ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-73xv-w5gp-frxh | Logic error in Legion of the Bouncy Castle BC Java | An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. | {'CVE-2020-28052'} | 2022-04-22T17:31:09.893912Z | 2021-04-30T16:14:15Z | HIGH | null | {'CWE-670'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052', 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219', 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java', 'https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-28052', 'https://www.bouncycastle.org/releasenotes.html', 'https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/', 'https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'} | null |
Maven | GHSA-73cq-fhp3-8rpw | Moderate severity vulnerability that affects org.restlet.jse:org.restlet | Restlet Framework 2.1.x before 2.1.7 and 2.x.x before 2.2 RC1, when using XMLRepresentation or XML serializers, allows attackers to cause a denial of service via an XML Entity Expansion (XEE) attack. | {'CVE-2014-1868'} | 2021-09-02T19:18:12Z | 2018-10-17T00:04:53Z | MODERATE | null | {'CWE-776'} | {'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/91181', 'http://secunia.com/advisories/56940', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1868', 'https://github.com/restlet/restlet-framework-java', 'https://github.com/advisories/GHSA-73cq-fhp3-8rpw'} | null |
Maven | GHSA-959q-32g8-vvp7 | Moderate severity vulnerability that affects org.keycloak:keycloak-core | It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks. | {'CVE-2017-12161'} | 2022-03-03T05:13:30.784473Z | 2018-10-18T16:50:05Z | MODERATE | null | {'CWE-602'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1484564', 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161', 'https://github.com/advisories/GHSA-959q-32g8-vvp7'} | null |
Maven | GHSA-6mqq-8r44-vmjc | Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. | {'CVE-2018-1334'} | 2022-03-03T05:13:36.137085Z | 2019-03-14T15:41:04Z | MODERATE | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1334', 'https://github.com/advisories/GHSA-6mqq-8r44-vmjc', 'https://spark.apache.org/security.html#CVE-2018-1334'} | null |
Maven | GHSA-7ph6-5cmq-xgjq | Path traversal in xwiki-platform-skin-skinx | ### Impact
AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any security threat, but can cause conflicts with others serialized files).
### Patches
Fixed in 13.6-rc-1
### Workarounds
* giving script or subwiki admin right only to trusted people
* disabling HTML/PDF export
### References
https://jira.xwiki.org/browse/XWIKI-18819
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [XWiki Security Mailing list](mailto:security@xwiki.org) | {'CVE-2022-23620'} | 2022-02-09T21:53:29Z | 2022-02-09T21:53:29Z | MODERATE | null | {'CWE-22'} | {'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23620', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-18819'} | null |
Maven | GHSA-gchq-9r68-6jwv | Cross-Site Request Forgery in Jenkins Credentials Plugin | Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability. | {'CVE-2021-21648'} | 2021-05-19T19:18:23Z | 2021-06-16T17:24:31Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21648', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349'} | null |
Maven | GHSA-vm59-329q-p468 | Cross-site Scripting in Apache UIMA | This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code. | {'CVE-2018-8035'} | 2022-03-03T05:13:27.945205Z | 2019-05-14T04:00:37Z | MODERATE | null | {'CWE-79'} | {'https://uima.apache.org/security_report', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'} | null |
Maven | GHSA-4fcw-pq4r-f4q7 | Server-Side Request Forgery in Spinnaker Orca | The Spinnaker template resolution functionality is vulnerable to Server-Side Request Forgery (SSRF), which allows an attacker to send requests on behalf of Spinnaker potentially leading to sensitive data disclosure. | {'CVE-2020-9298'} | 2021-05-05T19:53:13Z | 2021-05-07T15:54:31Z | HIGH | null | {'CWE-918'} | {'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9298', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-003.md', 'https://github.com/spinnaker/orca/releases/tag/v8.7.0'} | null |
Maven | GHSA-5q8m-mqmx-pxp9 | Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation | Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption). | {'CVE-2018-1274'} | 2022-04-27T14:00:15.080491Z | 2018-10-17T17:23:44Z | HIGH | null | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1274', 'https://pivotal.io/security/cve-2018-1274', 'https://github.com/advisories/GHSA-5q8m-mqmx-pxp9', 'http://www.securityfocus.com/bid/103769'} | null |
Maven | GHSA-c7fh-chf7-jr5x | ReDOS in Vfsjfilechooser2 | A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs. | {'CVE-2021-29061'} | 2022-03-03T05:13:58.202139Z | 2022-01-06T18:44:27Z | HIGH | null | {'CWE-770'} | {'https://github.com/fracpete/vfsjfilechooser2/issues/7', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md', 'https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9', 'https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md', 'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29061'} | null |
Maven | GHSA-vrh8-27q8-fr8f | Low severity vulnerability that affects org.apache.solr:solr-core | Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL. | {'CVE-2017-3164'} | 2022-03-03T05:13:31.195986Z | 2019-03-14T15:39:56Z | HIGH | null | {'CWE-918'} | {'https://lists.apache.org/thread.html/e0f9c652b57a91fdcc287efcead620af9f4d8e46b88f0b761aa265de@%3Cdev.lucene.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN%3DwO5rYs6ktAX-5%3D-f5JDFwbbTSM2TTjEbGO5jKKA%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/ca3105b6934ccd28e843dffe39724f6963ff49825e9b709837203649@%3Cdev.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://github.com/advisories/GHSA-vrh8-27q8-fr8f', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/107026', 'https://lists.apache.org/thread.html/43026507844ada1ac658ccf7bc939378c13e492fd6538416ce65df39@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/75dc651478f9d04505b46d44fe3ac739e7aaf3d7bf1257973685f8f7@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3164'} | null |
Maven | GHSA-v35c-49j6-q8hq | Security Constraint Bypass in Spring Security | Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed.
Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath() and getPathInfo() [1].
Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified.
Users of IBM WebSphere Application Server 8.5.x are known to be affected.
Users of other containers that implement the Servlet specification may be affected.
[1] https://issues.apache.org/bugzilla/show_bug.cgi?id=25015
## Affected Pivotal Products and Versions
Severity is high unless otherwise noted.
- Spring Security 3.2.0 - 3.2.9
- Spring Security 4.0.x - 4.1.3
- Spring Security 4.2.0
- Older unsupported versions are also affected
## Mitigation
Adopting one of the following mitigations will protect against this vulnerability.
- Use a Servlet container known not to include path parameters in the return values for getServletPath() and getPathInfo()
- Upgrading to Spring Security 3.2.10, 4.1.4 or 4.2.1 will reject the request with a RequestRejectedException if the presence of an encoded "/" is detected. Note: If you wish to disable this feature it can be disabled by setting the DefaultHttpFirewall.allowUrlEncodedSlash = true. However, disabling this feature will mean applications are vulnerable (in containers that return path parameters in getServletPath() or getPathInfo()).
## Credit
The issue was identified by Shumpei Asahara & Yuji Ito from NTT DATA Corporation and responsibly reported to Pivotal. | {'CVE-2016-9879'} | 2022-03-03T05:13:03.921203Z | 2020-09-15T20:30:34Z | HIGH | null | null | {'https://pivotal.io/security/cve-2016-9879', 'https://access.redhat.com/errata/RHSA-2017:1832', 'http://www.securityfocus.com/bid/95142', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9879'} | null |
Maven | GHSA-5qx5-vg5w-5mx3 | Stored XSS vulnerability in Jenkins Badge Plugin | Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-23108'} | 2022-04-29T04:45:37.432779Z | 2022-01-13T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jenkinsci/badge-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'} | null |
Maven | GHSA-7cj4-gj8m-m2f7 | Authentication bypass in Apache Shiro | Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. | {'CVE-2020-17510'} | 2022-03-03T05:13:46.136754Z | 2021-04-22T16:13:23Z | CRITICAL | null | {'CWE-287'} | {'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510', 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'} | null |
Maven | GHSA-j379-9jr9-w5cq | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437. | {'CVE-2018-1000844'} | 2022-03-03T05:13:48.459422Z | 2018-12-21T17:48:26Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/square/retrofit/pull/2735', 'https://github.com/square/retrofit', 'https://github.com/advisories/GHSA-j379-9jr9-w5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'} | null |
Maven | GHSA-rgh3-987h-wpmw | XML External Entity Injection in XStream | Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document. | {'CVE-2016-3674'} | 2022-03-03T05:13:24.310443Z | 2020-06-30T22:48:14Z | HIGH | null | {'CWE-200'} | {'http://rhn.redhat.com/errata/RHSA-2016-2822.html', 'http://www.securityfocus.com/bid/85381', 'http://x-stream.github.io/changes.html#1.4.9', 'http://rhn.redhat.com/errata/RHSA-2016-2823.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183180.html', 'https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385', 'http://www.openwall.com/lists/oss-security/2016/03/28/1', 'http://www.openwall.com/lists/oss-security/2016/03/25/8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3674', 'http://www.debian.org/security/2016/dsa-3575', 'https://github.com/x-stream/xstream', 'http://www.securitytracker.com/id/1036419', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183208.html', 'https://github.com/x-stream/xstream/issues/25'} | null |
Maven | GHSA-wr5r-m8pc-85j9 | Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml | Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | {'CVE-2019-3772'} | 2022-03-03T05:13:41.869918Z | 2019-01-25T16:18:49Z | LOW | null | {'CWE-611'} | {'https://pivotal.io/security/cve-2019-3772', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9', 'http://www.securityfocus.com/bid/106749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'} | null |
Maven | GHSA-54fx-gm74-q676 | Permissions bypass in SmallRye | A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2 | {'CVE-2020-1729'} | 2022-03-18T18:03:03.686621Z | 2022-03-18T17:55:47Z | MODERATE | null | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1729', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444', 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'} | null |
Maven | GHSA-hf4p-jm7r-vjjj | Deserialization of Untrusted Data in EthereumJ | An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server. | {'CVE-2018-15890'} | 2021-08-17T19:40:00Z | 2019-07-26T16:10:39Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/ethereum/ethereumj/issues/1161', 'https://github.com/frohoff/ysoserial/', 'https://github.com/ethereum/ethereumj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'} | null |
Maven | GHSA-9h6g-6mxg-vvp4 | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadin.com/security/cve-2021-31406 | null | 2022-03-03T05:13:06.163424Z | 2021-04-19T14:47:18Z | MODERATE | null | {'CWE-208'} | {'https://github.com/vaadin/platform/', 'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4', 'https://vaadin.com/security/cve-2021-31406'} | null |
Maven | GHSA-c8cc-p3j7-4c7f | Moderate severity vulnerability that affects org.apache.mesos:mesos | Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value. | {'CVE-2018-8023'} | 2022-03-03T05:14:20.663462Z | 2018-10-17T19:54:14Z | MODERATE | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/r0dd7ff197b2e3bdd80a0326587ca3d0c22e10d1dba17c769d6da7d7a@%3Cuser.flink.apache.org%3E', 'https://github.com/advisories/GHSA-c8cc-p3j7-4c7f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8023', 'https://lists.apache.org/thread.html/9b9d3f6bd09f3ebd2284b82077033bdc71da550a1c4c010c2494acc3@%3Cdev.mesos.apache.org%3E'} | null |
Maven | GHSA-jjpq-gp5q-8q6w | Cross-site scripting in Apache Tomcat | The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. | {'CVE-2019-0221'} | 2022-03-03T05:14:20.702656Z | 2019-05-30T03:30:42Z | MODERATE | null | {'CWE-79'} | {'http://www.securityfocus.com/bid/108545', 'https://seclists.org/bugtraq/2019/Dec/43', 'http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://security.netapp.com/advisory/ntap-20190606-0001/', 'https://security.gentoo.org/glsa/202003-43', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html', 'https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS', 'https://usn.ubuntu.com/4128-2/', 'https://usn.ubuntu.com/4128-1/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E', 'https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/', 'http://seclists.org/fulldisclosure/2019/May/50', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/'} | null |
Maven | GHSA-4c7h-f2j9-9c46 | Missing permission Phoenix AutoTest Plugin | A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | {'CVE-2022-28158'} | 2022-04-05T20:05:40.898501Z | 2022-03-30T00:00:21Z | MODERATE | null | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-28158', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685', 'https://github.com/jenkinsci/phoenix-autotest-plugin'} | null |
Maven | GHSA-6xq8-pvg4-3mf3 | Moderate severity vulnerability that affects org.eclipse.rdf4j:rdf4j-runtime | Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file. | {'CVE-2018-1000644'} | 2022-03-03T05:13:27.912213Z | 2018-10-19T16:54:11Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-6xq8-pvg4-3mf3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000644', 'https://github.com/eclipse/rdf4j/issues/1056', 'https://github.com/eclipse/rdf4j', 'https://0dd.zone/2018/08/05/rdf4j-XXE/'} | null |
Maven | GHSA-36hp-jr8h-556f | Authentication Bypass | When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed.
The following request to the `configuration` endpoint gets rejected as we are not providing any credentials:
```
❯ curl -X POST "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
{"timestamp":"2020-12-02T14:33:57.154+0000","status":403,"error":"Forbidden","message":"unknown user!","path":"/nacos/v1/cs/configs"}
```
However the following one gets accepted by using the `Nacos-Server` user-agent header:
```
❯ curl -X POST -A Nacos-Server "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
true
```
#### Impact
This issue may allow any user to carry out any administrative tasks on the Nacos server. | {'CVE-2021-29441'} | 2022-03-03T05:13:12.548908Z | 2021-04-27T20:09:17Z | HIGH | null | {'CWE-290'} | {'https://github.com/advisories/GHSA-36hp-jr8h-556f', 'https://github.com/alibaba/nacos/issues/4701', 'https://github.com/alibaba/nacos/pull/4703', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441'} | null |
Maven | GHSA-xwg3-qrcg-w9x6 | Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18 | Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
- https://vaadin.com/security/cve-2021-31404 | {'CVE-2021-31404'} | 2022-03-03T05:12:25.490160Z | 2021-04-19T14:51:25Z | MODERATE | null | {'CWE-208', 'CWE-203'} | {'https://vaadin.com/security/cve-2021-31404', 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404', 'https://github.com/vaadin/flow/pull/9875'} | null |
Maven | GHSA-c6j7-4fr9-c76p | Incorrect permissions in Apache Ozone | In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block. | {'CVE-2021-39235'} | 2021-11-22T18:37:43Z | 2021-11-23T18:17:41Z | MODERATE | null | {'CWE-732'} | {'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39235', 'http://www.openwall.com/lists/oss-security/2021/11/19/6'} | null |
Maven | GHSA-f96g-24cg-f24w | SQL Injection in odata4j | odata4j 0.7.0 allows ExecuteJPQLQueryCommand.java SQL injection. NOTE: this product is apparently discontinued. | {'CVE-2016-11024'} | 2022-03-03T05:14:14.116259Z | 2021-05-07T15:52:41Z | HIGH | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-11024', 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'} | null |
Maven | GHSA-fpqp-v323-44xv | Cross-site scripting in Apache Ranger | Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix. | {'CVE-2019-12397'} | 2022-03-03T05:13:34.026677Z | 2019-08-16T14:01:35Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12397', 'https://lists.apache.org/thread.html/ab2de1adad96f5dbd19d976b28715dfc60dbe75e82a74f48be8ef695@%3Cdev.ranger.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/08/08/1', 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'} | null |
Maven | GHSA-9gph-22xh-8x98 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS. | {'CVE-2020-36179'} | 2022-04-25T22:16:55.292156Z | 2021-12-09T19:15:54Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36179', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-r53v-vm87-f72c | Moderate severity vulnerability that affects org.apache.axis:axis | The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784. | {'CVE-2014-3596'} | 2022-03-03T05:12:40.252297Z | 2018-10-16T20:50:58Z | MODERATE | null | {'CWE-297'} | {'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html', 'http://www.openwall.com/lists/oss-security/2014/08/20/2', 'http://rhn.redhat.com/errata/RHSA-2014-1193.html', 'http://secunia.com/advisories/61222', 'https://issues.apache.org/jira/browse/AXIS-2905', 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'http://www.securityfocus.com/bid/69295', 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95377', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.securitytracker.com/id/1030745', 'http://linux.oracle.com/errata/ELSA-2014-1193.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3596', 'https://github.com/advisories/GHSA-r53v-vm87-f72c'} | null |
Maven | GHSA-2pmw-cvc7-frvh | SQL injection in MCMS | A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do | {'CVE-2021-44868'} | 2022-03-07T20:47:19.524489Z | 2022-02-18T00:00:34Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44868', 'https://github.com/ming-soft/MCMS/issues/58'} | null |
Maven | GHSA-xxgp-pcfc-3vgc | Privilege Escalation in Hibernate Validator | In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue(). | {'CVE-2017-7536'} | 2022-03-31T22:19:43.235684Z | 2020-06-15T19:57:48Z | HIGH | null | {'CWE-470'} | {'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2017:3454', 'http://www.securityfocus.com/bid/101048', 'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://bugzilla.redhat.com/show_bug.cgi?id=1465573', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHSA-2017:2808', 'http://www.securitytracker.com/id/1039744', 'https://access.redhat.com/errata/RHSA-2017:2811', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7536', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://access.redhat.com/errata/RHSA-2018:3817', 'https://access.redhat.com/errata/RHSA-2017:3455', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://github.com/hibernate/hibernate-validator', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3141'} | null |
Maven | GHSA-j23j-q57m-63v3 | Denial of service in DataCommunicator class in Vaadin 8 | Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data. | null | 2022-03-03T05:13:24.743375Z | 2021-10-13T18:54:50Z | MODERATE | null | {'CWE-400'} | {'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3', 'https://vaadin.com/security/cve-2021-33609', 'https://github.com/vaadin/framework/pull/12415'} | null |
Maven | GHSA-6jmf-mxwf-r3jc | Exposure of Sensitive Information to an Unauthorized Actor in Apache Kafka | When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables. | {'CVE-2019-12399'} | 2021-06-15T17:25:57Z | 2020-05-12T00:39:27Z | HIGH | null | {'CWE-319'} | {'https://lists.apache.org/thread.html/r47c225db363d1ee2c18c4b3b2f51b63a9789f78c7fa602e5976ecd05@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9%40%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfe90ca0463c199b99c2921410639aed53a172ea8b733eab0dc776262@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc27d424d0bdeaf31081c3e246db3c66e882243ae3f342dfa845e0261@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rde947ee866de6687bc51cdc8dfa6d7e6b3ad4ce8c708c344f773e6dc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4b20b40c40d4a4c641e2ef4228098a57935e5782bfdfdf3650e48265@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9871a4215b621c1d09deee5eba97f0f44fde01b4363deb1bed0dd160@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12399', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3154f5adbc905f1f9012a92240c8e00a96628470cc819453b9606d0e@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/01/14/1', 'https://lists.apache.org/thread.html/r2d390dec5f360ec8aa294bef18e1a4385e2a3698d747209216f5a48b@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r4d9e87cdae99e98d7b244cfa53d9d2532d368d3a187fbc87c493dcbe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r56eb055b544931451283fee51f7e1f5b8ebd3085fed7d77aaba504c9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r801c68bf987931f35d2e24ecc99f3aa2850fdd8f5ef15fe6c60fecf3@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r6fa1cff4786dcef2ddd1d717836ef123c878e8321c24855bad24ae0f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3203d7f25a6ca56ff3e48c43a6aa7cb60b8e5d57d0eed9f76dc2b7a8@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r0e3a613705d70950aca2bfe9a6265c87503921852d9a3dbce512ca9f@%3Ccommits.druid.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKAFKA-541854'} | null |
Maven | GHSA-7hwc-46rm-65jh | Denial of service in XStream | XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call. | {'CVE-2017-7957'} | 2022-03-03T05:13:52.552340Z | 2020-06-30T22:48:24Z | HIGH | null | {'CWE-20'} | {'http://www.securityfocus.com/bid/100687', 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://access.redhat.com/errata/RHSA-2017:1832', 'http://www.securitytracker.com/id/1039499', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800', 'http://x-stream.github.io/CVE-2017-7957.html', 'http://www.debian.org/security/2017/dsa-3841', 'https://www-prd-trops.events.ibm.com/node/715749', 'https://github.com/x-stream/xstream', 'https://access.redhat.com/errata/RHSA-2017:2888', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7957'} | null |
Maven | GHSA-53x6-4x5p-rrvv | Denial of Service in Apache Commons Compress | The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. | {'CVE-2019-12402'} | 2022-04-22T17:45:13.657422Z | 2019-10-11T18:41:08Z | HIGH | null | {'CWE-835'} | {'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLJIK2AUOZOWXR3S5XXBUNMOF3RTHTI7/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12402', 'https://lists.apache.org/thread.html/r7af60fbd8b2350d49d14e53a3ab2801998b9d1af2d6fcac60b060a53@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/r972f82d821b805d04602976a9736c01b6bf218cfe0c3f48b472db488@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rcc35ab6be300365de5ff9587e0479d10d7d7c79070921837e3693162@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r4363c994c8bca033569a98da9218cc0c62bb695c1e47a98e5084e5a0@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rd3f99d732baed459b425fb0a9e9e14f7843c9459b12037e4a9d753b5@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r25422df9ad22fec56d9eeca3ab8bd6d66365e9f6bfe311b64730edf5@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/re13bd219dd4b651134f6357f12bd07a0344eea7518c577bbdd185265@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/54cc4e9fa6b24520135f6fa4724dfb3465bc14703c7dc7e52353a0ea@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r05cf37c1e1e662e968cfece1102fcd50fe207181fdbf2c30aadfafd3@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r21d64797914001119d2fc766b88c6da181dc2308d20f14e7a7f46117@%3Cissues.flink.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZB3GB7YXIOUKIOQ27VTIP6KKGJJ3CKL/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r590c15cebee9b8e757e2f738127a9a71e48ede647a3044c504e050a4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r233267e24519bacd0f9fb9f61a1287cb9f4bcb6e75d83f34f405c521@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5caf4fcb69d2749225391e61db7216282955204849ba94f83afe011f@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5103b1c9242c0f812ac96e524344144402cbff9b6e078d1557bc7b1e@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rdebc1830d6c09c11d5a4804ca26769dbd292d17d361c61dea50915f0@%3Cissues.flink.apache.org%3E'} | null |
Maven | GHSA-g8hw-794c-4j9g | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack. | {'CVE-2018-1271'} | 2022-03-03T05:13:07.893793Z | 2018-10-17T20:07:03Z | MODERATE | null | {'CWE-22'} | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://pivotal.io/security/cve-2018-1271', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/103699', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1271', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-g8hw-794c-4j9g', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:2939'} | null |
Maven | GHSA-rm7f-mpcj-w4f6 | Command injection in Apache Unomi | Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements. | {'CVE-2021-31164'} | 2022-03-03T05:13:53.205261Z | 2021-06-16T17:17:24Z | HIGH | null | {'CWE-74'} | {'http://unomi.apache.org/security/cve-2021-31164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31164'} | null |
Maven | GHSA-qxxx-2pp7-5hmx | A deserialization flaw was discovered in the jackson-databind | A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. | {'CVE-2017-7525'} | 2022-04-26T18:48:01.075465Z | 2018-10-16T17:21:35Z | CRITICAL | null | {'CWE-502', 'CWE-184'} | {'https://access.redhat.com/errata/RHSA-2017:2636', 'https://access.redhat.com/errata/RHSA-2017:3454', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2017:2546', 'https://github.com/FasterXML/jackson-databind/issues/1599', 'https://access.redhat.com/errata/RHSA-2019:0910', 'https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1836', 'https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1837', 'https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525', 'https://github.com/FasterXML/jackson-databind', 'https://access.redhat.com/errata/RHSA-2017:2637', 'https://access.redhat.com/errata/RHSA-2017:2635', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://www.debian.org/security/2017/dsa-4004', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:0294', 'http://www.securitytracker.com/id/1039744', 'https://github.com/advisories/GHSA-qxxx-2pp7-5hmx', 'https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1835', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1462702', 'https://access.redhat.com/errata/RHSA-2017:1834', 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://access.redhat.com/errata/RHSA-2017:2547', 'http://www.securitytracker.com/id/1039947', 'https://security.netapp.com/advisory/ntap-20171214-0002/', 'https://access.redhat.com/errata/RHSA-2017:3455', 'https://access.redhat.com/errata/RHSA-2017:2477', 'http://www.securityfocus.com/bid/99623', 'https://cwiki.apache.org/confluence/display/WW/S2-055', 'https://access.redhat.com/errata/RHSA-2017:1839', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://access.redhat.com/errata/RHSA-2017:1840', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'http://www.securitytracker.com/id/1040360', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2017:3141', 'https://access.redhat.com/errata/RHSA-2017:2633', 'https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/1723'} | null |
Maven | GHSA-6v7w-535j-rq5m | Moderate severity vulnerability that affects org.springframework:spring-core | Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file. | {'CVE-2015-3192'} | 2022-03-03T05:14:05.202112Z | 2018-10-17T20:29:12Z | MODERATE | null | {'CWE-119'} | {'https://github.com/advisories/GHSA-6v7w-535j-rq5m', 'http://www.securityfocus.com/bid/90853', 'http://www.securitytracker.com/id/1036587', 'http://rhn.redhat.com/errata/RHSA-2016-1593.html', 'http://rhn.redhat.com/errata/RHSA-2016-1592.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3192', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162017.html', 'http://rhn.redhat.com/errata/RHSA-2016-2036.html', 'https://jira.spring.io/browse/SPR-13136', 'http://pivotal.io/security/cve-2015-3192', 'https://access.redhat.com/errata/RHSA-2016:1218', 'https://access.redhat.com/errata/RHSA-2016:1219', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'} | null |
Maven | GHSA-rvfc-g8j5-9ccf | Generation of Error Message Containing Sensitive Information in keybloack | A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack. | {'CVE-2020-1717'} | 2022-03-03T05:12:59.121722Z | 2022-02-09T00:59:06Z | MODERATE | null | {'CWE-209'} | {'https://issues.jboss.org/browse/KEYCLOAK-12014', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1717', 'https://bugzilla.redhat.com/show_bug.cgi?id=1796281'} | null |
Maven | GHSA-fpj7-9xm6-8hgr | Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin | Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token. | {'CVE-2022-23106'} | 2022-01-20T14:42:40Z | 2022-01-21T23:38:30Z | MODERATE | null | {'CWE-208', 'CWE-203'} | {'https://github.com/jenkinsci/configuration-as-code-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23106', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'} | null |
Maven | GHSA-j229-2h63-rvh9 | Improper Authentication for Keycloak | A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application. | {'CVE-2020-1718'} | 2022-03-03T05:13:12.802454Z | 2022-02-09T00:59:32Z | MODERATE | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1718', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1718'} | null |
Maven | GHSA-2wqp-jmcc-mc77 | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 | Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2021-31405 | {'CVE-2021-31405'} | 2022-03-03T05:13:26.495736Z | 2021-04-19T14:47:34Z | HIGH | null | {'CWE-400'} | {'https://vaadin.com/security/cve-2021-31405', 'https://github.com/vaadin/flow-components/pull/442', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31405', 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77'} | null |
Maven | GHSA-9q69-g5gc-9fgf | Cross-Site Request Forgery in Vert.x-Web framework | Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack. | {'CVE-2020-35217'} | 2022-03-03T05:12:53.424338Z | 2021-04-22T16:16:18Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35217', 'https://github.com/vert-x3/vertx-web/pull/1613'} | null |
Maven | GHSA-xc67-hjx6-cgg6 | Installation information leak in Eclipse Jetty | In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context. | {'CVE-2019-10247'} | 2022-04-21T18:03:54.504211Z | 2019-04-23T16:07:12Z | MODERATE | null | {'CWE-200', 'CWE-213'} | {'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10247', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-c38m-7h53-g9v4 | Path traversal in Apache James | Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted. | {'CVE-2021-40525'} | 2022-03-03T05:13:34.419659Z | 2022-01-21T23:36:47Z | CRITICAL | null | {'CWE-22'} | {'https://www.openwall.com/lists/oss-security/2022/01/04/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40525', 'http://www.openwall.com/lists/oss-security/2022/01/04/4', 'http://www.openwall.com/lists/oss-security/2022/02/07/1'} | null |
Maven | GHSA-whww-v56c-cgv2 | Deserialization of Untrusted Data in Apache Dubbo | This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below. | {'CVE-2020-1948'} | 2022-03-03T05:14:10.616964Z | 2022-02-10T22:39:17Z | CRITICAL | null | {'CWE-502'} | {'https://nsfocusglobal.com/apache-dubbo-remote-code-execution-vulnerability-cve-2020-1948-threat-alert/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1948', 'https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity.dubbo.apache.org%3E'} | null |
Maven | GHSA-h65f-jvqw-m9fj | Infinite Loop in Apache Xerces Java | There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions. | {'CVE-2022-23437'} | 2022-04-22T15:47:14.224790Z | 2022-01-27T16:13:07Z | MODERATE | null | {'CWE-91'} | {'http://www.openwall.com/lists/oss-security/2022/01/24/3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-5cf4-jqwp-584g | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop 2.9.0 to 2.9.1, 2.8.3 to 2.8.4, 2.7.5 to 2.7.6, KMS blocking users or granting access to users incorrectly, if the system uses non-default groups mapping mechanisms. | {'CVE-2018-11767'} | 2022-03-03T05:12:57.438900Z | 2019-03-25T16:17:32Z | HIGH | null | {'CWE-269'} | {'https://lists.apache.org/thread.html/5fb771f66946dd5c99a8a5713347c24873846f555d716f9ac17bccca@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-5cf4-jqwp-584g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11767', 'https://lists.apache.org/thread.html/246cf223e7dc0c1dff90b78dccb6c3fe94e1a044dbf98e2333393302@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/5a44590b4eedc5e25f5bd3081d1631b52c174b5b99157f7950ddc270@%3Ccommon-dev.hadoop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190416-0009/'} | null |
Maven | GHSA-xpv2-8ppj-79hh | Expression injection in AviatorScript | AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL). | {'CVE-2021-41862'} | 2022-03-03T05:12:50.125425Z | 2021-10-04T20:14:31Z | CRITICAL | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41862', 'https://github.com/killme2008/aviatorscript/issues/421', 'https://github.com/killme2008/aviatorscript'} | null |
Maven | GHSA-gw4j-4229-q4px | Server-Side Request Forgery in Apache Dubbo | In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability. | {'CVE-2021-25640'} | 2022-03-21T22:00:14.508334Z | 2022-03-18T17:56:45Z | MODERATE | null | {'CWE-918'} | {'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77@%3Cdev.dubbo.apache.org%3E', 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'} | null |
Maven | GHSA-chp4-rv79-68j3 | Apache serialization mechanism does not have a list of classes allowed for serialization/deserialization | In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer. | {'CVE-2018-1295'} | 2022-04-26T19:15:54.704509Z | 2018-10-16T20:53:44Z | CRITICAL | null | {'CWE-502'} | {'http://www.securityfocus.com/bid/103692', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1295', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://github.com/advisories/GHSA-chp4-rv79-68j3', 'https://lists.apache.org/thread.html/45e7d5e2c6face85aab693f5ae0616563132ff757e5a558da80d0209@%3Cdev.ignite.apache.org%3E'} | null |
Maven | GHSA-8crv-49fr-2h6j | Moderate severity vulnerability that affects org.springframework.security:spring-security-core and org.springframework:spring-core | Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences. | {'CVE-2016-5007'} | 2022-03-03T05:14:09.637547Z | 2018-10-17T20:30:12Z | HIGH | null | {'CWE-285'} | {'https://github.com/advisories/GHSA-8crv-49fr-2h6j', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5007', 'http://www.securityfocus.com/bid/91687', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://pivotal.io/security/cve-2016-5007'} | null |
Maven | GHSA-4qw8-pgpr-p9mq | Bash command injection in Apache Zeppelin | bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. | {'CVE-2019-10095'} | 2022-03-03T05:12:51.431498Z | 2021-09-07T22:56:43Z | HIGH | null | {'CWE-77', 'CWE-78'} | {'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rd56389ba9cab30a6c976b9a4a6df0f85cbe8fba6a60a3cf6e3ba716b@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/apache/zeppelin', 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/02/1', 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cusers.zeppelin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10095'} | null |
Maven | GHSA-4mv7-cq75-3qjm | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack." | {'CVE-2015-7940'} | 2022-03-03T05:13:20.376212Z | 2018-10-17T16:27:50Z | MODERATE | null | {'CWE-200'} | {'http://www.debian.org/security/2015/dsa-3417', 'http://www.openwall.com/lists/oss-security/2015/10/22/9', 'http://www.securitytracker.com/id/1037036', 'http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html', 'http://www.openwall.com/lists/oss-security/2015/10/22/7', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://rhn.redhat.com/errata/RHSA-2016-2036.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://usn.ubuntu.com/3727-1/', 'http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7940', 'http://www.securityfocus.com/bid/79091', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'https://github.com/advisories/GHSA-4mv7-cq75-3qjm', 'http://www.securitytracker.com/id/1037046', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1037053'} | null |
Maven | GHSA-cvj4-g3gx-8vqq | Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request | Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation. | {'CVE-2017-14949'} | 2022-04-26T21:37:05Z | 2018-10-17T00:04:18Z | HIGH | null | {'CWE-611'} | {'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://lgtm.com/blog/restlet_CVE-2017-14949', 'https://github.com/advisories/GHSA-cvj4-g3gx-8vqq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14949', 'https://github.com/restlet/restlet-framework-java'} | null |
Maven | GHSA-q74r-4xw3-ppx9 | Stored cross-site scripting in Grid component in Vaadin 7 and 8 | Missing variable sanitization in `Grid` component in `com.vaadin:vaadin-server` versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector.
- https://vaadin.com/security/cve-2019-25028 | {'CVE-2019-25028'} | 2022-03-03T05:13:37.458448Z | 2021-04-19T14:49:48Z | MODERATE | null | {'CWE-80', 'CWE-79'} | {'https://github.com/vaadin/framework/pull/11645', 'https://vaadin.com/security/cve-2019-25028', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25028', 'https://github.com/vaadin/framework/pull/11644', 'https://github.com/vaadin/framework/security/advisories/GHSA-q74r-4xw3-ppx9'} | null |
Maven | GHSA-g644-pr5v-vppf | Insertion of Sensitive Information into Log File in Apache NiFi | In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext. | {'CVE-2020-9486'} | 2022-03-03T05:14:10.953929Z | 2022-01-06T20:41:02Z | HIGH | null | {'CWE-532'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9486', 'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0', 'https://nifi.apache.org/security#CVE-2020-9486'} | null |
Maven | GHSA-cvx5-m8vg-vxgc | Arbitrary filesystem write access from velocity. | ### Impact
The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File.
### Patches
The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1.
### Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
### References
https://jira.xwiki.org/browse/XWIKI-5168
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)
| {'CVE-2022-24897'} | 2022-05-03T18:01:48.701710Z | 2022-04-28T21:16:40Z | HIGH | null | {'CWE-22'} | {'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8', 'https://github.com/xwiki/xwiki-commons', 'https://jira.xwiki.org/browse/XWIKI-5168', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'} | null |
Maven | GHSA-59j4-wjwp-mw9m | Sandbox Bypass in Apache Velocity Engine | An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2. | {'CVE-2020-13936'} | 2022-04-22T18:30:29.314950Z | 2022-01-06T20:32:36Z | HIGH | null | {'CWE-20'} | {'https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340@%3Cdev.ws.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html', 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726@%3Cdev.ws.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13936', 'https://security.gentoo.org/glsa/202107-52', 'https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a@%3Cuser.velocity.apache.org%3E', 'https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436@%3Cdev.ws.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E', 'https://github.com/apache/velocity-engine', 'https://lists.apache.org/thread.html/r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9@%3Cdev.ws.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/10/1', 'https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E', 'https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad@%3Cdev.ws.apache.org%3E'} | null |
Maven | GHSA-p99p-726h-c8v5 | Moderate severity vulnerability that affects org.apache.juddi:juddi-client | In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5. | {'CVE-2018-1307'} | 2022-03-03T05:12:52.456432Z | 2018-10-19T16:42:15Z | HIGH | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-p99p-726h-c8v5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1307', 'https://issues.apache.org/jira/browse/JUDDI-987', 'http://juddi.apache.org/security.html'} | null |
Maven | GHSA-qg5x-66hp-cw5p | Uncontrolled Resource Consumption in Apache DolphinScheduler | Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks. Apache DolphinScheduler users should upgrade to version 2.0.5 or higher. | {'CVE-2022-25598'} | 2022-04-05T19:00:44.938606Z | 2022-03-31T00:00:23Z | HIGH | null | {'CWE-400'} | {'https://github.com/apache/dolphinscheduler', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25598', 'https://lists.apache.org/thread/hwnw7xr969sg5nv84wz75nfr2c76fl93'} | null |
Maven | GHSA-2f88-5hg8-9x2x | Origin Validation Error in Apache Maven | Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html | {'CVE-2021-26291'} | 2022-04-22T16:02:01.187891Z | 2021-06-16T17:32:49Z | CRITICAL | null | {'CWE-346'} | {'https://lists.apache.org/thread.html/rcd6c3a36f1dbc130da1b89d0f320db7040de71661a512695a8d513ac@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r78fb6d2cf0ca332cfa43abd4471e75fa6c517ed9cdfcb950bff48d40@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re75f8b3dbc5faa1640908f87e644d373e00f8b4e6ba3e2ba4bd2c80b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r71bc13669be84c2ff45b74a67929bc2da905c152e12a39b406e3c2a0@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/ra88a0eba7f84658cefcecc0143fd8bbad52c229ee5dfcbfdde7b6457@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/r08a401f8c98a99f68d061fde6e6659d695f28d60fe4f0413bcb355b0@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra9d984eccfd2ae7726671e025f0296bf03786e5cdf872138110ac29b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r39fa6ec4b7e912d3e04ea68efd23e554ec9c8efa2c96f5b45104fc61@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r7212b874e575e59d648980d91bc22e684906aee9b211ab92da9591f5@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r74329c671df713f61ae4620ee2452a0443ccad7f33c60e8ed7d21ff9@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r86aebd0387ae19b740b3eb28bad83fe6aceca0d6257eaa810a6e0002@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0a5e4ff2a7ca7ad8595d7683afbaeb3b8788ba974681907f97e7dc8e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r0d083314aa3934dd4b6e6970d1f6ee50f6eaa9d867deb2cd96788478@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26291', 'https://lists.apache.org/thread.html/r5ae6aaa8a2ce86145225c3516bb45d315c0454e3765d651527e5df8a@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r06db4057b74e0598a412734f693a34a8836ac6f06d16d139e5e1027c@%3Cdev.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/red3bf6cbfd99e36b0c0a4fa1cea1eef1eb300c6bd8f372f497341265@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r340e75c9bb6e8661b89e1cf2c52f4638a18312e57bd884722bc28f52@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r86e1c81e03f441855f127980e9b3d41939d04a7caea2b7ab718e2288@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r53cd5de57aaa126038c5301d8f518f3defab3c5b1c7e17c97bad08d8@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r52c6cda14dc6315dc79e72d30109f4589e9c6300ef6dc1a019da32d4@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc7ae2530063d1cd1cf8e9fa130d10940760f927168d4063d23b8cd0a@%3Ccommits.kafka.apache.org%3E', 'https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/', 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r30e9fcba679d164158cc26236704c351954909c18cb2485d11038aa6@%3Cdev.kafka.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/04/23/5', 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r3f0450dcab7e63b5f233ccfbc6fca5f1867a75c8aa2493ea82732381@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r0556ce5db7231025785477739ee416b169d8aff5ee9bac7854d64736@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-43fp-vwwg-qgv6 | Moderate severity vulnerability that affects org.apache.nifi:nifi | When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | {'CVE-2018-17194'} | 2022-03-03T05:14:20.578569Z | 2018-12-20T22:02:32Z | HIGH | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-43fp-vwwg-qgv6', 'https://nifi.apache.org/security.html#CVE-2018-17194', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17194'} | null |
Maven | GHSA-w3gh-g32m-cvhr | High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3 | Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters. | {'CVE-2018-8038'} | 2022-03-03T05:13:46.576561Z | 2018-10-18T16:56:47Z | HIGH | null | {'CWE-20'} | {'http://www.securitytracker.com/id/1041220', 'https://github.com/advisories/GHSA-w3gh-g32m-cvhr', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8038', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/f0a6a05ec3b3a00458da43712b0ff3a2f573175d9bfb39fb0de21424@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
Maven | GHSA-c77r-6f64-478q | Moderate severity vulnerability that affects org.keycloak:keycloak-core | It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response. | {'CVE-2017-2582'} | 2022-03-03T05:13:38.650900Z | 2018-10-18T16:49:40Z | MODERATE | null | {'CWE-200', 'CWE-201'} | {'https://github.com/advisories/GHSA-c77r-6f64-478q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2582'} | null |
Maven | GHSA-xv5h-v7jh-p2qh | Authentication bypass for specific endpoint | The [`ConfigOpsController`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java) lets the user perform management operations like querying the database or even wiping it out. While the [`/data/remove`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L133-L135) endpoint is properly protected with the `@Secured` annotation, the [`/derby`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L99-L100) endpoint is not protected and can be openly accessed by unauthenticated users.
For example, the following request will list the tables of the database:
```
❯ curl -X GET 'http://console.nacos.io/nacos/v1/cs/ops/derby?sql=select+st.tablename+from+sys.systables+st'
{"code":200,"message":null,"data":[{"TABLENAME":"APP_CONFIGDATA_RELATION_PUBS"},{"TABLENAME":"APP_CONFIGDATA_RELATION_SUBS"},{"TABLENAME":"APP_LIST"},{"TABLENAME":"CONFIG_INFO"},{"TABLENAME":"CONFIG_INFO_AGGR"},{"TABLENAME":"CONFIG_INFO_BETA"},{"TABLENAME":"CONFIG_INFO_TAG"},{"TABLENAME":"CONFIG_TAGS_RELATION"},{"TABLENAME":"GROUP_CAPACITY"},{"TABLENAME":"HIS_CONFIG_INFO"},{"TABLENAME":"PERMISSIONS"},{"TABLENAME":"ROLES"},{"TABLENAME":"SYSALIASES"},{"TABLENAME":"SYSCHECKS"},{"TABLENAME":"SYSCOLPERMS"},{"TABLENAME":"SYSCOLUMNS"},{"TABLENAME":"SYSCONGLOMERATES"},{"TABLENAME":"SYSCONSTRAINTS"},{"TABLENAME":"SYSDEPENDS"},{"TABLENAME":"SYSDUMMY1"},{"TABLENAME":"SYSFILES"},{"TABLENAME":"SYSFOREIGNKEYS"},{"TABLENAME":"SYSKEYS"},{"TABLENAME":"SYSPERMS"},{"TABLENAME":"SYSROLES"},{"TABLENAME":"SYSROUTINEPERMS"},{"TABLENAME":"SYSSCHEMAS"},{"TABLENAME":"SYSSEQUENCES"},{"TABLENAME":"SYSSTATEMENTS"},{"TABLENAME":"SYSSTATISTICS"},{"TABLENAME":"SYSTABLEPERMS"},{"TABLENAME":"SYSTABLES"},{"TABLENAME":"SYSTRIGGERS"},{"TABLENAME":"SYSUSERS"},{"TABLENAME":"SYSVIEWS"},{"TABLENAME":"TENANT_CAPACITY"},{"TABLENAME":"TENANT_INFO"},{"TABLENAME":"USERS"}]}%
```
These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql) | {'CVE-2021-29442'} | 2022-03-03T05:13:15.557718Z | 2021-04-27T20:09:25Z | HIGH | null | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29442', 'https://github.com/alibaba/nacos/issues/4463', 'https://github.com/advisories/GHSA-36hp-jr8h-556f', 'https://github.com/alibaba/nacos/pull/4517'} | null |
Maven | GHSA-4487-x383-qpph | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles. | {'CVE-2018-1272'} | 2022-03-03T05:14:14.101094Z | 2018-10-17T20:27:47Z | HIGH | null | null | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://pivotal.io/security/cve-2018-1272', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securityfocus.com/bid/103697', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1272', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://github.com/advisories/GHSA-4487-x383-qpph'} | null |
Maven | GHSA-jgwr-3qm3-26f3 | Potential remote code execution in Apache Tomcat | The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. | {'CVE-2021-25329'} | 2022-03-03T05:13:17.256982Z | 2021-03-19T20:11:13Z | CRITICAL | null | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210409-0002/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/apache/tomcat', 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/01/2', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25329', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4891', 'https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E', 'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E'} | null |
Maven | GHSA-h8w4-qv99-f7vj | High severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth2 | Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient). | {'CVE-2018-15758'} | 2022-03-03T05:13:57.213171Z | 2018-10-19T22:00:28Z | HIGH | null | null | {'https://access.redhat.com/errata/RHSA-2019:2413', 'https://pivotal.io/security/cve-2018-15758', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15758', 'https://github.com/advisories/GHSA-h8w4-qv99-f7vj', 'http://www.securityfocus.com/bid/105687'} | null |
Maven | GHSA-2hpg-vwqj-6h6w | Authentication bypass in Apache Kylin | Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone. | {'CVE-2020-13937'} | 2022-03-03T05:13:15.260629Z | 2022-02-10T20:25:56Z | MODERATE | null | {'CWE-922'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13937', 'https://lists.apache.org/thread.html/rc592e0dcee5a2615f1d9522af30ef1822c1f863d5e05e7da9d1e57f4%40%3Cuser.kylin.apache.org%3E'} | null |
Maven | GHSA-6w39-qhmq-g8cp | CSRF vulnerability in Jenkins Publish Over FTP Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials. | {'CVE-2022-29050'} | 2022-05-04T21:03:09.782938Z | 2022-04-13T00:00:16Z | HIGH | null | {'CWE-352'} | {'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'} | null |
Maven | GHSA-65fg-84f6-3jq3 | SQL Injection in Log4j 1.2.x | By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | {'CVE-2022-23305'} | 2022-04-22T15:47:06.606772Z | 2022-01-21T23:26:47Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23305', 'https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y', 'https://logging.apache.org/log4j/1.2/index.html', 'http://www.openwall.com/lists/oss-security/2022/01/18/4', 'https://github.com/apache/logging-log4j1', 'https://security.netapp.com/advisory/ntap-20220217-0007/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-f9hv-mg5h-xcw9 | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization. | {'CVE-2018-19360'} | 2022-03-03T05:12:35.261196Z | 2019-01-04T19:06:57Z | CRITICAL | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://github.com/advisories/GHSA-f9hv-mg5h-xcw9', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Maven | GHSA-qqv6-5w6p-3pgr | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java. | {'CVE-2018-20594'} | 2022-03-03T05:13:53.425384Z | 2019-01-04T17:43:30Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20594', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f', 'https://github.com/hs-web/hsweb-framework', 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'} | null |
Maven | GHSA-7fr2-94h7-ccg2 | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information. | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information. | {'CVE-2020-35209'} | 2022-03-03T05:13:55.439793Z | 2021-12-17T20:41:33Z | HIGH | null | null | {'https://docs.google.com/presentation/d/1W5KU7ffh4dheR8iD54ulABImi6byAhSI-OhEKw2adRo/edit?usp=sharing', 'https://github.com/atomix/atomix', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35209'} | null |
Maven | GHSA-j823-4qch-3rgm | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill). | {'CVE-2020-14060'} | 2022-03-03T05:13:24.556259Z | 2020-06-18T14:44:46Z | HIGH | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2688', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14060', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-f9xh-2qgp-cq57 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource. | {'CVE-2020-36188'} | 2022-04-22T18:30:14.555358Z | 2021-12-09T19:16:42Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36188', 'https://github.com/FasterXML/jackson-databind/issues/2996', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-vp37-2f9p-3vr3 | Cross-site Scripting in OWASP AntiSamy | AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367. | {'CVE-2022-29577'} | 2022-05-04T04:04:21.229446Z | 2022-04-23T00:03:04Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-29577', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.7', 'https://github.com/nahsra/antisamy', 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'} | null |
Maven | GHSA-w9jg-gvgr-354m | Resource Exhaustion in Spring Security | Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions. | {'CVE-2021-22119'} | 2022-03-03T05:12:41.141550Z | 2021-07-02T18:33:34Z | HIGH | null | {'CWE-863', 'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22119', 'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2021-22119', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E', 'https://github.com/spring-projects/spring-security/pull/9513', 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E'} | null |
Maven | GHSA-wrqf-rrrw-w3mg | Code injection in Apache Druid | Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process. | {'CVE-2021-25646'} | 2022-03-03T05:13:44.303972Z | 2021-06-16T17:40:47Z | HIGH | null | {'CWE-732'} | {'https://lists.apache.org/thread.html/r121abe8014d381943b63c60615149d40bde9dc1c868bcee90d0d0848@%3Ccommits.druid.apache.org%3E', 'http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html', 'https://lists.apache.org/thread.html/r4f84b542417ea46202867c0a8b3eaf3b4cfed30e09174a52122ba210@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25646', 'https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r20e0c3b10ae2c05a3aad40f1476713c45bdefc32c920b9986b941d8f@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc167d5e57f3120578718a7a458ce3e73b3830ac4efbb1b085bd06b92@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rea9436a4063927a567d698431ddae55e760c3f876c22ac5b9813685f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfeb775822cd3baef1595b60f6860f5ca849eb1903236483f3297bd5c@%3Ccommits.druid.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/29/6', 'https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-g23v-p5jq-jvh4 | Infinite loop in Apache CFX | A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely. This issue affects Apache CXF versions prior to 3.4.4; Apache CXF versions prior to 3.3.11. | {'CVE-2021-30468'} | 2022-04-22T16:02:00.020875Z | 2022-01-06T18:37:14Z | HIGH | null | {'CWE-400', 'CWE-835'} | {'https://lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/16/2', 'https://lists.apache.org/thread.html/re9e05c6cab5f0dcc827eba4e6fcf26fa0b493e7ca84d62c867a80d03@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rac07822057521dccf33ab5d136e0e8c599a6e2c8ac75e44ffbdc6e07@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3f46ae38e4a6e80c069cdb320e0ce831b0a21a12ef0cc92c0943f34a@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://cxf.apache.org/security-advisories.data/CVE-2021-30468.txt.asc', 'https://lists.apache.org/thread.html/re5b2a2b77faa22684d47bd2ac6623135c615565328ff40a1ec705448@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r4771084730c4cf6e59eda60b4407122c86f174eb750b24f610ba9ff4@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210917-0002/', 'https://lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cusers.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30468', 'https://lists.apache.org/thread.html/r54c0f1cbbb9f381dfbedb9ea5e90ecb1c0a15371f40c4b10322ac737@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ra833f78b3fa577cb43558cf343859a1bf70b1c5ce2353b3877d96422@%3Ccommits.tomee.apache.org%3E'} | null |
Maven | GHSA-3pp3-77j6-8ph6 | Missing Authentication for Critical Function in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens. | {'CVE-2020-9487'} | 2022-03-03T05:12:05.656413Z | 2022-01-06T20:41:04Z | HIGH | null | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9487', 'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042', 'https://nifi.apache.org/security#CVE-2020-9487'} | null |
Maven | GHSA-75xc-qvxh-27f8 | Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8 | Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack
- https://vaadin.com/security/cve-2021-31403 | {'CVE-2021-31403'} | 2022-03-03T05:13:44.786638Z | 2021-04-19T14:51:06Z | MODERATE | null | {'CWE-208', 'CWE-203'} | {'https://github.com/vaadin/framework/pull/12188', 'https://github.com/vaadin/framework/pull/12190', 'https://vaadin.com/security/cve-2021-31403', 'https://github.com/vaadin/framework/security/advisories/GHSA-75xc-qvxh-27f8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31403'} | null |
Maven | GHSA-7q9c-h23x-65fq | Moderate severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth2 | When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type. | {'CVE-2016-4977'} | 2022-03-03T05:13:14.141279Z | 2018-10-18T18:06:22Z | HIGH | null | null | {'https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0@%3Cdev.fineract.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/10/16/1', 'https://github.com/advisories/GHSA-7q9c-h23x-65fq', 'https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488@%3Cdev.fineract.apache.org%3E', 'https://pivotal.io/security/cve-2016-4977', 'https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274@%3Cdev.fineract.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4977'} | null |
Maven | GHSA-p5gm-fgfx-hr7h | Gadget chain attack in Nippy | A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface. | {'CVE-2020-24164'} | 2021-05-04T21:47:51Z | 2022-02-10T20:55:10Z | HIGH | null | {'CWE-502'} | {'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2', 'https://github.com/ptaoussanis/nippy/issues/130', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24164'} | null |
Maven | GHSA-6x48-j4x4-cqw3 | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file. | {'CVE-2018-8009'} | 2022-03-03T05:13:27.955245Z | 2018-12-21T17:50:29Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/research/zip-slip-vulnerability', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-cve-mitre-org-cgi-bin-cvename-cgi-name-cve-2018-8009-zip-slip-impact-on-apache-hadoop', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8009', 'https://lists.apache.org/thread.html/a1c227745ce30acbcf388c5b0cc8423e8bf495d619cd0fa973f7f38d@%3Cuser.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E', 'http://www.securityfocus.com/bid/105927', 'https://github.com/advisories/GHSA-6x48-j4x4-cqw3'} | null |
Maven | GHSA-j53j-gmr9-h8g3 | Moderate severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser. | {'CVE-2018-8017'} | 2022-03-03T05:13:03.543724Z | 2018-10-17T15:50:31Z | MODERATE | null | {'CWE-835'} | {'https://github.com/advisories/GHSA-j53j-gmr9-h8g3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8017', 'http://www.securityfocus.com/bid/105513', 'https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91@%3Cdev.tika.apache.org%3E', 'https://github.com/apache/tika'} | null |
Maven | GHSA-gg9m-fj3v-r58c | REST Plugin in Apache Struts uses an XStreamHandler with an instance of XStream for deserialization without any type filtering | The REST Plugin in Apache Struts 2.1.2 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads. | {'CVE-2017-9805'} | 2022-04-26T19:15:51.212536Z | 2018-10-16T19:37:56Z | HIGH | null | {'CWE-502'} | {'https://www.kb.cert.org/vuls/id/112992', 'https://lgtm.com/blog/apache_struts_CVE-2017-9805', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9805', 'https://security.netapp.com/advisory/ntap-20170907-0001/', 'https://www.exploit-db.com/exploits/42627/', 'http://www.securityfocus.com/bid/100609', 'https://github.com/advisories/GHSA-gg9m-fj3v-r58c', 'https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax', 'http://www.securitytracker.com/id/1039263', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'https://struts.apache.org/docs/s2-052.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1488482', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://cwiki.apache.org/confluence/display/WW/S2-052'} | null |
Maven | GHSA-227w-wv4j-67h4 | Class Loading Vulnerability in Artemis | ### Impact
This affects all Artemis users who test Java assignments. **Ares is not required.**
Students code that gets automatically tested can run arbitrary code in the container,
or arbitrary code on the machine of an assessor in case of manual correction.
### Patches
The problem cannot be resolved easily in Ares itself. Use the Maven Enforcer Plugin as follows:
```xml
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-enforcer-plugin</artifactId>
<version>3.0.0</version>
<executions>
<execution>
<id>enforce-no-student-code-in-trusted-packages</id>
<phase>process-classes</phase>
<goals>
<goal>enforce</goal>
</goals>
</execution>
</executions>
<configuration>
<rules>
<requireFilesDontExist>
<files>
<!-- ADD HERE THE RULES ARES TELLS YOU ARE MISSING -->
</files>
</requireFilesDontExist>
</rules>
</configuration>
</plugin>
```
This fails the build if student classes reside in such packages that Ares trusts. Trusted packages added in Ares using `@AddTrustedPackage` should be added as well.
### For more information
If you have any questions or comments about this advisory:
* Open a discussion https://github.com/ls1intum/Ares/discussions
* Open an issue in https://github.com/ls1intum/Ares/issues
* Email us, see https://github.com/ls1intum/Ares/security/policy
### References
See the assignment of Julius that passes the tests in TUM Artemis course: "Test - Praktikum: Grundlagen der Programmierung (Testkurs für Tutoren) - Security Tests" (if that still exists in 2022).
Also see #15 for almost the same problem.
| null | 2022-03-03T05:13:55.319882Z | 2022-02-09T22:30:30Z | HIGH | null | {'CWE-653', 'CWE-501'} | {'https://github.com/ls1intum/Ares/issues/15', 'https://github.com/ls1intum/Ares', 'https://github.com/ls1intum/Ares/releases/tag/1.8.0', 'https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4'} | null |
Maven | GHSA-hxp5-8pgq-mgv9 | Missing Authentication for Critical Function in Apache Calcite | "HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore." | {'CVE-2020-13955'} | 2022-03-03T05:13:26.228267Z | 2021-04-22T16:14:14Z | MODERATE | null | {'CWE-295'} | {'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15', 'https://issues.apache.org/jira/browse/CALCITE-4298', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955', 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E'} | null |
Maven | GHSA-rf7q-xqm3-6923 | Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML | Cross-site scripting (XSS) vulnerability in the create user functionality in the policy admin tool in Apache Ranger before 0.6.1 allows remote authenticated administrators to inject arbitrary web script or HTML via vectors related to policies. | {'CVE-2016-5395'} | 2022-04-27T14:00:07.089691Z | 2018-10-17T17:21:37Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-rf7q-xqm3-6923', 'http://www.securityfocus.com/bid/92577', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5395'} | null |
Maven | GHSA-5h26-c766-g93v | Cross-Site Scripting | A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity. | {'CVE-2021-20293'} | 2022-03-03T05:14:08.493716Z | 2021-06-15T15:59:27Z | HIGH | null | {'CWE-79'} | {'https://security.netapp.com/advisory/ntap-20210727-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20293', 'https://bugzilla.redhat.com/show_bug.cgi?id=1942819'} | null |
Maven | GHSA-j7c3-96rf-jrrp | Critical vulnerability in log4j may affect generated PEAR projects | ### Impact
UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228.
### Patches
- The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2.0.1`. Please make sure to use `de.averbis.textanalysis:pear-archetype ` version >= `2.0.1` for generating new PEAR projects.
- Existing maven PEAR projects can be patched by manually upgrading to `log4j` >= `2.16.0` in `pom.xml`.
### References
https://www.lunasec.io/docs/blog/log4j-zero-day/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/averbis/pear-archetype/issues
| null | 2021-12-16T18:57:47Z | 2021-12-16T21:01:51Z | CRITICAL | null | null | {'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb', 'https://github.com/averbis/pear-archetype', 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp'} | null |
Maven | GHSA-f8vc-wfc8-hxqh | Improper Privilege Management in Apache Hadoop | In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification. | {'CVE-2020-9492'} | 2022-03-03T05:13:35.486633Z | 2022-02-09T22:17:38Z | HIGH | null | {'CWE-863', 'CWE-269'} | {'https://github.com/apache/hadoop', 'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d', 'https://lists.apache.org/thread.html/r9328eb49305e4cacc80e182bfd8a2efd8e640d940e24f5bfd7d5cb26@%3Cissues.solr.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9492', 'https://lists.apache.org/thread.html/rc0057ebf32b646ab47f7f5744a8948332e015c39044cbb9d87ea76cd@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r513758942356ccd0d14538ba18a09903fc72716d74be1cb727ea91ff%40%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r4a57de5215494c35c8304cf114be75d42df7abc6c0c54bf163c3e370@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rca4516b00b55b347905df45e5d0432186248223f30497db87aba8710@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r49c9ab444ab1107c6a8be8a0d66602dec32a16d96c2631fec8d309fb@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r79201a209df9a4e7f761e537434131b4e39eabec4369a7d668904df4@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r79323adac584edab99fd5e4b52a013844b784a5d4b600da0662b33d6@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb12afaa421d483863c4175e42e5dbd0673917a3cff73f3fca4f8275f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/re4129c6b9e0410848bbd3761187ce9c19bc1cd491037b253007df99e@%3Cissues.solr.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210304-0001/', 'https://lists.apache.org/thread.html/r0a534f1cde7555f7208e9f9b791c1ab396d215eaaef283b3a9153429@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6c2fa7949738e9d39606f1d7cd890c93a2633e3357c9aeaf886ea9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r6341f2a468ced8872a71997aa1786ce036242413484f0fa68dc9ca02@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r941e9be04efe0f455d20aeac88516c0848decd7e7b1d93d5687060f4@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-rcpf-vj53-7h2m | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack. | {'CVE-2018-1257'} | 2022-03-03T05:14:16.104456Z | 2018-10-17T20:02:20Z | MODERATE | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1257', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://pivotal.io/security/cve-2018-1257', 'https://github.com/advisories/GHSA-rcpf-vj53-7h2m', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:3768', 'http://www.securityfocus.com/bid/104260', 'https://access.redhat.com/errata/RHSA-2018:1809'} | null |
Maven | GHSA-4w4p-xwrr-9crh | Injection in Apache Syncope | Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered. | {'CVE-2020-1961'} | 2022-03-03T05:14:20.591494Z | 2021-06-16T17:18:49Z | HIGH | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1961', 'http://syncope.apache.org/security'} | null |
Maven | GHSA-fv3m-xhqw-9m79 | ballcat-codegen template engine remote code execution injection | ### Impact
Ballcat Codegen provides the function of online editing code to generate templates.
In version < 1.0.0.beta.2, since Velocity and freemarker templates are introduced but input verification is not done, attackers can implement remote code execution through malicious code injection of the template engine.
### Patches
The fault is rectified and needs to be upgraded to the latest version. | {'CVE-2022-24881'} | 2022-04-27T21:16:49.063003Z | 2022-04-27T21:05:15Z | HIGH | null | {'CWE-78'} | {'https://github.com/ballcat-projects/ballcat-codegen/security/advisories/GHSA-fv3m-xhqw-9m79', 'https://github.com/ballcat-projects/ballcat-codegen/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24881', 'https://github.com/ballcat-projects/ballcat-codegen', 'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.