ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-q5r4-cfpx-h6fh | Improper Handling of Length Parameter Inconsistency in Apache Ant | When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected. | {'CVE-2021-36373'} | 2022-04-22T15:47:36.592796Z | 2021-08-02T16:56:17Z | MODERATE | null | {'CWE-130'} | {'https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36373', 'https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210819-0007/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46%40%3Cuser.ant.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://ant.apache.org/security.html'} | null |
Maven | GHSA-f5f4-m7qp-w6gc | Cross-site Scripting in Jooby | Jooby before 1.6.4 has XSS via the default error handler. | {'CVE-2019-15477'} | 2021-08-17T22:14:37Z | 2019-08-27T17:40:33Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jooby-project/jooby/pull/1368', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15477'} | null |
Maven | GHSA-v525-c3g5-cg9p | Unsafe Deserialization that can Result in Code Execution | JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data. | {'CVE-2020-36282'} | 2022-03-03T05:12:43.915627Z | 2021-12-10T17:15:49Z | HIGH | null | {'CWE-502'} | {'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36282', 'https://github.com/rabbitmq/rabbitmq-jms-client/issues/135', 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2', 'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638', 'https://medium.com/@ramon93i7/a99645d0448b'} | null |
Maven | GHSA-p93c-h8qm-7256 | Improper escaping in XWiki Platform | XWiki Platform before 12.8 mishandles escaping in the property displayer. | {'CVE-2020-13654'} | 2022-02-09T22:32:29Z | 2022-02-09T22:32:29Z | HIGH | null | {'CWE-116'} | {'https://github.com/xwiki/xwiki-platform/compare/xwiki-platform-12.7.1...xwiki-platform-12.8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13654', 'https://github.com/xwiki/xwiki-platform/pull/1315', 'https://jira.xwiki.org/browse/XWIKI-17374'} | null |
Maven | GHSA-wh8g-3j2c-rqj5 | Serialization gadgets exploit in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource. | {'CVE-2020-35490'} | 2022-04-22T17:30:50.077280Z | 2021-12-09T19:15:00Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/issues/2986', 'https://security.netapp.com/advisory/ntap-20210122-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35490'} | null |
Maven | GHSA-6xx3-rg99-gc3p | Timing based private key exposure in Bouncy Castle | Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.2.1, BC before 1.66, BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures. | {'CVE-2020-15522'} | 2022-03-03T05:13:46.575387Z | 2021-08-13T15:22:31Z | MODERATE | null | {'CWE-362', 'CWE-203'} | {'https://security.netapp.com/advisory/ntap-20210622-0007/', 'https://github.com/bcgit/bc-csharp/wiki/CVE-2020-15522', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-15522', 'https://www.bouncycastle.org/releasenotes.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15522'} | null |
Maven | GHSA-7q4h-pj78-j7vg | Authorization service vulnerable to DDos attacks in Apache CFX | CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10. | {'CVE-2021-22696'} | 2022-04-22T17:02:01.173146Z | 2021-05-13T22:31:05Z | HIGH | null | {'CWE-918', 'CWE-400'} | {'https://cxf.apache.org/security-advisories.data/CVE-2021-22696.txt.asc', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22696', 'https://lists.apache.org/thread.html/r8651c06212c56294a1c0ea61a5ad7790c06502209c03f05c0c7c9914@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r6445001cc5f9a2bb1e6316993753306e054bdd1d702656b7cbe59045@%3Cannounce.apache.org%3E', 'https://github.com/apache/cxf/commit/aa789c5c4686597a7bdef2443909ab491fc2bc04', 'https://lists.apache.org/thread.html/r8651c06212c56294a1c0ea61a5ad7790c06502209c03f05c0c7c9914@%3Cusers.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/apache/cxf', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286', 'http://www.openwall.com/lists/oss-security/2021/04/02/2'} | null |
Maven | GHSA-cjx7-399x-p2rj | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core | With a basic configuration like
```yaml
router:
static-resources:
assets:
enabled: true
mapping: /.assets/public/**
paths: file:/home/lstrmiska/test/
```
it is possible to access any file from a filesystem, using "/../../" in URL, as Micronaut does not restrict file access to configured paths.
**Repro Steps**
- create a file test.txt in /home/lstrmiska
- start micronaut
- execute command
`curl -v --path-as-is "http://localhost:8080/.assets/public/../test.txt"`
### Impact
Micronaut can potentially leak sensitive information.
See https://cwe.mitre.org/data/definitions/22.html
### Patches
```
diff --git a/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java b/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java
index 2f5a91403..19d3b7f05 100644
--- a/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java
+++ b/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java
@@ -69,6 +69,9 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader
@Override
public Optional<InputStream> getResourceAsStream(String path) {
Path filePath = getFilePath(normalize(path));
+ if (pathOutsideBase(filePath)) {
+ return Optional.empty();
+ }
try {
return Optional.of(Files.newInputStream(filePath));
} catch (IOException e) {
@@ -79,7 +82,7 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader
@Override
public Optional<URL> getResource(String path) {
Path filePath = getFilePath(normalize(path));
- if (Files.exists(filePath) && Files.isReadable(filePath) && !Files.isDirectory(filePath)) {
+ if (!pathOutsideBase(filePath) && Files.exists(filePath) && Files.isReadable(filePath) && !Files.isDirectory(filePath)) {
try {
URL url = filePath.toUri().toURL();
return Optional.of(url);
@@ -117,4 +120,15 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader
private Path getFilePath(String path) {
return baseDirPath.map(dir -> dir.resolve(path)).orElseGet(() -> Paths.get(path));
}
+
+ private boolean pathOutsideBase(Path path) {
+ if (baseDirPath.isPresent()) {
+ Path baseDir = baseDirPath.get();
+ if (path.isAbsolute() == baseDir.isAbsolute()) {
+ Path relativePath = baseDir.relativize(path);
+ return relativePath.startsWith("..");
+ }
+ }
+ return false;
+ }
}
--
```
### Workarounds
- do not use ** in mapping, use only * which exposes only flat structure of a directory not allowing traversal
- run micronaut in chroot (linux only)
### References
See https://cwe.mitre.org/data/definitions/22.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Github](https://github.com/micronaut-projects/micronaut-core/issues)
* Email us at [info@micronaut.io](mailto:info@micronaut.io)
| {'CVE-2021-32769'} | 2022-03-03T05:13:16.896198Z | 2021-07-26T21:15:08Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32769', 'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-cjx7-399x-p2rj'} | null |
Maven | GHSA-7xr3-rgwh-pw22 | Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents | A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 are not affected. | {'CVE-2018-8030'} | 2022-04-26T19:15:49.310119Z | 2018-10-16T19:50:39Z | HIGH | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-7xr3-rgwh-pw22', 'http://www.securitytracker.com/id/1041138', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8030', 'https://lists.apache.org/thread.html/1089a4f351a1bdca0618199e53bceeec59a10bf4e3008018d6949876@%3Cusers.qpid.apache.org%3E'} | null |
Maven | GHSA-4fq3-mr56-cg6r | High severity vulnerability that affects org.springframework.data:spring-data-commons | Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack. | {'CVE-2018-1273'} | 2022-03-03T05:14:16.176613Z | 2018-10-17T17:23:24Z | HIGH | null | {'CWE-94'} | {'http://mail-archives.apache.org/mod_mbox/ignite-dev/201807.mbox/%3CCAK0qHnqzfzmCDFFi6c5Jok19zNkVCz5Xb4sU%3D0f2J_1i4p46zQ%40mail.gmail.com%3E', 'https://github.com/advisories/GHSA-4fq3-mr56-cg6r', 'https://pivotal.io/security/cve-2018-1273', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1273'} | null |
Maven | GHSA-c566-2grg-mjwg | Serialization vulnerability in Apache Tapestry | A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version. | {'CVE-2020-17531'} | 2022-03-03T05:12:46.385169Z | 2022-02-09T22:50:50Z | CRITICAL | null | {'CWE-502'} | {'https://security.netapp.com/advisory/ntap-20210115-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17531', 'https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76@%3Cusers.tapestry.apache.org%3E'} | null |
Maven | GHSA-9vjp-v76f-g363 | SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way | ### Impact
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well.
This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
### Impact
All users of SnappyFrameDecoder are affected and so the application may be in risk for a DoS attach due excessive memory usage.
### References
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185 | {'CVE-2021-37137'} | 2022-04-22T15:47:02.537330Z | 2021-09-09T17:11:31Z | HIGH | null | {'CWE-400'} | {'https://github.com/netty/netty', 'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37137', 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L79', 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L185', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/SnappyFrameDecoder.java#L171', 'https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363', 'https://security.netapp.com/advisory/ntap-20220210-0012/', 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-6vvh-5794-vpmj | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages. | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages. | {'CVE-2020-35216'} | 2022-03-03T05:13:07.430577Z | 2021-12-17T20:40:58Z | MODERATE | null | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35216', 'https://github.com/atomix/atomix', 'https://docs.google.com/presentation/d/1woXwR3vciv7ltFan6LyK5vsWXmaUi8ArZonhk80Gr5U/edit?usp=sharing'} | null |
Maven | GHSA-q3jg-4c82-j4xh | Moderate severity vulnerability that affects org.springframework.credhub:spring-credhub-core | Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service. | {'CVE-2018-15795'} | 2022-03-03T05:13:54.452077Z | 2018-11-29T21:30:30Z | HIGH | null | {'CWE-338'} | {'https://github.com/advisories/GHSA-q3jg-4c82-j4xh', 'https://pivotal.io/security/cve-2018-15795', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15795', 'http://www.securityfocus.com/bid/105915'} | null |
Maven | GHSA-f4cj-3q3h-884r | Partial authorization bypass on document save in xwiki-platform | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has been patched in XWiki 13.0. The only workaround is to give SCRIPT right only to trusted users. | {'CVE-2022-23615'} | 2022-05-05T18:01:28Z | 2022-02-09T21:21:53Z | MODERATE | null | {'CWE-863'} | {'https://jira.xwiki.org/browse/XWIKI-5024', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615', 'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'} | null |
Maven | GHSA-r58x-wjg8-63m9 | Denial of Service in Apache James | In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time without back-tracking. | {'CVE-2021-40110'} | 2022-03-03T05:13:49.132882Z | 2022-01-08T00:40:30Z | HIGH | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-40110', 'http://www.openwall.com/lists/oss-security/2022/01/04/2', 'https://www.openwall.com/lists/oss-security/2022/01/04/2'} | null |
Maven | GHSA-xxfh-x98p-j8fr | Remote code injection in Log4j (through pax-logging-log4j2) | ### Impact
Remote Code Execution.
### Patches
Users of pax-logging 1.11.9 should update to 1.11.10.
Users of pax-logging 2.0.10 should update to 2.0.11.
### Workarounds
Set system property `-Dlog4j2.formatMsgNoLookups=true`
### References
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
| null | 2022-03-03T05:13:27.542391Z | 2021-12-10T20:15:37Z | CRITICAL | null | null | {'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/ops4j/org.ops4j.pax.logging', 'https://github.com/ops4j/org.ops4j.pax.logging/security/advisories/GHSA-xxfh-x98p-j8fr'} | null |
Maven | GHSA-jv74-f9pj-xp3f | Apache Camel's Mail is vulnerable to path traversal | Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal. | {'CVE-2018-8041'} | 2022-04-26T19:30:15.361767Z | 2018-10-16T23:07:57Z | MODERATE | null | {'CWE-22'} | {'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-jv74-f9pj-xp3f', 'https://issues.apache.org/jira/browse/CAMEL-12630', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8041', 'http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2', 'https://access.redhat.com/errata/RHSA-2018:3768', 'http://www.securityfocus.com/bid/105352'} | null |
Maven | GHSA-p5hg-3xm3-gcjg | Spring Framework allows applications to expose STOMP over WebSocket endpoints | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. | {'CVE-2018-1270'} | 2022-04-27T15:16:58.755111Z | 2018-10-17T20:05:59Z | CRITICAL | null | {'CWE-358', 'CWE-94'} | {'https://pivotal.io/security/cve-2018-1270', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.exploit-db.com/exploits/44796/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-p5hg-3xm3-gcjg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1270', 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'http://www.securityfocus.com/bid/103696', 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'} | null |
Maven | GHSA-h3hw-g4hm-7gr4 | SQL injection without credentials in ming-soft MCMS | An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do. | {'CVE-2020-23262'} | 2022-03-03T05:13:42.791325Z | 2022-02-09T22:18:13Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/ming-soft/MCMS/issues/45', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23262'} | null |
Maven | GHSA-66q9-f7ff-mmx6 | Local file inclusion vulnerability in http4s | ### Impact
This vulnerability applies to all users of:
* `org.http4s.server.staticcontent.FileService`
* `org.http4s.server.staticcontent.ResourceService`
* `org.http4s.server.staticcontent.WebjarService`
#### Path escaping
URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can expose resources outside of the configured location. Specifically:
* `FileService` may expose any file on the local file system.
* `ResourceService` may expose any resource on the class path.
#### Prefix matching
When the service is configured with a non-empty `pathPrefix` that doesn't end in a slash, any directories whose names are a prefix of `systemPath` (from `FileService`) or `pathPrefix` (from `ResourceService`) are exposed. For example, if `pathPrefix` is `/foo` and `systemPath` is `/bar`, a request to `/foobaz/quux.txt` exposes file `/barbaz/quux.txt`, when only files beneath `/bar` should be available.
#### URI decoding
URI segments are not decoded before resource resolution. This causes resources with reserved characters in their name to incorrectly return a 404. It also may incorrectly expose the rare resource whose name is URI encoded. This applies to `FileService`, `ResourceService`, and `WebjarService`.
### Patches
In all three services, paths with an empty segment, a `.` segment, or a `..` segment are now rejected with a `400 Bad Request` response. This fixes exposure outside the configured root. Many clients already eliminate dot segments according to the rules in [RFC3986, Section 5.2.4](https://tools.ietf.org/html/rfc3986#section-5.2.4). A middleware that does so at the server level may be considered if there is demand.
If `pathInfo` is non-empty, and does not begin with `/`, then a 404 response is generated. This fixes the prefix matching exposure.
All path segments are URI decoded before being passed to the file system or resource path. This allows resolution of resources with reserved characters in the name, and prevents incorrect exposure of resources whose names are themselves URI encoded.
### Workarounds
The recommended course is to upgrade:
* v0.18.26, binary compatible with the 0.18.x series
* v0.20.20, binary compatible with the 0.20.x series
* v0.21.2, binary compatible with the 0.21.x series
Note that 0.19.0 is a deprecated release and has never been supported.
If an upgrade is impossible:
* Temporarily copy `FileService.scala`, `ResourceService.scala`, and `WebjarService.scala` from the appropriate release series into your project and recompile with that, changing the package name and reference in your application.
* Users of a servlet backend can use the servlet container's file serving capabilities.
### Credits
Thank you to Thomas Gøytil for the discovery, responsible disclosure, and assistance testing of this vulnerability.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http4s/http4s](http://github.com/http4s/http4s)
* Email a maintainer:
* [Ross A. Baker](mailto:ross@rossabaker.com) | {'CVE-2020-5280'} | 2022-03-03T05:13:32.942852Z | 2020-03-25T17:35:51Z | CRITICAL | null | {'CWE-23'} | {'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5280', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/security/advisories/GHSA-66q9-f7ff-mmx6', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec'} | null |
Maven | GHSA-4r7g-7cpj-5jr7 | Moderate severity vulnerability that affects org.apache.qpid:qpid-broker | In Apache Qpid Broker-J versions 6.1.0 through 6.1.4 (inclusive) the broker does not properly enforce a maximum frame size in AMQP 1.0 frames. A remote unauthenticated attacker could exploit this to cause the broker to exhaust all available memory and eventually terminate. Older AMQP protocols are not affected. | {'CVE-2017-15701'} | 2022-03-03T05:14:04.288699Z | 2018-10-19T16:41:15Z | HIGH | null | {'CWE-400'} | {'https://lists.apache.org/thread.html/4054e1c90993f337eeea24a312841c0661653e673c0ff8e2cd9520fe@%3Cdev.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-4r7g-7cpj-5jr7', 'http://www.securityfocus.com/bid/102041', 'https://qpid.apache.org/cves/CVE-2017-15701.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15701', 'https://issues.apache.org/jira/browse/QPID-7947'} | null |
Maven | GHSA-q42q-523g-3fwv | Cross-Site Request Forgery | This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie. | {'CVE-2020-7780'} | 2022-03-03T05:13:51.448943Z | 2022-02-09T23:06:40Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7780', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1045352', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046655', 'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046654', 'https://github.com/softwaremill/akka-http-session/issues/74', 'https://github.com/softwaremill/akka-http-session/issues/77'} | null |
Maven | GHSA-8674-26jc-wh98 | Improper Access Control in infinispan-server-runtime | A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role. | {'CVE-2020-25711'} | 2022-03-03T05:13:23.540649Z | 2022-02-09T22:56:32Z | MODERATE | null | {'CWE-269', 'CWE-862'} | {'https://security.netapp.com/advisory/ntap-20220210-0023/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25711', 'https://bugzilla.redhat.com/show_bug.cgi?id=1897618'} | null |
Maven | GHSA-wc73-w5r9-x9pc | Cross-site Scripting in XXL-JOB | XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java. | {'CVE-2020-29204'} | 2022-03-03T05:13:46.595872Z | 2021-10-12T16:41:36Z | MODERATE | null | {'CWE-79'} | {'https://github.com/xuxueli/xxl-job', 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e', 'https://github.com/xuxueli/xxl-job/issues/2083', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29204'} | null |
Maven | GHSA-2fw5-rvf2-jq56 | High severity vulnerability that affects org.apache.camel:camel-core | The XSLT component in Apache Camel before 2.11.4 and 2.12.x before 2.12.3 allows remote attackers to read arbitrary files and possibly have other unspecified impact via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | {'CVE-2014-0002'} | 2022-03-03T05:12:43.609926Z | 2018-10-16T23:13:26Z | HIGH | null | null | {'http://rhn.redhat.com/errata/RHSA-2014-0372.html', 'http://www.securityfocus.com/bid/65901', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://camel.apache.org/security-advisories.data/CVE-2014-0002.txt.asc', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://secunia.com/advisories/57125', 'http://secunia.com/advisories/57716', 'https://github.com/advisories/GHSA-2fw5-rvf2-jq56', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0002', 'http://rhn.redhat.com/errata/RHSA-2014-0371.html', 'http://secunia.com/advisories/57719'} | null |
Maven | GHSA-gv87-q66h-4277 | Command injection in itext7-core | iTextPDF in iText before 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java. | {'CVE-2021-43113'} | 2022-03-03T05:14:12.191797Z | 2021-12-16T00:02:15Z | CRITICAL | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43113', 'https://pastebin.com/BXnkY9YY', 'https://github.com/itext/itext7', 'https://github.com/itext/itext7/releases/tag/7.1.17'} | null |
Maven | GHSA-hrxv-694f-22g3 | Exposure of Sensitive Information to an Unauthorized Actor in LemMinX | A flaw was found in LemMinX in versions prior to 0.19.0. Insecure redirect could allow unauthorized access to sensitive information locally if LemMinX is run under a privileged user. | {'CVE-2022-0672'} | 2022-03-02T21:57:30Z | 2022-02-19T00:01:28Z | MODERATE | null | {'CWE-200'} | {'https://github.com/eclipse/lemminx', 'https://github.com/eclipse/lemminx/pull/1174', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0672', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022'} | null |
Maven | GHSA-5mg8-w23w-74h3 | Information Disclosure in Guava | A temp directory creation vulnerability exists in all Guava versions allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. We recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method
| {'CVE-2020-8908'} | 2022-04-26T21:00:16.020771Z | 2021-03-25T17:04:19Z | LOW | null | {'CWE-732', 'CWE-200', 'CWE-173'} | {'https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r4776f62dfae4a0006658542f43034a7fc199350e35a66d4e18164ee6@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r49549a8322f62cd3acfa4490d25bfba0be04f3f9ff4d14fe36199d27@%3Cyarn-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r58a8775205ab1839dba43054b09a9ab3b25b423a4170b2413c4067ac@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E', 'https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E', 'https://lists.apache.org/thread.html/rcafc3a637d82bdc9a24036b2ddcad1e519dd0e6f848fcc3d606fd78f@%3Cdev.hive.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0003/', 'https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8908', 'https://lists.apache.org/thread.html/ra7ab308481ee729f998691e8e3e02e93b1dedfc98f6b1cd3d86923b3@%3Cyarn-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c0f1b7589864396690fe42a91a71dea9412e86eec66dc85bbacaaf@%3Ccommits.cxf.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEGUAVA-1015415', 'https://github.com/google/guava', 'https://lists.apache.org/thread.html/r07ed3e4417ad043a27bee7bb33322e9bfc7d7e6d1719b8e3dfd95c14@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rc607bc52f3507b8b9c28c6a747c3122f51ac24afe80af2a670785b97@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r2fe45d96eea8434b91592ca08109118f6308d60f6d0e21d52438cfb4@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E', 'https://lists.apache.org/thread.html/r7b0e81d8367264d6cad98766a469d64d11248eb654417809bfdacf09@%3Cyarn-issues.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r5b3d93dfdfb7708e796e8762ab40edbde8ff8add48aba53e5ea26f44@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r161b87f8037bbaff400194a63cd2016c9a69f5949f06dcc79beeab54@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rd2704306ec729ccac726e50339b8a8f079515cc29ccb77713b16e7c5@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r79e47ed555bdb1180e528420a7a2bb898541367a29a3bc6bbf0baf2c@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re120f6b3d2f8222121080342c5801fdafca2f5188ceeb3b49c8a1d27@%3Cyarn-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r215b3d50f56faeb2f9383505f3e62faa9f549bb23e8a9848b78a968e@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/rd7e12d56d49d73e2b8549694974b07561b79b05455f7f781954231bf@%3Cdev.pig.apache.org%3E', 'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40', 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf00b688ffa620c990597f829ff85fdbba8bf73ee7bfb34783e1f0d4e@%3Cyarn-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r68d86f4b06c808204f62bcb254fcb5b0432528ee8d37a07ef4bc8222@%3Ccommits.ws.apache.org%3E', 'https://github.com/google/guava/issues/4011', 'https://lists.apache.org/thread.html/rf9f0fa84b8ae1a285f0210bafec6de2a9eba083007d04640b82aa625@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r294be9d31c0312d2c0837087204b5d4bf49d0552890e6eec716fa6a6@%3Cyarn-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5d61b98ceb7bba939a651de5900dbd67be3817db6bfcc41c6e04e199@%3Cyarn-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r007add131977f4f576c232b25e024249a3d16f66aad14a4b52819d21@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb2364f4cf4d274eab5a7ecfaf64bf575cedf8b0173551997c749d322@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r037fed1d0ebde50c9caf8d99815db3093c344c3f651c5a49a09824ce@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r3dd8881de891598d622227e9840dd7c2ef1d08abbb49e9690c7ae1bc@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E'} | null |
Maven | GHSA-mvqp-q37c-wf9j | Moderate severity vulnerability that affects io.ratpack:ratpack-core | ## CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Versions of Ratpack 0.9.1 through and including 1.7.4 are vulnerable to [HTTP Response Splitting](https://www.owasp.org/index.php/HTTP_Response_Splitting),
if untrusted and unsanitized data is used to populate the headers of an HTTP response.
An attacker can utilize this vulnerability to have the server issue any HTTP response they specify.
If your application uses arbitrary user input as the value of a response header it is vulnerable.
If your application does not use arbitrary values as response header values, it is not vulnerable.
Previously, Ratpack did not validate response header values.
Now, adding a header value that contains the header value termination characters (CRLF) produces a runtime exception.
Since there is no mechanism for escaping or encoding the termination characters in a String, a runtime exception is necessary.
As potentially dangerous values now cause runtime exceptions, it is a good idea to continue to validate and sanitize any user-supplied values being used as response headers.
We would like to thank [Jonathan Leitschuh](https://github.com/JLLeitschuh) for reporting this vulnerability.
### Vulnerable Example
The following example server uses a query parameter value as a response header, without validating or sanitizing it.
```java
RatpackServer startedServer = RatpackServer.start(server -> {
server.handlers(chain -> chain.all(ctx -> {
// User supplied query parameter
String header = ctx.getRequest().getQueryParams().get("header");
// User supplied data used to populate a header value.
ctx.header("the-header", header)
.render("OK!");
}));
});
```
Sending a request to the server with the following value for the `header` query param would allow the execution of arbitrary Javascript.
```
Content-Type: text/html
X-XSS-Protection: 0
<script>alert(document.domain)</script>
```
### Impact
- Cross-User Defacement
- Cache Poisoning
- Cross-Site Scripting
- Page Hijacking
### Patches
This vulnerability has been patched in Ratpack version 1.7.5.
### Root Cause
The root cause was due to using the netty `DefaultHttpHeaders` object with verification disabled.
https://github.com/ratpack/ratpack/blob/af1e8c8590f164d7dd84d4212886fad4ead99080/ratpack-core/src/main/java/ratpack/server/internal/NettyHandlerAdapter.java#L159
This vulnerability is now more clearly documented in the Netty documentation: https://github.com/netty/netty/pull/9646
### Workarounds
The workaround for this vulnerability is to either not use arbitrary input as response header values or validate such values before being used to ensure they don't contain a carriage return and/or line feed characters.
### References
- [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)
- Fix commit: https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [ratpack/ratpack](https://github.com/ratpack/ratpack/issues)
* Ask in our [Slack channel](https://slack-signup.ratpack.io/) | {'CVE-2019-17513'} | 2022-03-03T05:13:42.988026Z | 2019-10-21T16:08:43Z | HIGH | null | {'CWE-74'} | {'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/releases/tag/v1.7.5', 'https://ratpack.io/versions/1.7.5', 'https://github.com/ratpack/ratpack', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://github.com/advisories/GHSA-mvqp-q37c-wf9j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17513'} | null |
Maven | GHSA-gvxv-5fp2-358q | Incorrect Resource Transfer Between Spheres in eclipse-wtp | In all versions prior to version 3.9.6 for eclipse-wtp, all versions prior to version 9.4.4 for eclipse-cdt, and all versions prior to version 3.0.1 for eclipse-groovy, Spotless was resolving dependencies over an insecure channel (http). If the build occurred over an insecure connection, a malicious user could have perform a Man-in-the-Middle attack during the build and alter the build artifacts that were produced. In case that any of these artifacts were compromised, any developers using these could be altered. **Note:** In order to validate that this artifact was not compromised, the maintainer would need to confirm that none of the artifacts published to the registry were not altered with. Until this happens, we can not guarantee that this artifact was not compromised even though the probability that this happened is low. | {'CVE-2019-10753'} | 2022-03-03T05:13:44.409235Z | 2019-09-11T23:08:57Z | MODERATE | null | {'CWE-669'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10753', 'https://snyk.io/vuln/SNYK-JAVA-COMDIFFPLUGSPOTLESS-460377'} | null |
Maven | GHSA-qhxh-9hhx-6p7v | Prototype Pollution in GraphHopper | This affects the package `com.graphhopper:graphhopper-web-bundle` before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload. | {'CVE-2021-23408'} | 2022-03-03T05:14:04.417952Z | 2021-08-02T16:59:35Z | MODERATE | null | {'CWE-1321'} | {'https://github.com/graphhopper/graphhopper/pull/2370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23408', 'https://github.com/graphhopper/graphhopper/releases/tag/3.2', 'https://snyk.io/vuln/SNYK-JAVA-COMGRAPHHOPPER-1320114', 'https://github.com/graphhopper/graphhopper/releases/tag/3.1'} | null |
Maven | GHSA-fvx3-g627-phm2 | Moderate severity vulnerability that affects com.ctrip.framework.apollo:apollo | An SSRF vulnerability was found in an API from Ctrip Apollo through 1.4.0-SNAPSHOT. An attacker may use it to do an intranet port scan or raise a GET request via /system-info/health because the %23 substring is mishandled. | {'CVE-2019-10686'} | 2022-03-03T05:13:16.823537Z | 2019-04-18T14:27:42Z | CRITICAL | null | {'CWE-918'} | {'https://github.com/ctripcorp/apollo/issues/2103', 'https://github.com/advisories/GHSA-fvx3-g627-phm2', 'https://github.com/ctripcorp/apollo', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10686'} | null |
Maven | GHSA-gx3f-hq7p-8fxv | Code injection in spring-cloud-netflix-hystrix-dashboard | Applications using the `spring-cloud-netflix-hystrix-dashboard` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution. | {'CVE-2021-22053'} | 2022-03-03T05:14:06.340660Z | 2021-11-23T17:53:33Z | HIGH | null | {'CWE-94'} | {'https://tanzu.vmware.com/security/cve-2021-22053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22053'} | null |
Maven | GHSA-h7v4-7xg3-hxcc | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39147](https://x-stream.github.io/CVE-2021-39147.html).
### Credits
wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39147'} | 2022-04-22T15:47:28.468252Z | 2021-08-25T14:47:46Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39147', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://x-stream.github.io/CVE-2021-39147.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-694p-xrhg-x3wm | CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection') | ### Vulnerability
Micronaut's HTTP client is vulnerable to "HTTP Request Header Injection" due to not validating request headers passed to the client.
Example of vulnerable code:
```java
@Controller("/hello")
public class HelloController {
@Inject
@Client("/")
RxHttpClient client;
@Get("/external-exploit")
@Produces(MediaType.TEXT_PLAIN)
public String externalExploit(@QueryValue("header-value") String headerValue) {
return client.toBlocking().retrieve(
HttpRequest.GET("/hello")
.header("Test", headerValue)
);
}
}
```
In the above case a query value received from a user is passed as a header value to the client. Since the client doesn't validate the header value the request headers and body have the potential to be manipulated.
For example, a user that supplies the following payload, can force the client to make multiple attacker-controlled HTTP requests.
```java
List<String> headerData = List.of(
"Connection: Keep-Alive", // This keeps the connection open so another request can be stuffed in.
"",
"",
"POST /hello/super-secret HTTP/1.1",
"Host: 127.0.0.1",
"Content-Length: 31",
"",
"{\"new\":\"json\",\"content\":\"here\"}",
"",
""
);
String headerValue = "H\r\n" + String.join("\r\n", headerData);;
URI theURI =
UriBuilder
.of("/hello/external-exploit")
.queryParam("header-value", headerValue) // Automatically URL encodes data
.build();
HttpRequest<String> request = HttpRequest.GET(theURI);
String body = client.toBlocking().retrieve(request);
```
Note that using `@HeaderValue` instead of `@QueryValue` is not vulnerable since Micronaut's HTTP server does validate the headers passed to the server, so the exploit can only be triggered by using user data that is not an HTTP header (query values, form data etc.).
### Impact
The attacker is able to control the entirety of the HTTP body for their custom requests.
As such, this vulnerability enables attackers to perform a variant of [Server Side Request Forgery](https://cwe.mitre.org/data/definitions/918.html).
### Patches
The problem has been patched in the `micronaut-http-client` versions 1.2.11 and 1.3.2 and above.
### Workarounds
Do not pass user data directly received from HTTP request parameters as headers in the HTTP client.
### References
Fix commits
- https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1
- https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d
- https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [micronaut-core](https://github.com/micronaut-projects/micronaut-core)
* Email us at [info@micronaut.io](mailto:info@micronaut.io)
### Credit
Originally reported by @JLLeitschuh
| {'CVE-2020-7611'} | 2022-03-03T05:13:51.394878Z | 2020-03-30T20:54:55Z | CRITICAL | null | {'CWE-444'} | {'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core', 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7611', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'} | null |
Maven | GHSA-7r82-7xv7-xcpj | Cross-site scripting in Apache HttpClient | Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution. | {'CVE-2020-13956'} | 2022-04-22T17:30:27.986492Z | 2021-06-03T23:40:23Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/rf7ca60f78f05b772cc07d27e31bcd112f9910a05caf9095e38ee150f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r3f740e4c38bba1face49078aa5cbeeb558c27be601cc9712ad2dcd1e@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r5de3d3808e7b5028df966e45115e006456c4e8931dc1e29036f17927@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r03bbc318c81be21f5c8a9b85e34f2ecc741aa804a8e43b0ef2c37749@%3Cissues.maven.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r87ddc09295c27f25471269ad0a79433a91224045988b88f0413a97ec@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcced7ed3237c29cd19c1e9bf465d0038b8b2e967b99fc283db7ca553@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/ra539f20ef0fb0c27ee39945b5f56bf162e5c13d1c60f7344dab8de3b@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rfb35f6db9ba1f1e061b63769a4eff5abadcc254ebfefc280e5a0dcf1@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r549ac8c159bf0c568c19670bedeb8d7c0074beded951d34b1c1d0d05@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb4ba262d6f08ab9cf8b1ebbcd9b00b0368ffe90dad7ad7918b4b56fc@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r6eb2dae157dbc9af1f30d1f64e9c60d4ebef618f3dce4a0e32d6ea4d@%3Ccommits.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rad6222134183046f3928f733bf680919e0c390739bfbfe6c90049673@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb725052404fabffbe093c83b2c46f3f87e12c3193a82379afbc529f8@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r132e4c6a560cfc519caa1aaee63bdd4036327610eadbd89f76dd5457@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rc3739e0ad4bcf1888c6925233bfc37dd71156bbc8416604833095c42@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rae14ae25ff4a60251e3ba2629c082c5ba3851dfd4d21218b99b56652@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r2835543ef0f91adcc47da72389b816e36936f584c7be584d2314fac3@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r3cecd59fba74404cbf4eb430135e1080897fb376f111406a78bed13a@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r6d672b46622842e565e00f6ef6bef83eb55d8792aac2bee75bff9a2a@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc5c6ccb86d2afe46bbd4b71573f0448dc1f87bbcd5a0d8c7f8f904b2@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/reef569c2419705754a3acf42b5f19b2a158153cef0e448158bc54917@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r2a03dc210231d7e852ef73015f71792ac0fcaca6cccc024c522ef17d@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rf4db88c22e1be9eb60c7dc623d0528642c045fb196a24774ac2fa3a3@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rfbedcb586a1e7dfce87ee03c720e583fc2ceeafa05f35c542cecc624@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r5fec9c1d67f928179adf484b01e7becd7c0a6fdfe3a08f92ea743b90@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf43d17ed0d1fb4fb79036b582810ef60b18b1ef3add0d5dea825af1e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r63296c45d5d84447babaf39bd1487329d8a80d8d563e67a4b6f3d8a7@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r55b2a1d1e9b1ec9db792b93da8f0f99a4fd5a5310b02673359d9b4d1@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r34efec51cb817397ccf9f86e25a75676d435ba5f83ee7b2eabdad707@%3Ccommits.creadur.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0002/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ra8bc6b61c5df301a6fe5a716315528ecd17ccb8a7f907e24a47a1a5e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r0a75b8f0f72f3e18442dc56d33f3827b905f2fe5b7ba48997436f5d1@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rd5ab56beb2ac6879f6ab427bc4e5f7691aed8362d17b713f61779858@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc990e2462ec32b09523deafb2c73606208599e196fa2d7f50bdbc587@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/re504acd4d63b8df2a7353658f45c9a3137e5f80e41cf7de50058b2c1@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E', 'https://github.com/apache/httpcomponents-client', 'https://lists.apache.org/thread.html/r043a75acdeb52b15dd5e9524cdadef4202e6a5228644206acf9363f9@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956', 'https://lists.apache.org/thread.html/r6dab7da30f8bf075f79ee189e33b45a197502e2676481bb8787fc0d7%40%3Cdev.hc.apache.org%3E', 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/rf03228972e56cb4a03e6d9558188c2938078cf3ceb23a3fead87c9ca@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfc00884c7b7ca878297bffe45fcb742c362b00b26ba37070706d44c3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0bebe6f9808ac7bdf572873b4fa96a29c6398c90dab29f131f3ebffe@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r06cf3ca5c8ceb94b39cd24a73d4e96153b485a7dac88444dd876accb@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rcd9ad5dda60c82ab0d0c9bd3e9cb1dc740804451fc20c7f451ef5cc4@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rea3dbf633dde5008d38bf6600a3738b9216e733e03f9ff7becf79625@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/ree942561f4620313c75982a4e5f3b74fe6f7062b073210779648eec2@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r5b55f65c123a7481104d663a915ec45a0d103e6aaa03f42ed1c07a89@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r9e52a6c72c8365000ecd035e48cc9fee5a677a150350d4420c46443d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r12cb62751b35bdcda0ae2a08b67877d665a1f4d41eee0fa7367169e0@%3Cdev.ranger.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r2dc7930b43eadc78220d269b79e13ecd387e4bee52db67b2f47d4303@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r69a94e2f302d1b778bdfefe90fcb4b8c50b226438c3c8c1d0de85a19@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r4850b3fbaea02fde2886e461005e4af8d37c80a48b3ce2a6edca0e30@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r6a3cda38d050ebe13c1bc9a28d0a8ec38945095d07eca49046bcb89f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rc505fee574fe8d18f9b0c655a4d120b0ae21bb6a73b96003e1d9be35@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r34178ab6ef106bc940665fd3f4ba5026fac3603b3fa2aefafa0b619d@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r8aa1e5c343b89aec5b69961471950e862f15246cb6392910161c389b@%3Cissues.maven.apache.org%3E'} | null |
Maven | GHSA-mw3r-pfmg-xp92 | Improper Restriction of Recursive Entity References in Apache XMLBeans | The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0. | {'CVE-2021-23926'} | 2022-03-03T05:13:39.904389Z | 2021-06-16T17:37:11Z | CRITICAL | null | {'CWE-776'} | {'https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html', 'https://poi.apache.org/', 'https://security.netapp.com/advisory/ntap-20210513-0004/', 'https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/XMLBEANS-517', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23926'} | null |
Maven | GHSA-9wx7-jrvc-28mm | Signature verification vulnerability in Stark Bank ecdsa libraries | An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways. | null | 2022-03-03T05:13:29.259203Z | 2021-11-08T21:51:18Z | HIGH | null | {'CWE-347'} | {'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1', 'https://github.com/starkbank/ecdsa-dotnet', 'https://github.com/starkbank/ecdsa-python', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-java', 'https://github.com/starkbank/ecdsa-node'} | null |
Maven | GHSA-77rm-9x9h-xj3g | NULL Pointer Dereference in Protocol Buffers | Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. | {'CVE-2021-22570'} | 2022-05-03T04:47:56.706467Z | 2022-01-27T00:01:15Z | HIGH | null | {'CWE-476'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570', 'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/', 'https://github.com/protocolbuffers/protobuf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/'} | null |
Maven | GHSA-p2rp-cmjq-r7wm | Shell command injection in Apache Syncope | In Apache Syncope 2.1.X releases prior to 2.1.7, when the Flowable extension is enabled, an administrator with workflow entitlements can use Shell Service Tasks to perform malicious operations, including but not limited to file read, file write, and code execution. | {'CVE-2020-11977'} | 2022-03-03T05:12:22.171431Z | 2021-06-16T17:19:12Z | HIGH | null | {'CWE-78'} | {'https://syncope.apache.org/security#CVE-2020-11977:_Remote_Code_Execution_via_Flowable_workflow_definition', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11977'} | null |
Maven | GHSA-gq28-h5vg-8prx | Privilege escalation in spring security | Spring Security 5.4.x prior to 5.4.4, 5.3.x prior to 5.3.8.RELEASE, 5.2.x prior to 5.2.9.RELEASE, and older unsupported versions can fail to save the SecurityContext if it is changed more than once in a single request.A malicious user cannot cause the bug to happen (it must be programmed in). However, if the application's intent is to only allow the user to run with elevated privileges in a small portion of the application, the bug can be leveraged to extend those privileges to the rest of the application. | {'CVE-2021-22112'} | 2022-03-03T05:12:59.142196Z | 2021-05-10T15:22:39Z | HIGH | null | {'CWE-269'} | {'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/ra6389b1b82108a3b6bbcd22979f7665fd437c2a3408c9509a15a9ca1@%3Cpluto-dev.portals.apache.org%3E', 'https://github.com/spring-projects/spring-security', 'https://github.com/spring-projects/spring-security/releases/tag/5.4.4', 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r413e380088c427f56102968df89ef2f336473e1b56b7d4b3a571a378@%3Cpluto-dev.portals.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22112', 'http://www.openwall.com/lists/oss-security/2021/02/19/7', 'https://tanzu.vmware.com/security/cve-2021-22112', 'https://www.jenkins.io/security/advisory/2021-02-19/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r37423ec7eea340e92a409452c35b649dce02fdc467f0b3f52086c177@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r2cb05e499807900ba23e539643eead9c5f0652fd271f223f89da1804@%3Cpluto-scm.portals.apache.org%3E'} | null |
Maven | GHSA-qmfc-6www-fjqw | Code injection in Apache Dubbo | Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code. | {'CVE-2021-30181'} | 2022-03-21T22:00:19.020276Z | 2022-03-18T17:57:04Z | CRITICAL | null | {'CWE-94'} | {'https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30181'} | null |
Maven | GHSA-mwm4-5qwr-g9pf | Keycloak is vulnerable to IDN homograph attack | A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity. | null | 2022-05-02T22:51:34.306966Z | 2022-04-28T21:00:31Z | LOW | null | {'CWE-284'} | {'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf', 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e', 'https://github.com/keycloak/keycloak'} | null |
Maven | GHSA-6fpp-rgj9-8rwc | Deserialization of untrusted data in FasterXML jackson-databind | SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. | {'CVE-2019-14379'} | 2022-03-16T22:16:51.295727Z | 2019-08-01T19:18:00Z | CRITICAL | null | {'CWE-915'} | {'https://lists.apache.org/thread.html/d161ff3d59c5a8213400dd6afb1cce1fac4f687c32d1e0c0bfbfaa2d@%3Cissues.iceberg.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2387', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/689c6bcc6c7612eee71e453a115a4c8581e7b718537025d4b265783d@%3Cissues.iceberg.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://seclists.org/fulldisclosure/2022/Mar/23', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://support.apple.com/kb/HT213189', 'https://access.redhat.com/errata/RHSA-2019:3292', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e25e734c315f70d8876a846926cfe3bfa1a4888044f146e844caf72f@%3Ccommits.ambari.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2', 'https://lists.apache.org/thread.html/859815b2e9f1575acbb2b260b73861c16ca49bca627fa0c46419051f@%3Cissues.iceberg.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.apache.org/thread.html/2766188be238a446a250ef76801037d452979152d85bce5e46805815@%3Cissues.iceberg.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://lists.apache.org/thread.html/525bcf949a4b0da87a375cbad2680b8beccde749522f24c49befe7fb@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://lists.apache.org/thread.html/75f482fdc84abe6d0c8f438a76437c335a7bbeb5cddd4d70b4bc0cbf@%3Cissues.iceberg.apache.org%3E', 'https://lists.apache.org/thread.html/99944f86abefde389da9b4040ea2327c6aa0b53a2ff9352bd4cfec17@%3Cissues.iceberg.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/f17f63b0f8a57e4a5759e01d25cffc0548f0b61ff5c6bfd704ad2f2a@%3Ccommits.ambari.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190814-0001/', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:2824', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14379', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/8723b52c2544e6cb804bc8a36622c584acd1bd6c53f2b6034c9fea54@%3Cissues.iceberg.apache.org%3E', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://access.redhat.com/errata/RHSA-2019:2743', 'https://access.redhat.com/errata/RHSA-2019:2936'} | null |
Maven | GHSA-m9jm-rhrm-gcxj | Path traversal in org.springframework.integration:spring-integration-zip | Spring-integration-zip versions prior to 1.0.1 exposes an arbitrary file write vulnerability, which can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z) that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. | {'CVE-2018-1261'} | 2022-03-03T05:12:47.053716Z | 2018-10-18T18:05:46Z | MODERATE | null | {'CWE-22'} | {'https://github.com/advisories/GHSA-m9jm-rhrm-gcxj', 'http://www.securityfocus.com/bid/104178', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1261', 'https://pivotal.io/security/cve-2018-1261'} | null |
Maven | GHSA-84p2-vf58-xhxv | Billion laughs attack in c3p0 | c3p0 version < 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration. | {'CVE-2019-5427'} | 2022-03-03T05:13:14.000330Z | 2019-04-23T16:03:18Z | HIGH | null | {'CWE-776'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5427', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://hackerone.com/reports/509315', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-f4jh-ww96-9h9j | Netflix/Priam: Temporary Directory Information Disclosure | ### Impact
When `File.createTempFile` creates a file, the permissions on that file are -rw-r--r--. This means that other users can read the contents of these files after they are written, although they can not modify the contents. This allows for local information disclosure if these files contain sensitive information.
Vulnerable locations:
- https://github.com/Netflix/Priam/blob/362660bb7ebddb0cfa756a282d94678f65af9f06/priam/src/main/java/com/netflix/priam/backup/MetaData.java#L106-L111
- https://github.com/Netflix/Priam/blob/362660bb7ebddb0cfa756a282d94678f65af9f06/priam/src/main/java/com/netflix/priam/identity/DoubleRing.java#L109-L118
- https://github.com/Netflix/Priam/blob/362660bb7ebddb0cfa756a282d94678f65af9f06/priam/src/main/java/com/netflix/priam/restore/PostRestoreHook.java#L80-L86
---
The custom CodeQL queries leveraged to find these this as well as their results can be found here:
https://lgtm.com/query/1543383251073929777/
https://lgtm.com/query/3142895023158674709/
## Official Disclosure
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-002.md
## Fix
There are no fixed versions. | {'CVE-2021-28100'} | 2022-03-03T05:13:44.731321Z | 2021-03-30T16:23:12Z | MODERATE | null | {'CWE-377'} | {'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-f4jh-ww96-9h9j'} | null |
Maven | GHSA-668q-qrv7-99fm | Deserialization of Untrusted Data in logback | In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. | {'CVE-2021-42550'} | 2022-03-28T19:45:13.626788Z | 2021-12-17T20:00:50Z | MODERATE | null | {'CWE-502'} | {'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c', 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html', 'http://logback.qos.ch/news.html', 'https://jira.qos.ch/browse/LOGBACK-1591', 'https://github.com/cn-panda/logbackRceDemo', 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42550', 'https://security.netapp.com/advisory/ntap-20211229-0001/'} | null |
Maven | GHSA-8vfm-4388-6rpc | Apache is vulnerable to XXE in XSD validation processor | Apache Camel 2.20.0 to 2.20.3 and 2.21.0 Core is vulnerable to XXE in XSD validation processor. | {'CVE-2018-8027'} | 2022-04-26T19:30:11.263382Z | 2018-10-16T23:06:25Z | CRITICAL | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8027', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/77f596fc63e63c2e9adcff3c34759b32c225cf0b582aedb755adaade@%3Cdev.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-8vfm-4388-6rpc', 'http://www.securityfocus.com/bid/104933', 'http://camel.apache.org/security-advisories.data/CVE-2018-8027.txt.asc'} | null |
Maven | GHSA-jc35-q369-45pv | Remote code execution in Apache Struts | Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. | {'CVE-2020-17530'} | 2022-04-25T22:17:01.071639Z | 2022-02-09T22:51:56Z | CRITICAL | null | {'CWE-917', 'CWE-94'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17530', 'https://security.netapp.com/advisory/ntap-20210115-0005/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2022/04/12/6', 'https://cwiki.apache.org/confluence/display/WW/S2-061', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://jvn.jp/en/jp/JVN43969166/index.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html'} | null |
Maven | GHSA-x588-g38j-f672 | Cross-site Scripting in Apache Pluto | The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact | {'CVE-2021-36737'} | 2022-03-03T05:14:12.011649Z | 2022-01-08T00:46:20Z | MODERATE | null | {'CWE-79'} | {'https://github.com/apache/portals-pluto', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36737', 'https://lists.apache.org/thread/x7kt47bf358x8sg9qg02zt0dmdrtow25'} | null |
Maven | GHSA-p9cf-qjxq-vxw6 | Privilege Context Switching Error in wildlfy | A flaw was found in wildfly. The EJBContext principle is not popped back after invoking another EJB using a different Security Domain. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before wildfly 20.0.0.Final are affected. | {'CVE-2020-1719'} | 2022-03-03T05:13:52.673140Z | 2021-06-08T18:52:27Z | MODERATE | null | {'CWE-270'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1796617', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1719'} | null |
Maven | GHSA-6pcc-3rfx-4gpm | Dom4j contains a XML Injection vulnerability | dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML document. This vulnerability appears to have been fixed in 2.1.1 or later.
Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended. | {'CVE-2018-1000632'} | 2022-04-26T18:48:01.638175Z | 2018-10-16T17:01:25Z | HIGH | null | {'CWE-91'} | {'https://lists.apache.org/thread.html/d7d960b2778e35ec9b4d40c8efd468c7ce7163bcf6489b633491c89f@%3Cdev.maven.apache.org%3E', 'https://github.com/dom4j/dom4j/', 'https://lists.apache.org/thread.html/00571f362a7a2470fba50a31282c65637c40d2e21ebe6ee535a4ed74@%3Ccommits.maven.apache.org%3E', 'https://lists.apache.org/thread.html/5a020ecaa3c701f408f612f7ba2ee37a021644c4a39da2079ed3ddbc@%3Ccommits.maven.apache.org%3E', 'https://ihacktoprotect.com/post/dom4j-xml-injection/', 'https://security.netapp.com/advisory/ntap-20190530-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000632', 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f', 'https://access.redhat.com/errata/RHSA-2019:1160', 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0365', 'https://access.redhat.com/errata/RHSA-2019:0380', 'https://lists.apache.org/thread.html/9d4c1af6f702c3d6d6f229de57112ddccac8ce44446a01b7937ab9e0@%3Ccommits.maven.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1159', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-6pcc-3rfx-4gpm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA/', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2019:0362', 'https://lists.apache.org/thread.html/7f6e120e6ed473f4e00dde4c398fc6698eb383bd7857d20513e989ce@%3Cdev.maven.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0364', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00028.html', 'https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOOVVCRQE6ATFD2JM2EMDXOQXTRIVZGP/', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1161', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://github.com/dom4j/dom4j/issues/48', 'https://lists.apache.org/thread.html/4a77652531d62299a30815cf5f233af183425db8e3c9a824a814e768@%3Cdev.maven.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3172'} | null |
Maven | GHSA-9279-7hph-r3xw | Buffer Overflow in Apache Mina SSHD | A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0 | {'CVE-2021-30129'} | 2022-04-22T16:01:57.467252Z | 2021-08-02T16:54:09Z | HIGH | null | {'CWE-772'} | {'https://lists.apache.org/thread.html/r6d4f78e192a0c8eabd671a018da464024642980ecd24096bde6db36f%40%3Cusers.mina.apache.org%3E', 'https://issues.apache.org/jira/browse/SSHD-1125', 'https://lists.apache.org/thread.html/red01829efa2a8c893c4baff4f23c9312bd938543a9b8658e172b853b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r6d4f78e192a0c8eabd671a018da464024642980ecd24096bde6db36f@%3Cusers.mina.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/12/1', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30129'} | null |
Maven | GHSA-qq48-m4jx-xqh8 | "Deserialization errors in MyBatis" | MyBatis before 3.5.6 mishandles deserialization of object streams leading to potential cache poisoning. | {'CVE-2020-26945'} | 2022-03-03T05:13:20.172210Z | 2021-04-22T16:14:38Z | HIGH | null | {'CWE-502'} | {'https://github.com/mybatis/mybatis-3/releases/tag/mybatis-3.5.6', 'https://github.com/mybatis/mybatis-3/pull/2079', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26945'} | null |
Maven | GHSA-m394-8rww-3jr7 | DOS vulnerability for Quoted Quality CSV headers | ### Impact
When Jetty handles a request containing request headers with a large number of “quality” (i.e. q) parameters (such as what are seen on the `Accept`, `Accept-Encoding`, and `Accept-Language` request headers), the server may enter a denial of service (DoS) state due to high CPU usage while sorting the list of values based on their quality values. A single request can easily consume minutes of CPU time before it is even dispatched to the application.
The only features within Jetty that can trigger this behavior are:
- Default Error Handling - the `Accept` request header with the `QuotedQualityCSV` is used to determine what kind of content to send back to the client (html, text, json, xml, etc)
- `StatisticsServlet` - uses the `Accept` request header with the `QuotedQualityCSV` to determine what kind of content to send back to the client (xml, json, text, html, etc)
- `HttpServletRequest.getLocale()` - uses the `Accept-Language` request header with the `QuotedQualityCSV` to determine which “preferred” language is returned on this call.
- `HttpservletRequest.getLocales()` - is similar to the above, but returns an ordered list of locales based on the quality values on the `Accept-Language` request header.
- `DefaultServlet` - uses the `Accept-Encoding` request header with the `QuotedQualityCSV` to determine which kind of pre-compressed content should be sent back for static content (content that is not matched against a url-pattern in your web app)
### Versions
`QuotedQualityCSV` was introduced to Jetty 9.3.9.v20160517 and the bug that introduced the vulnerability was in 9.4.6.v20170531.
Currently, known vulnerable versions include:
- 9.4.6.v20170531 thru to 9.4.36.v20210114
- 10.0.0
- 11.0.0
### Workarounds
Quality ordered values are used infrequently by jetty so they can be avoided by:
* Do not use the default error page/handler.
* Do not deploy the `StatisticsServlet` exposed to the network
* Do not call `getLocale` API
* Do not enable precompressed static content in the `DefaultServlet`
### Patches
All patches are available for download from the Eclipse Jetty website at [https://www.eclipse.org/jetty/download.php](https://www.eclipse.org/jetty/download.php)
- 9.4.37.v20210219 and greater
- 10.0.1 and greater
- 11.0.1 and greater | {'CVE-2020-27223'} | 2022-03-03T05:14:03.506409Z | 2021-03-10T03:46:47Z | MODERATE | null | {'CWE-400'} | {'https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27223', 'https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128', 'https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210401-0005/', 'https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7', 'https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E'} | null |
Maven | GHSA-gx6h-936c-vrrr | Cross site scripting in registration template in xwiki-platform | ### Impact
We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field.
This template is only used in the following conditions:
- the wiki must be open to registration for anyone
- the wiki must be closed to view for Guest users (more specifically the XWiki.Registration page must be forbidden in View for guest user)
A way to obtain the second condition is when administrators checked the "Prevent unregistered users from viewing pages, regardless of the page rights" box in the administration rights.
### Patches
The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3.
### Workarounds
There are two main ways for protecting against this vulnerability, the easiest and the best one is by applying a patch in the `registerinline.vm` template, the patch consists in checking the value of the xredirect field to ensure it matches the following:
```
<input type="hidden" name="xredirect" value="$escapetool.xml($!request.xredirect)" />
```
If for some reason it's not possible to patch this file, another workaround is to ensure "Prevent unregistered users from viewing pages, regardless of the page rights" is not checked in the rights and apply a better right scheme using groups and rights on spaces.
### References
https://jira.xwiki.org/browse/XWIKI-19291
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security mailing list](mailto:security@xwiki.org)
| {'CVE-2022-23622'} | 2022-02-09T23:25:44Z | 2022-02-09T23:25:44Z | HIGH | null | {'CWE-79'} | {'https://jira.xwiki.org/browse/XWIKI-19291', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://github.com/xwiki/xwiki-platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622', 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'} | null |
Maven | GHSA-v3vf-2r98-xw8w | High severity vulnerability that affects org.apache.syncope:syncope-core | An administrator with user search entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can recover sensitive security values using the fiql and orderby parameters. | {'CVE-2018-1322'} | 2022-03-03T05:12:42.311724Z | 2018-11-06T23:17:25Z | MODERATE | null | {'CWE-200'} | {'http://www.securityfocus.com/bid/103507', 'https://www.exploit-db.com/exploits/45400/', 'https://github.com/advisories/GHSA-v3vf-2r98-xw8w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1322', 'http://syncope.apache.org/security.html#CVE-2018-1322:_Information_disclosure_via_FIQL_and_ORDER_BY_sorting'} | null |
Maven | GHSA-w4g2-9hj6-5472 | Moderate severity vulnerability that affects com.rabbitmq:amqp-client and org.springframework.amqp:spring-amqp | Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit. | {'CVE-2018-11087'} | 2022-03-03T05:14:16.230806Z | 2018-10-18T18:06:08Z | MODERATE | null | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-11087', 'https://github.com/advisories/GHSA-w4g2-9hj6-5472', 'https://pivotal.io/security/cve-2018-11087'} | null |
Maven | GHSA-hw7r-qrhp-5pff | Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20 | Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors.
- https://vaadin.com/security/cve-2021-33605 | null | 2022-03-03T05:13:54.584433Z | 2021-08-30T16:16:46Z | MODERATE | null | null | {'https://github.com/vaadin/platform/security/advisories/GHSA-hw7r-qrhp-5pff'} | null |
Maven | GHSA-2cxf-6567-7pp6 | Local Information Disclosure Vulnerability | ### Impact
Local information disclosure of sensitive information downloaded via the API using the API Client.
### Finding
The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system.
Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue.
This vulnerability was found due to [this query](https://lgtm.com/query/8938575359870595124/) that [Jonathan Leitschuh](https://github.com/JLLeitschuh) contributed to the Semmle QL project.
### Patches
This issue has been patched in [version 1.0.0-beta.9](https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9).
See also [Remove unused downloadFile helpers](https://github.com/DataDog/datadog-api-client-java/pull/637).
### Workarounds
The recommended workaround is to specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`.
### References
* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [DataDog/datadog-api-client-java](https://github.com/DataDog/datadog-api-client-java)
* Email us at [security@datadoghq.com](mailto:security@datadoghq.com) | {'CVE-2021-21331'} | 2022-03-03T05:13:44.158886Z | 2021-03-03T23:01:17Z | LOW | null | {'CWE-379', 'CWE-378'} | {'https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21331', 'https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6'} | null |
Maven | GHSA-48rw-j489-928m | Signature wrapping vulnerability in Spring Security | Spring Security versions 5.2.x prior to 5.2.4 and 5.3.x prior to 5.3.2 contain a signature wrapping vulnerability during SAML response validation. When using the spring-security-saml2-service-provider component, a malicious user can carefully modify an otherwise valid SAML response and append an arbitrary assertion that Spring Security will accept as valid. | {'CVE-2020-5407'} | 2022-03-03T05:13:14.262662Z | 2020-06-05T16:13:29Z | HIGH | null | {'CWE-347'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rd99601fbca514f214f88f9e53fd5be3cfbff05b350c994b4ec2e184c@%3Cdev.geode.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2020-5407', 'https://lists.apache.org/thread.html/r73af928cf64bebf78b7fa4bc56a5253273ec7829f5f5827f64c72fc7@%3Cissues.servicemix.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5407', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-8hxh-r6f7-jf45 | Memory exhaustion in http4s-async-http-client with large or malicious compressed responses | ### Impact
A server we connect to with http4s-async-http-client could theoretically respond with a large or malicious compressed stream and exhaust memory in the client JVM. It does not affect http4s servers, other client backends, or clients that speak only to trusted servers. This is related to a transitive dependency on netty-codec-4.1.45.Final, which is affected by [CVE-2020-11612](https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897).
### Patches
Upgrade to http4s-async-http-client >= 0.21.8. All 1.0 milestones are also safe.
### Workarounds
Add an explicit runtime dependency on async-http-client's netty dependencies that evicts them to an unaffected version:
```scala
libraryDependencies ++= Seq(
"io.netty" % "netty-codec" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-codec-socks" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-handler-proxy" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-common" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-transport" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-handler" % "4.1.53.Final" % Runtime,
"io.netty" % "netty-resolver-dns" % "4.1.53.Final" % Runtime
)
```
### References
* https://app.snyk.io/vuln/SNYK-JAVA-IONETTY-564897
* https://github.com/http4s/http4s/issues/3681
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [http4s](https://github.com/http4s/http4s/issues/new)
* Contact a maintainer privately per [http4s' security policy](https://github.com/http4s/http4s/blob/master/SECURITY.md#reporting-a-vulnerability) | null | 2022-03-03T05:13:40.819518Z | 2020-10-16T17:03:43Z | LOW | null | {'CWE-400'} | {'https://github.com/http4s/http4s', 'https://github.com/http4s/http4s/security/advisories/GHSA-8hxh-r6f7-jf45'} | null |
Maven | GHSA-6gf2-pvqw-37ph | Log entry injection in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase. | {'CVE-2021-22060'} | 2022-04-22T15:47:36.927335Z | 2022-01-12T23:04:06Z | MODERATE | null | null | {'https://tanzu.vmware.com/security/cve-2021-22060', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22060', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-fmm9-3gv8-58f4 | Improper Handling of Missing Values in kaml | ### Impact
Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service.
This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected.
YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue, for example:
```yaml
!<x>
```
The following is a sample application that demonstrates this issue:
```kotlin
import com.charleskorn.kaml.Yaml
import kotlinx.serialization.SerialName
import kotlinx.serialization.Serializable
@Serializable
private sealed class K {
@Serializable
@SerialName("x")
data class X(
val property: String? = null,
) : K()
}
const val s = """
!<x>
"""
fun main() {
println("Started.")
val result = Yaml.default.decodeFromString(K.serializer(), s)
println("Finished, result is $result")
}
```
On vulnerable versions of kaml, the `decodeFromString()` operation hangs and never returns.
### Patches
Version 0.35.3 or later contain the fix for this issue. | {'CVE-2021-39194'} | 2022-03-03T05:13:21.645961Z | 2021-09-07T23:08:40Z | MODERATE | null | {'CWE-230', 'CWE-835'} | {'https://github.com/charleskorn/kaml/', 'https://github.com/charleskorn/kaml/issues/179', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'} | null |
Maven | GHSA-5x3v-2gxr-59m2 | Directory traversal in Apache RocketMQ | In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users of the affected versions should apply one of the following: Upgrade to Apache RocketMQ 4.6.1 or later. | {'CVE-2019-17572'} | 2022-03-03T05:13:21.737252Z | 2020-07-01T17:26:15Z | MODERATE | null | {'CWE-22'} | {'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E', 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552', 'https://seclists.org/oss-sec/2020/q2/112', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEROCKETMQ-569108', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/apache/rocketmq/issues/1637'} | null |
Maven | GHSA-3rmv-2pg5-xvqj | High severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.16 and older unsupported versions, allow applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a remote code execution attack. This CVE addresses the partial fix for CVE-2018-1270 in the 4.3.x branch of the Spring Framework. | {'CVE-2018-1275'} | 2022-03-03T05:13:06.826696Z | 2018-10-17T20:28:00Z | CRITICAL | null | {'CWE-358', 'CWE-94'} | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securityfocus.com/bid/103771', 'https://github.com/advisories/GHSA-3rmv-2pg5-xvqj', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1275', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securitytracker.com/id/1041301', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://pivotal.io/security/cve-2018-1275', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2939'} | null |
Maven | GHSA-p225-pc2x-4jpm | Incorrect Authorization in keycloak | A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token. | {'CVE-2020-1725'} | 2022-03-03T05:14:16.794340Z | 2022-02-09T00:58:52Z | MODERATE | null | {'CWE-863', 'CWE-668'} | {'https://issues.redhat.com/browse/KEYCLOAK-16550', 'https://bugzilla.redhat.com/show_bug.cgi?id=1765129', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1725'} | null |
Maven | GHSA-v585-23hc-c647 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource. | {'CVE-2020-36186'} | 2022-04-22T17:45:20.181958Z | 2021-11-19T20:13:06Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36186', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2997', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-jfh8-c2jp-5v3q | Remote code injection in Log4j | # Summary
Log4j versions prior to 2.16.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.
As per [Apache's Log4j security guide](https://logging.apache.org/log4j/2.x/security.html): Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.16.0, this behavior has been disabled by default.
Log4j version 2.15.0 contained an earlier fix for the vulnerability, but that patch did not disable attacker-controlled JNDI lookups in all situations. For more information, see the `Updated advice for version 2.16.0` section of this advisory.
# Impact
Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input.
# Affected versions
Any Log4J version prior to v2.15.0 is affected to this specific issue.
The v1 branch of Log4J which is considered End Of Life (EOL) is vulnerable to other RCE vectors so the recommendation is to still update to 2.16.0 where possible.
## Security releases
Additional backports of this fix have been made available in versions 2.3.1, 2.12.2, and 2.12.3
## Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
# Remediation Advice
## Updated advice for version 2.16.0
The Apache Logging Services team provided updated mitigation advice upon the release of version 2.16.0, which [disables JNDI by default and completely removes support for message lookups](https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0).
Even in version 2.15.0, lookups used in layouts to provide specific pieces of context information will still recursively resolve, possibly triggering JNDI lookups. This problem is being tracked as [CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046). More information is available on the [GitHub Security Advisory for CVE-2021-45046](https://github.com/advisories/GHSA-7rjr-3q55-vv33).
Users who want to avoid attacker-controlled JNDI lookups but cannot upgrade to 2.16.0 must [ensure that no such lookups resolve to attacker-provided data and ensure that the the JndiLookup class is not loaded](https://issues.apache.org/jira/browse/LOG4J2-3221).
Please note that Log4J v1 is End Of Life (EOL) and will not receive patches for this issue. Log4J v1 is also vulnerable to other RCE vectors and we recommend you migrate to Log4J 2.16.0 where possible.
| {'CVE-2021-44228'} | 2022-04-26T21:00:07.506410Z | 2021-12-10T00:40:56Z | CRITICAL | null | {'CWE-502', 'CWE-20', 'CWE-400'} | {'http://www.openwall.com/lists/oss-security/2021/12/10/3', 'http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.debian.org/security/2021/dsa-5020', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228', 'http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html', 'https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001', 'http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html', 'http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html', 'https://github.com/tangxiaofeng7/apache-log4j-poc', 'http://seclists.org/fulldisclosure/2022/Mar/23', 'http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html', 'http://www.openwall.com/lists/oss-security/2021/12/15/3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://support.apple.com/kb/HT213189', 'https://logging.apache.org/log4j/2.x/changes-report.html#a2.15.0', 'https://www.kb.cert.org/vuls/id/930724', 'https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md', 'https://logging.apache.org/log4j/2.x/manual/migration.html', 'https://github.com/advisories/GHSA-7rjr-3q55-vv33', 'http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html', 'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html', 'https://github.com/apache/logging-log4j2', 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf', 'https://issues.apache.org/jira/browse/LOG4J2-3221', 'http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html', 'https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/', 'http://www.openwall.com/lists/oss-security/2021/12/10/1', 'https://issues.apache.org/jira/browse/LOG4J2-3201', 'http://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://issues.apache.org/jira/browse/LOG4J2-3214', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/', 'https://twitter.com/kurtseifried/status/1469345530182455296', 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/apache/logging-log4j2/pull/608', 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html', 'http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html', 'http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html', 'http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html', 'https://security.netapp.com/advisory/ntap-20211210-0007/', 'http://www.openwall.com/lists/oss-security/2021/12/13/1', 'https://issues.apache.org/jira/browse/LOG4J2-3198', 'https://github.com/cisagov/log4j-affected-db', 'https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup', 'http://www.openwall.com/lists/oss-security/2021/12/13/2', 'https://logging.apache.org/log4j/2.x/security.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf', 'http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html', 'http://www.openwall.com/lists/oss-security/2021/12/10/2', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'} | null |
Maven | GHSA-j52r-xc68-q8f4 | Insufficiently Protected Credentials in Pivotal Reactor Netty | Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to. | {'CVE-2019-11284'} | 2022-03-03T05:13:52.059717Z | 2019-10-23T14:14:32Z | HIGH | null | {'CWE-522'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-11284', 'https://pivotal.io/security/cve-2019-11284'} | null |
Maven | GHSA-fmj5-wv96-r2ch | Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient | http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors. | {'CVE-2015-5262'} | 2022-03-03T05:13:48.941407Z | 2018-10-17T00:05:29Z | MODERATE | null | null | {'https://jenkins.io/security/advisory/2018-02-26/', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167999.html', 'http://www.ubuntu.com/usn/USN-2769-1', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168030.html', 'https://github.com/advisories/GHSA-fmj5-wv96-r2ch', 'http://www.securitytracker.com/id/1033743', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167962.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5262', 'http://svn.apache.org/viewvc?view=revision&revision=1626784', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1261538', 'https://issues.apache.org/jira/browse/HTTPCLIENT-1478', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'} | null |
Maven | GHSA-7rjp-fgwj-47rw | Missing authentication in ShenYu | Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | {'CVE-2022-23945'} | 2022-03-03T05:13:26.223461Z | 2022-01-28T22:14:11Z | HIGH | null | {'CWE-306', 'CWE-862'} | {'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/26/3', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s', 'http://www.openwall.com/lists/oss-security/2022/01/25/6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23945'} | null |
Maven | GHSA-j3ch-vjph-8q6v | Command injection in Alluxio | In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability. | {'CVE-2022-23848'} | 2022-03-07T20:47:55.237330Z | 2022-02-21T00:00:19Z | CRITICAL | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23848', 'https://www.alluxio.io/download/releases/alluxio-2-7-3-release/'} | null |
Maven | GHSA-35fr-h7jr-hh86 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria | Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response.
### Impact
1. Cross-User Defacement
2. Cache Poisoning
3. Cross-Site Scripting (XSS)
4. Page Hijacking
### Root Cause
The root cause is due to the usage of Netty without the HTTP header validation.
https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23
### Patches
This vulnerability has been patched in 0.97.0.
### References
[CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html)
https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](https://github.com/line/armeria/issues) | null | 2022-03-03T05:13:52.337681Z | 2019-12-06T18:55:47Z | MODERATE | null | {'CWE-74', 'CWE-113'} | {'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'} | null |
Maven | GHSA-g7p8-r2ch-4rmf | Malicious Atomix node queries expose sensitive information | An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states. | {'CVE-2020-35215'} | 2022-03-03T05:13:52.317130Z | 2021-12-17T20:41:45Z | MODERATE | null | {'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35215', 'https://github.com/atomix/atomix', 'https://docs.google.com/presentation/d/1pRRLfdSUqUZ688CZ9e9AyceuXPGp9oyGj7j4bdSsBcw/edit?usp=sharing'} | null |
Maven | GHSA-j7xg-5549-jr3j | Improper Certificate Validation in OWASP ZAP | OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server. | {'CVE-2022-27820'} | 2022-04-01T20:17:01.826811Z | 2022-03-25T00:00:34Z | MODERATE | null | {'CWE-295'} | {'https://github.com/zaproxy/zaproxy/issues/7165', 'https://www.openwall.com/lists/oss-security/2022/03/23/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27820', 'http://www.openwall.com/lists/oss-security/2022/03/24/3', 'https://github.com/zaproxy/zaproxy/releases'} | null |
Maven | GHSA-f6hm-88x3-mfjv | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | ### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21349](https://x-stream.github.io/CVE-2021-21349.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21349'} | 2022-03-03T05:13:19.087610Z | 2021-03-22T23:29:19Z | MODERATE | null | {'CWE-502', 'CWE-918'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/security.html#workaround', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-21349.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21349'} | null |
Maven | GHSA-4446-656p-f54g | Deserialization of Untrusted Data in Bouncy castle | Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later. | {'CVE-2018-1000613'} | 2022-04-27T18:01:56.807655Z | 2018-10-17T16:23:12Z | CRITICAL | null | {'CWE-502', 'CWE-470'} | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/advisories/GHSA-4446-656p-f54g', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20190204-0003/', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-4gr7-qw2q-jxh6 | Cross-site Scripting in Nacos | A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters. | {'CVE-2021-44667'} | 2022-03-22T21:46:59.043224Z | 2022-03-12T00:00:27Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44667', 'https://github.com/alibaba/nacos', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5', 'https://github.com/alibaba/nacos/issues/7359'} | null |
Maven | GHSA-g556-x5vx-qh59 | Moderate severity vulnerability that affects com.caverock:androidsvg | AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution | {'CVE-2017-1000498'} | 2022-03-03T05:14:20.496342Z | 2018-10-19T16:50:33Z | HIGH | null | {'CWE-611'} | {'https://github.com/BigBadaboom/androidsvg', 'https://github.com/BigBadaboom/androidsvg/issues/122', 'https://github.com/advisories/GHSA-g556-x5vx-qh59', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000498'} | null |
Maven | GHSA-fvfc-8pqr-wjpv | Missing Authorization in Jenkins S3 publisher Plugin | Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled. | {'CVE-2021-21650'} | 2021-05-19T19:02:05Z | 2021-06-16T17:29:08Z | MODERATE | null | {'CWE-862'} | {'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2200', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21650'} | null |
Maven | GHSA-7chv-rrw6-w6fc | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.17.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-29505](https://x-stream.github.io/CVE-2021-29505.html).
### Credits
V3geB1rd, white hat hacker from Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-29505'} | 2022-04-22T16:01:59.255632Z | 2021-05-18T18:36:27Z | HIGH | null | {'CWE-502', 'CWE-74', 'CWE-94'} | {'https://security.netapp.com/advisory/ntap-20210708-0007/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/CVE-2021-29505.html', 'https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E', 'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream', 'https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc'} | null |
Maven | GHSA-mx7p-6679-8g3q | Polymorphic Typing in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. | {'CVE-2019-16942'} | 2022-03-03T05:12:42.189236Z | 2019-10-28T20:51:15Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://lists.apache.org/thread.html/b2e23c94f9dfef53e04c492e5d02e5c75201734be7adc73a49ef2370@%3Cissues.geode.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/a430dbc9be874c41314cc69e697384567a9a24025e819d9485547954@%3Cissues.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16942', 'https://issues.apache.org/jira/browse/GEODE-7255', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://lists.apache.org/thread.html/7782a937c9259a58337ee36b2961f00e2d744feafc13084e176d0df5@%3Cissues.geode.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2478', 'https://seclists.org/bugtraq/2019/Oct/6'} | null |
Maven | GHSA-cmx4-p4v5-hmr5 | Server-side request forgery (SSRF) in Apache Batik | Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | {'CVE-2019-17566'} | 2022-03-03T05:13:03.743431Z | 2022-02-09T00:46:46Z | HIGH | null | {'CWE-20', 'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17566', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rcab14a9ec91aa4c151e0729966282920423eff50a22759fd21db6509@%3Ccommits.myfaces.apache.org%3E', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https://lists.apache.org/thread.html/rab94fe68b180d2e2fba97abf6fe1ec83cff826be25f86cd90f047171@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://xmlgraphics.apache.org/security.html', 'https://github.com/apache/xmlgraphics-batik'} | null |
Maven | GHSA-4jhc-wjr3-pwh2 | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node. | An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext. | {'CVE-2020-35211'} | 2022-03-03T05:13:01.180218Z | 2021-12-17T20:40:38Z | HIGH | null | null | {'https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing', 'https://github.com/atomix/atomix', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35211'} | null |
Maven | GHSA-rrvg-2c69-p9rf | Cross-Site Request Forgery in Jenkins Xray | A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | {'CVE-2021-21652'} | 2021-05-19T19:12:26Z | 2021-06-16T17:28:58Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21652', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)'} | null |
Maven | GHSA-2jx8-v4hv-gx3h | XXE vulnerability in Launch import | | Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk |
|--------------|-------------------|-------------------|---------------|---------------|
| Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium |
### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser.
We advise our users install the latest releases we built specifically to address this issue.
### Patches
Fixed with https://github.com/reportportal/service-api/pull/1201
### Binary Download
https://bintray.com/epam/reportportal/service-api/5.1.1
https://bintray.com/epam/reportportal/service-api/4.3.12
### Docker Container Download
* RP v4: `docker pull reportportal/service-api:4.3.12`
* RP v5: `docker pull reportportal/service-api:5.1.1`
### Acknowledgement
The issue was reported to Report Portal Team by an external security researcher.
Our Team thanks Julien M. for reporting the issue.
### For more information
If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io) | {'CVE-2020-12642'} | 2022-03-03T05:14:09.263133Z | 2021-06-28T16:45:47Z | HIGH | null | {'CWE-611'} | {'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/reportportal/reportportal', 'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'} | null |
Maven | GHSA-38w8-h222-wrpp | Improper Restriction of XML External Entity Reference in Jenkins Chef Sinatra | Jenkins Chef Sinatra Plugin 1.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2022-25209'} | 2022-02-24T13:54:41Z | 2022-02-16T00:01:14Z | HIGH | null | {'CWE-611'} | {'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25209'} | null |
Maven | GHSA-jqj4-r483-4gvr | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-25027 | null | 2022-03-03T05:14:12.324490Z | 2021-04-19T14:48:51Z | MODERATE | null | {'CWE-81'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-jqj4-r483-4gvr', 'https://github.com/vaadin/platform', 'https://vaadin.com/security/cve-2019-25027'} | null |
Maven | GHSA-vf4q-8mr7-5c5c | Camel-castor component in Apache Camel is vulnerable to Java object de-serialisation | The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. | {'CVE-2017-12634'} | 2022-04-26T19:30:09.226924Z | 2018-10-16T23:05:58Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-vf4q-8mr7-5c5c', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12634', 'http://www.securityfocus.com/bid/101876', 'https://access.redhat.com/errata/RHSA-2018:0319', 'http://camel.apache.org/security-advisories.data/CVE-2017-12634.txt.asc', 'https://issues.apache.org/jira/browse/CAMEL-11929'} | null |
Maven | GHSA-rfx6-vp9g-rh7v | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath. | {'CVE-2017-17485'} | 2022-03-03T05:13:20.334033Z | 2018-10-18T17:42:48Z | CRITICAL | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2018:0480', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://www.debian.org/security/2018/dsa-4114', 'https://security.netapp.com/advisory/ntap-20180201-0003/', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://github.com/FasterXML/jackson-databind/issues/1855', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17485', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/irsl/jackson-rce-via-spel/', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:0116', 'http://www.securityfocus.com/archive/1/541652/100/0/threaded', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2018:2930', 'https://github.com/advisories/GHSA-rfx6-vp9g-rh7v', 'https://access.redhat.com/errata/RHSA-2018:0478'} | null |
Maven | GHSA-pgq6-ccqj-hpqr | Elasticsearch privilege escalation issue | A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously been upgraded from 6.x, should upgrade to 7.17.1. Users that are planning to upgrade from 6.x should not perform an upgrade from 6.x to versions 7.16 through 7.17.0 and should use 7.17.1+ for upgrades from 6.x. | {'CVE-2022-23708'} | 2022-03-18T21:17:17.229968Z | 2022-03-04T00:00:15Z | MODERATE | null | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23708', 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'} | null |
Maven | GHSA-8qfc-cvjp-mgpq | Moderate severity vulnerability that affects org.apache.ignite:ignite-core | Apache Ignite before 1.9 allows man-in-the-middle attackers to read arbitrary files via XXE in modified update-notifier documents. | {'CVE-2016-6805'} | 2022-03-03T05:13:48.921171Z | 2018-10-16T20:53:31Z | MODERATE | null | {'CWE-611'} | {'http://www.securityfocus.com/bid/97509', 'http://seclists.org/oss-sec/2017/q2/31', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6805', 'https://github.com/advisories/GHSA-8qfc-cvjp-mgpq'} | null |
Maven | GHSA-2jhm-qp48-hv5j | Missing authorization in xwiki-platform | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:
```
$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")
```
### Patches
It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-18870
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2022-23621'} | 2022-02-09T21:56:05Z | 2022-02-09T21:56:05Z | MODERATE | null | {'CWE-862'} | {'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/xwiki/xwiki-platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23621', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a', 'https://jira.xwiki.org/browse/XWIKI-18870'} | null |
Maven | GHSA-93jq-624g-4p9p | Moderate severity vulnerability that affects org.asynchttpclient:async-http-client | Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL. | {'CVE-2017-14063'} | 2022-03-03T05:13:29.519914Z | 2018-10-19T16:50:50Z | HIGH | null | {'CWE-20'} | {'https://lists.apache.org/thread.html/r04b15fd898a6b1612153543375daaa8145a0fd1804ec9fa2e0d95c97@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rc550b8955b37b40fee18db99f167337c41c930d8c3763b9631e01dda@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfd823a733b02cffbef5a69953fdcbed2d1d0afad5e1ea4e96ff6bf0a@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r41a0e2c36f7d1854a4d56cb1e4aa720ef501782d887ece1c9b1e2d60@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/re2510852c4a1f635b14b35e5dfd7597076928e723ab08559ede575e0@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r868875e67494a18d31e88cba2672f45c3fc6708ffdde445723004da4@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r14a74d204f285dd3a4fa203de6dbb4e741ddb7fdfff7915590e5b3db@%3Cdev.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5b8666c4414500ff6e993bfa69cb6afa19b1b67c4585a045c0c21662@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r7046a51116207588e36ca8c2e291327e391dae40712d267117475a98@%3Cdev.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r7879a48644f708be0529bd39f0679ad3ad951f3dc24442878a008fd8@%3Cissues.tez.apache.org%3E', 'https://github.com/advisories/GHSA-93jq-624g-4p9p', 'https://lists.apache.org/thread.html/rbbad61e1ba5b21e234a6664963618acfee237af754eb20300d938e1e@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r0a6b6429a7558051dbb70bd06584b4b1c334a80ec9203d3d39b7045a@%3Ccommits.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5f794dc07913c5f2ec08f540813b40e61b562d36f8b1f916e8705c56@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/AsyncHttpClient/async-http-client/issues/1455', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14063', 'https://lists.apache.org/thread.html/r4ebb9596d890f3528630492bd78237b3eef06f093bac238a0da9b630@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/re7367895ccbf64523efcd39a9181baf2eaa30b069d8d6496852fba56@%3Cissues.tez.apache.org%3E', 'http://openwall.com/lists/oss-security/2017/08/31/4', 'https://github.com/AsyncHttpClient/async-http-client', 'https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcb46acc25917e01ebecca132e870da9ab935d5796686ed8a2785b026@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfe55d83e4070bcc9285bbbf6bc39635dbcbba6d14d89aab0f339c83a@%3Ccommits.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rbc4fbb06ccb10e26e6064f57f6bd4935eabe2d18a0cb9a7183699396@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r3df4b7ccc363b4850a24842138117aa4451b875bc4773a845b828fc6@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5f07c30721503d4c02d5451f77a611a1a0bb2a94ddcdf071c9485ea3@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r79d9bab405414af45568c4683386f5e9fd02c10ca87ffa2ee33512dc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r683d78c6d7a15659f2bb82dd4120dab8c45a870eaa7f1a15cce4ed3b@%3Cissues.tez.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://lists.apache.org/thread.html/r9ea5d489e004b40baf73880c4e11dd4de24b799d15e091e1f4017108@%3Cissues.tez.apache.org%3E'} | null |
Maven | GHSA-6hgr-2g6q-3rmc | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- https://vaadin.com/security/cve-2021-31408 | null | 2022-03-03T05:13:37.150470Z | 2021-04-22T16:11:26Z | MODERATE | null | {'CWE-287'} | {'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc', 'https://github.com/vaadin/flow/'} | null |
Maven | GHSA-x64g-4xx9-fh6x | Denial of Service in Cryptacular | CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data. | {'CVE-2020-7226'} | 2022-04-22T18:30:43.107186Z | 2020-06-10T20:02:58Z | HIGH | null | {'CWE-770'} | {'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/apereo/cas/pull/4685', 'https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a@%3Cdev.ws.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7226', 'https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945@%3Cdev.ws.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/issues/52', 'https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6@%3Ccommits.tomee.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44@%3Cdev.ws.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/vt-middleware/cryptacular/pull/56', 'https://github.com/vt-middleware/cryptacular'} | null |
Maven | GHSA-vc89-hccf-rq55 | Hash collision in typelevel jawn | ### Impact
Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack. Most applications do not implement these traits directly, but inherit from a library:
Affected implementations include:
* `org.http4s` :: `http4s-play-json`
* `org.typelevel :: jawn-ast` (< 0.8.0)
* `org.typelevel :: jawn-play` (discontinued)
* `org.typelevel :: jawn-rojoma` (discontinued)
* `org.typelevel :: jawn-spray` (discontinued)
Unaffected implementations include:
* `io.argonaut :: argonaut-jawn`
* `io.circe :: circe-parser`
* `org.typelevel :: jawn-ast` (>= 0.8.0)
* `org.typelevel :: jawn-json4s` (discontinued)
* `org.typelevel :: jawn-argonaut` (discontinued)
### Patches
`jawn-parser-1.3.2` fixes the issue.
### Workarounds
Override `objectContext()` to use a collision-safe collection. See [the patch](https://github.com/typelevel/jawn/pull/390/files) for an example in both `SimpleFacade` and `MutableFacade`.
### References
* https://github.com/typelevel/jawn/pull/390
### Credits
* @kag0, for the report and the patch
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [typelevel/jawn](https://github.com/typelevel/jawn)
* E-mail a maintainer:
* [@rossabaker](mailto:ross@rossabaker.com)
| {'CVE-2022-21653'} | 2022-01-06T20:19:30Z | 2022-01-06T23:48:35Z | MODERATE | null | {'CWE-400', 'CWE-326'} | {'https://github.com/typelevel/jawn', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21653', 'https://github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55', 'https://github.com/typelevel/jawn/pull/390'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.