RHSA-2018:0481', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://access.redhat.com/errata/RHSA-2018:0478', 'https://github.com/advisories/GHSA-rfx6-vp9g-rh7v', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://github.com/FasterXML/jackson-databind/issues/1855', 'https://access.redhat.com/errata/RHSA-2018:0116', 'http://www.securityfocus.com/archive/1/541652/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17485', 'https://security.netapp.com/advisory/ntap-20180201-0003/', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://github.com/irsl/jackson-rce-via-spel/', 'https://www.debian.org/security/2018/dsa-4114', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://access.redhat.com/errata/RHSA-2018:0480', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2018:2930'}
| null |
GHSA
|
GHSA-pgq6-ccqj-hpqr
|
Elasticsearch privilege escalation issue
|
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously been upgraded from 6.x, should upgrade to 7.17.1. Users that are planning to upgrade from 6.x should not perform an upgrade from 6.x to versions 7.16 through 7.17.0 and should use 7.17.1+ for upgrades from 6.x.
|
{'CVE-2022-23708'}
|
2022-03-18T21:04:31Z
|
2022-03-04T00:00:15Z
|
MODERATE
| 4.3
|
{'CWE-269'}
|
{'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23708', 'https://github.com/advisories/GHSA-pgq6-ccqj-hpqr'}
| null |
GHSA
|
GHSA-vhfr-v4w9-45v8
|
Improper Input Validation in renderdoc
|
An issue was discovered in the renderdoc crate before 0.5.0 for Rust. Multiple exposed methods take self by immutable reference, which is incompatible with a multi-threaded application.
|
{'CVE-2019-16142'}
|
2021-08-25T20:44:51Z
|
2021-08-25T20:44:51Z
|
HIGH
| 9.8
|
{'CWE-20'}
|
{'https://rustsec.org/advisories/RUSTSEC-2019-0018.html', 'https://github.com/advisories/GHSA-vhfr-v4w9-45v8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16142', 'https://github.com/ebkalderon/renderdoc-rs/pull/32'}
| null |
GHSA
|
GHSA-h24p-2c3m-5qf4
|
Malicious Package in owl-orchard-apple-sunshine
|
All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:14:54Z
|
2020-09-03T23:23:23Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1307', 'https://github.com/advisories/GHSA-h24p-2c3m-5qf4'}
| null |
GHSA
|
GHSA-8w54-22w9-3g8f
|
Cross-site Scripting and Open Redirect in Products.CMFPlone
|
### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Usually only anonymous users are affected, but this depends on your cache settings.
### Patches
No patch is available for the Products.CMFPlone 4 series.
Versions 5.0 and higher are not affected, but two other packages used by these versions are affected.
`plone.app.contenttypes` has the same problem in all versions, see [advisory](https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x).
In Plone 5.0-5.2, the default Products.ATContentTypes version has the same problem. See [advisory](https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh).
Plone 5.2.7 and 6.0.0a3 will be released today and will include these fixes.
For all unpatched versions of the three packages, you can use the following workaround.
### Workaround
Make sure the image_view_fullscreen page is not stored in the cache.
In Plone:
* Login as Manager and go to Site Setup.
* Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable.
* Click on the tab 'Caching operations'.
* Under 'Legacy template mappings' locate the ruleset 'Content item view'.
* From the last column ('Templates') remove 'image_view_fullscreen'.
* Click on Save.
### Reporter
This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you!
### For more information
If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org)
This is also the correct address to use when you want to report a possible vulnerability.
See [our security report policy](https://plone.org/security/report).
| null |
2022-01-31T20:25:55Z
|
2022-01-28T23:10:40Z
|
MODERATE
| 4.3
|
{'CWE-79'}
|
{'https://github.com/plone/Products.CMFPlone/security/advisories/GHSA-8w54-22w9-3g8f', 'https://github.com/advisories/GHSA-8w54-22w9-3g8f'}
| null |
GHSA
|
GHSA-mpvw-25mg-59vx
|
Server-side Request Forgery (SSRF) via img tags in reportlab
|
All versions of package reportlab at time of writing are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
|
{'CVE-2020-28463'}
|
2021-11-18T15:26:06Z
|
2021-03-29T16:32:27Z
|
MODERATE
| 6.5
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28463', 'https://github.com/advisories/GHSA-mpvw-25mg-59vx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMUJA5GZTPQ5WRYUCCK2GEZM4W43N7HH/', 'https://hg.reportlab.com/hg-public/reportlab/file/f094d273903a/CHANGES.md#l71', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZQSFCID67K6BTC655EQY6MNOF35QI44/', 'https://www.reportlab.com/docs/reportlab-userguide.pdf', 'https://hg.reportlab.com/hg-public/reportlab/rev/7f2231703dc7', 'https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145', 'https://bugzilla.redhat.com/show_bug.cgi?id=1930417'}
| null |
GHSA
|
GHSA-pf2j-9qmp-jqr2
|
SQL Injection and MAID in TypeORM
|
Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.
|
{'CVE-2020-8158'}
|
2021-05-07T16:46:42Z
|
2021-05-07T16:46:42Z
|
CRITICAL
| 9.8
|
{'CWE-89', 'CWE-471'}
|
{'https://github.com/advisories/GHSA-pf2j-9qmp-jqr2', 'https://hackerone.com/reports/869574', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8158'}
| null |
GHSA
|
GHSA-pccm-j6vj-jwwf
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload.
|
{'CVE-2022-0962'}
|
2022-03-29T21:17:44Z
|
2022-03-15T00:00:54Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://github.com/advisories/GHSA-pccm-j6vj-jwwf', 'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
| null |
GHSA
|
GHSA-pq2f-3fg3-rw99
|
SQL Injection in WordPress Zero Spam WordPress plugin
|
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
|
{'CVE-2022-0254'}
|
2022-03-29T21:17:17Z
|
2022-03-15T00:00:57Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/advisories/GHSA-pq2f-3fg3-rw99', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3', 'https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906'}
| null |
GHSA
|
GHSA-4p4p-www8-8fv9
|
Reference binding to null in `ParameterizedTruncatedNormal`
|
### Impact
An attacker can trigger undefined behavior by binding to null pointer in `tf.raw_ops.ParameterizedTruncatedNormal`:
```python
import tensorflow as tf
shape = tf.constant([], shape=[0], dtype=tf.int32)
means = tf.constant((1), dtype=tf.float32)
stdevs = tf.constant((1), dtype=tf.float32)
minvals = tf.constant((1), dtype=tf.float32)
maxvals = tf.constant((1), dtype=tf.float32)
tf.raw_ops.ParameterizedTruncatedNormal(
shape=shape, means=means, stdevs=stdevs, minvals=minvals, maxvals=maxvals)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3f6fe4dfef6f57e768260b48166c27d148f3015f/tensorflow/core/kernels/parameterized_truncated_normal_op.cc#L630) does not validate input arguments before accessing the first element of `shape`:
```cc
int32 num_batches = shape_tensor.flat<int32>()(0);
```
If `shape` argument is empty, then `shape_tensor.flat<T>()` is an empty array.
### Patches
We have patched the issue in GitHub commit [5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8](https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29568'}
|
2021-05-21T14:25:19Z
|
2021-05-21T14:25:19Z
|
LOW
| 2.5
|
{'CWE-824'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4p4p-www8-8fv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29568', 'https://github.com/advisories/GHSA-4p4p-www8-8fv9', 'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'}
| null |
GHSA
|
GHSA-wq8f-46ww-6c2h
|
Integer underflow in untrusted
|
An issue was discovered in the untrusted crate before 0.6.2 for Rust. Error handling can trigger an integer underflow and panic.
|
{'CVE-2018-20989'}
|
2021-08-25T20:43:49Z
|
2021-08-25T20:43:49Z
|
HIGH
| 7.5
|
{'CWE-191'}
|
{'https://github.com/briansmith/untrusted/pull/20', 'https://rustsec.org/advisories/RUSTSEC-2018-0001.html', 'https://github.com/advisories/GHSA-wq8f-46ww-6c2h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20989'}
| null |
GHSA
|
GHSA-8qfc-cvjp-mgpq
|
Moderate severity vulnerability that affects org.apache.ignite:ignite-core
|
Apache Ignite before 1.9 allows man-in-the-middle attackers to read arbitrary files via XXE in modified update-notifier documents.
|
{'CVE-2016-6805'}
|
2021-09-07T20:29:23Z
|
2018-10-16T20:53:31Z
|
MODERATE
| 5.9
|
{'CWE-611'}
|
{'http://www.securityfocus.com/bid/97509', 'https://github.com/advisories/GHSA-8qfc-cvjp-mgpq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6805', 'http://seclists.org/oss-sec/2017/q2/31'}
| null |
GHSA
|
GHSA-86mr-6m89-vgj3
|
Buffer Overflow in node-weakauras-parser
|
Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems.
## Recommendation
Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.
| null |
2021-10-04T21:10:10Z
|
2020-09-03T15:51:38Z
|
MODERATE
| 0
|
{'CWE-120'}
|
{'https://www.npmjs.com/advisories/1504', 'https://github.com/advisories/GHSA-86mr-6m89-vgj3', 'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'}
| null |
GHSA
|
GHSA-v4cr-m5f8-gxw8
|
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
|
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-4092'}
|
2021-12-16T14:14:56Z
|
2021-12-16T14:14:56Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23', 'https://github.com/advisories/GHSA-v4cr-m5f8-gxw8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}
| null |
GHSA
|
GHSA-m86m-5m44-pc93
|
Denial of Service in grpc-ts-health-check
|
Versions of `grpc-ts-health-check` prior to 2.0.0 are vulnerable to Denial of Service. The package exposes an API endpoint that may allow attackers to set the service's health status to failing. This can lead to Denial of Service as Kubernetes blocks traffic to services with a failing status.
## Recommendation
Upgrade to version 2.0.0 or later.
| null |
2020-09-03T19:05:46Z
|
2020-09-03T19:05:46Z
|
LOW
| 0
| null |
{'https://www.npmjs.com/advisories/1097', 'https://github.com/advisories/GHSA-m86m-5m44-pc93'}
| null |
GHSA
|
GHSA-2jhm-qp48-hv5j
|
Missing authorization in xwiki-platform
|
### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:
```
$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")
```
### Patches
It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-18870
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org)
|
{'CVE-2022-23621'}
|
2022-02-11T15:00:23Z
|
2022-02-09T21:56:05Z
|
MODERATE
| 5.5
|
{'CWE-862'}
|
{'https://jira.xwiki.org/browse/XWIKI-18870', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/advisories/GHSA-2jhm-qp48-hv5j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23621'}
| null |
GHSA
|
GHSA-7w8j-85wm-6xfq
|
Prototype Pollution in jquery-bbq
|
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
|
{'CVE-2021-20086'}
|
2021-05-24T19:51:58Z
|
2021-05-24T19:51:58Z
|
HIGH
| 8.8
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20086', 'https://github.com/advisories/GHSA-7w8j-85wm-6xfq', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md'}
| null |
GHSA
|
GHSA-2ww3-fxvq-293j
|
Inefficient Regular Expression in nltk
|
nltk is contains an Inefficient Regular Expression and is vulnerable to regular expression denial of service attacks.
|
{'CVE-2021-3828'}
|
2022-04-26T18:03:42Z
|
2021-09-29T17:14:53Z
|
HIGH
| 7.5
|
{'CWE-697', 'CWE-1333'}
|
{'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6', 'https://github.com/nltk/nltk/pull/2816', 'https://github.com/advisories/GHSA-2ww3-fxvq-293j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3828', 'https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.