ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-hrcp-8f3q-4w2c | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21351](https://x-stream.github.io/CVE-2021-21351.html).
### Credits
wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21351'} | 2022-03-03T05:13:12.676569Z | 2021-03-22T23:29:37Z | MODERATE | null | {'CWE-502', 'CWE-434'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c', 'https://x-stream.github.io/CVE-2021-21351.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21351', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'} | null |
Maven | GHSA-fmpq-w5q6-9vf9 | Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main | In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser. | {'CVE-2019-0224'} | 2022-03-03T05:13:00.485023Z | 2019-04-02T15:46:48Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E', 'https://github.com/advisories/GHSA-fmpq-w5q6-9vf9', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0224', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224', 'http://www.securityfocus.com/bid/107631'} | null |
Maven | GHSA-3mqv-8gxg-pfm4 | Cross-site scripting in twitter-server | server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint. | {'CVE-2020-35774'} | 2022-03-03T05:12:37.366113Z | 2022-02-09T22:37:28Z | MODERATE | null | {'CWE-79'} | {'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0'} | null |
Maven | GHSA-24wf-7vf2-pv59 | XXE vulnerability on Launch import with externally-defined DTD file | ### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
### Patches
Fixed with: https://github.com/reportportal/service-api/pull/1392
### Binaries
`docker pull reportportal/service-api:5.4.0`
https://github.com/reportportal/service-api/packages/846871?version=5.4.0
### For more information
If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
| {'CVE-2021-29620'} | 2022-03-03T05:14:13.171729Z | 2021-06-28T16:38:29Z | HIGH | null | {'CWE-611'} | {'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59'} | null |
Maven | GHSA-chj8-5xgw-wcvj | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf | Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service. | {'CVE-2016-8750'} | 2022-03-03T05:12:45.064223Z | 2019-01-07T19:14:46Z | MODERATE | null | {'CWE-90'} | {'https://karaf.apache.org/security/cve-2016-8750.txt', 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj', 'https://access.redhat.com/errata/RHSA-2018:1322', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750', 'http://www.securityfocus.com/bid/103098'} | null |
Maven | GHSA-cxrj-66c5-9fmh | Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass | Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted. | {'CVE-2018-1258'} | 2022-04-27T15:16:59.008455Z | 2018-10-17T20:05:49Z | HIGH | null | {'CWE-863'} | {'https://github.com/advisories/GHSA-cxrj-66c5-9fmh', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2413', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/104222', 'http://www.securitytracker.com/id/1041888', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'http://www.securitytracker.com/id/1041896', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1258', 'https://pivotal.io/security/cve-2018-1258'} | null |
Maven | GHSA-29q4-gxjq-rx5c | Remote Code Execution in SCIMono | ### Impact
It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system.
### Patches
The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19) | {'CVE-2021-21479'} | 2022-03-03T05:13:28.940958Z | 2021-02-10T02:31:53Z | HIGH | null | {'CWE-62', 'CWE-77', 'CWE-74', 'CWE-917', 'CWE-59', 'CWE-690'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80', 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c'} | null |
Maven | GHSA-3gm7-v7vw-866c | XML External Entity (XXE) Injection in Apache Solr | In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. | {'CVE-2019-0193'} | 2022-03-03T05:13:17.001738Z | 2019-08-01T19:17:35Z | HIGH | null | {'CWE-94'} | {'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E', 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7', 'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html', 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193', 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'} | null |
Maven | GHSA-484q-784p-8m5h | Cross-site Scripting in keycloak | A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack. | {'CVE-2020-10776'} | 2022-03-03T05:13:41.223323Z | 2022-02-09T00:58:15Z | MODERATE | null | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1847428', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10776'} | null |
Maven | GHSA-rcwj-2hj2-vmjj | Insufficient Session Expiration in Apache NiFi Registry | If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry. | {'CVE-2020-9482'} | 2022-03-03T05:13:41.527509Z | 2022-02-09T00:23:06Z | MODERATE | null | {'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9482', 'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482'} | null |
Maven | GHSA-qrx8-8545-4wg2 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39148](https://x-stream.github.io/CVE-2021-39148.html).
### Credits
wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39148'} | 2022-04-22T15:47:29.758126Z | 2021-08-25T14:47:38Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39148', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-39148.html'} | null |
Maven | GHSA-rvjg-gxwx-j5gf | OIDC Logout redirect in keycloak | A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability. | {'CVE-2020-10734'} | 2022-04-28T17:15:13.609199Z | 2022-04-28T17:13:58Z | LOW | null | {'CWE-601'} | {'https://issues.redhat.com/browse/KEYCLOAK-13653', 'https://github.com/keycloak/keycloak', 'https://bugzilla.redhat.com/show_bug.cgi?id=1831662', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734'} | null |
Maven | GHSA-25pc-85qf-6j69 | Deserialization of Untrusted Data in Apache Storm | In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class. | {'CVE-2018-11779'} | 2022-03-03T05:14:14.838858Z | 2019-08-01T19:17:53Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'} | null |
Maven | GHSA-mm57-9j6q-rxm2 | High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12 | Akka versions <=2.4.16 and 2.5-M1 are vulnerable to a java deserialization attack in its Remoting component resulting in remote code execution in the context of the ActorSystem. | {'CVE-2017-1000034'} | 2022-03-03T05:13:01.831641Z | 2018-10-22T20:52:38Z | HIGH | null | {'CWE-502'} | {'https://github.com/advisories/GHSA-mm57-9j6q-rxm2', 'http://doc.akka.io/docs/akka/2.4/security/2017-02-10-java-serialization.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000034'} | null |
Maven | GHSA-ghgj-3xqr-6jfm | Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server | The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak. | {'CVE-2015-2080'} | 2022-03-03T05:13:12.650171Z | 2018-11-09T17:50:00Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-2080', 'http://www.securitytracker.com/id/1031800', 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md', 'http://www.securityfocus.com/bid/72768', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html', 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html', 'http://seclists.org/fulldisclosure/2015/Mar/12', 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html', 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html', 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded', 'https://security.netapp.com/advisory/ntap-20190307-0005/'} | null |
Maven | GHSA-f263-c949-w85g | Improper Authorization in Google OAuth Client | PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0. | {'CVE-2020-7692'} | 2022-05-04T02:37:13.286190Z | 2021-09-28T16:16:52Z | HIGH | null | {'CWE-863', 'CWE-862'} | {'https://tools.ietf.org/html/rfc7636%23section-1', 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/googleapis/google-oauth-java-client', 'https://github.com/googleapis/google-oauth-java-client/issues/469', 'https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7692', 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824', 'https://tools.ietf.org/html/rfc8252%23section-8.1'} | null |
Maven | GHSA-fcrx-8829-jpqx | Improper Restriction of XML External Entity Reference in wutka jox | An XML External Entity (XXE) vulnerability exists in wutka jox 1.16 in the readObject method in JOXSAXBeanInput. | {'CVE-2021-43142'} | 2022-04-01T20:00:13.875439Z | 2022-04-01T00:00:45Z | MODERATE | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43142', 'https://novysodope.github.io/2021/10/29/64/'} | null |
Maven | GHSA-6f54-3qr9-pjgj | Unauthenticated Access Via OAI-PMH | ### Impact
Media publication via OAI-PMH allows unauthenticated public access to all media and metadata by default. OAI-PMH is part of the default workflow and is activated by default, requiring active user intervention of users to protect media. This leads to users unknowingly handing out public access to events without their knowledge.
### Patches
The problem has been addressed in Opencast 7.6 and 8.1 where the OAI-PMH endpoint is configured to require users with `ROLE_ADMIN` by default. In addition to this, Opencast 9 removes the OAI-PMH publication from the default workflow, making the publication a conscious decision users have to make by updating their workflows.
### Workarounds
In the organization security configuration (`etc/security/mh_default_org.xml`), change the roles required for accessing `/oaipmh` from `ROLE_ANONYMOUS` to `ROLE_ADMIN`.
### References
- [Public access configuration in the organization's security configuration](https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5228'} | 2022-03-03T05:14:21.090816Z | 2020-01-30T21:22:06Z | HIGH | null | {'CWE-862'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-6f54-3qr9-pjgj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5228', 'https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276'} | null |
Maven | GHSA-jwqm-c9f2-2cq3 | Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit | Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected. | {'CVE-2019-10240'} | 2022-03-03T05:13:06.515019Z | 2019-04-15T16:19:23Z | HIGH | null | {'CWE-319', 'CWE-829', 'CWE-494'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10240', 'https://github.com/advisories/GHSA-jwqm-c9f2-2cq3'} | null |
Maven | GHSA-c332-w4jm-55wv | Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8 | Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. | {'CVE-2021-31409'} | 2022-03-03T05:13:42.933608Z | 2021-05-04T17:42:02Z | HIGH | null | {'CWE-400'} | {'https://github.com/vaadin/framework/security/advisories/GHSA-c332-w4jm-55wv', 'https://vaadin.com/security/cve-2021-31409', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31409', 'https://github.com/vaadin/framework/pull/12241', 'https://github.com/vaadin/framework/issues/12240'} | null |
Maven | GHSA-4mpj-488r-vh6m | Path traversal in Neo4j Graph Database | ### Impact
Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files.
### Patches
The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability (for Neo4j 4.2, 4.3, and 4.4 bundled with APOC, upgrade to the appropriate patched version):
3.5 - bundle n/a, standalone 3.5.0.17
4.2 - bundle 4.2.13, standalone 4.2.10
4.3 - bundle 4.3.9, standalone 4.3.0.4
4.4 - bundle 4.4.2, standalone 4.4.0.1
### Workarounds
If you cannot upgrade the library, you can control the [allowlist of the functions](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) that can be used in your system:
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures)
* Email us at [security@neo4j.com](mailto:security@neo4j.com)
### Credits
We want to publicly recognize the contribution of Nicolai Grødum from the Red Team of PwC Norway for reporting this issue and following the responsible disclosure [policy](https://neo4j.com/trust-center/responsible-disclosure/).
| {'CVE-2021-42767'} | 2022-03-18T21:00:15.042165Z | 2022-02-01T22:01:14Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42767', 'https://neo4j.com'} | null |
Maven | GHSA-qcgx-crrx-38v5 | Denial of service in DataCommunicator class in Vaadin 8 | Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data. | {'CVE-2021-33609'} | 2022-03-03T05:13:08.172522Z | 2021-10-13T18:54:09Z | MODERATE | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33609', 'https://github.com/vaadin/framework/pull/12415', 'https://github.com/vaadin/framework', 'https://vaadin.com/security/cve-2021-33609', 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5'} | null |
Maven | GHSA-pc4w-8v5j-29w9 | Deserialization of Untrusted Data in Neo4j | Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains. | {'CVE-2021-34371'} | 2022-03-03T05:13:11.587363Z | 2021-09-01T18:31:29Z | CRITICAL | null | {'CWE-502'} | {'https://www.exploit-db.com/exploits/50170', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34371', 'https://github.com/neo4j/neo4j'} | null |
Maven | GHSA-38cr-2ph5-frr9 | Apache Struts REST Plugin can potentially allow a DoS attack | The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. | {'CVE-2018-1327'} | 2022-04-26T19:00:11.501189Z | 2018-10-16T19:35:26Z | HIGH | null | {'CWE-91'} | {'https://security.netapp.com/advisory/ntap-20180330-0001/', 'https://cwiki.apache.org/confluence/display/WW/S2-056', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1327', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1040575', 'http://www.securityfocus.com/bid/103516', 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E', 'https://github.com/advisories/GHSA-38cr-2ph5-frr9', 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E'} | null |
Maven | GHSA-rmm5-g63h-m6g9 | Moderate severity vulnerability that affects ro.pippo:pippo-core | jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE. | {'CVE-2018-20059'} | 2022-03-03T05:13:03.042718Z | 2018-12-19T19:24:39Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-rmm5-g63h-m6g9', 'https://github.com/pippo-java/pippo/issues/486', 'https://github.com/pippo-java/pippo', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059'} | null |
Maven | GHSA-jgcr-fg3g-qvw8 | Improper permission handling in Apache Solr | When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs. | {'CVE-2021-29262'} | 2022-03-03T05:12:47.046939Z | 2021-05-10T15:18:17Z | HIGH | null | {'CWE-522', 'CWE-279'} | {'https://lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29262', 'https://security.netapp.com/advisory/ntap-20210604-0009/', 'https://issues.apache.org/jira/browse/SOLR-15249', 'https://lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E'} | null |
Maven | GHSA-95cm-88f5-f2c7 | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms). | {'CVE-2020-10672'} | 2022-03-03T05:13:15.484462Z | 2020-04-23T16:32:59Z | HIGH | null | null | {'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html', 'https://github.com/FasterXML/jackson-databind/issues/2659', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10672', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-h362-m8f2-5x7c | Password Hashing: Do not use MD5 | ### Impact
User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default `admin` user.
This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access to these hashes.
Note that attackers needing access to the hashes means that they must gain access to the database in which these are stored first to be able to start cracking the passwords.
### Patches
The problem is addressed in Opencast 8.1 which now uses the modern and much stronger bcrypt password hashing algorithm for storing passwords. Note, that old hashes remain MD5 until the password is updated.
For a list of users whose password hashes are stored using MD5, take a look at the `/user-utils/users/md5.json` REST endpoint.
### Workarounds
There is no workaround.
### References
- [MD5 (Wikipedia)](https://en.wikipedia.org/wiki/MD5)
- [bcrypt (Wikipedia)](https://en.wikipedia.org/wiki/Bcrypt)
- [How weak is MD5 as a password hashing function?](https://security.stackexchange.com/q/52461)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5229'} | 2022-03-03T05:14:06.782689Z | 2020-01-30T21:21:58Z | LOW | null | {'CWE-327'} | {'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'} | null |
Maven | GHSA-6w3v-66mj-2qm6 | Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j | A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable. | {'CVE-2018-1298'} | 2021-09-02T18:30:03Z | 2018-10-19T16:41:46Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1298', 'https://lists.apache.org/thread.html/d9087e9e57c9b6376754e2b4ea8cd5e9ae6449ed17fc384640c9c9e1@%3Cusers.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-6w3v-66mj-2qm6'} | null |
Maven | GHSA-f34x-8pf6-qc9c | HTTP header injection in Sonatype Nexus Repository | Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance. | {'CVE-2021-40143'} | 2022-03-03T05:13:17.153801Z | 2021-09-08T17:42:18Z | HIGH | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-40143', 'https://issues.sonatype.org/secure/ReleaseNote.jspa', 'https://support.sonatype.com/hc/en-us/articles/4405941762579', 'https://github.com/sonatype/nexus-public', 'https://help.sonatype.com/repomanager3/release-notes/2021-release-notes'} | null |
Maven | GHSA-cf6r-3wgc-h863 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. | {'CVE-2019-14892'} | 2022-03-03T05:13:43.282192Z | 2020-05-15T18:58:58Z | HIGH | null | {'CWE-502'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892', 'https://security.netapp.com/advisory/ntap-20200904-0005/', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://github.com/FasterXML/jackson-databind/issues/2462', 'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b'} | null |
Maven | GHSA-v596-fwhq-8x48 | High severity vulnerability that affects org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core | Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed. | {'CVE-2018-1199'} | 2022-03-03T05:13:02.030122Z | 2018-10-17T20:01:54Z | MODERATE | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-v596-fwhq-8x48', 'https://pivotal.io/security/cve-2018-1199', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1199', 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E'} | null |
Maven | GHSA-mh8g-hprg-8363 | Hard-Coded Key Used For Remember-me Token in Opencast | ### Impact
The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key:
```xml
<sec:remember-me key="opencast" user-service-ref="userDetailsService" />
```
This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials.
Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised.
### Patches
This problem is fixed in Opencast 7.6 and Opencast 8.1
### Workarounds
We strongly recommend updating to the patched version. Still, as a workaround for older versions, in `etc/security/mh_default_org.xml`, set a custom key for each server:
```xml
<sec:remember-me key="CUSTOM_RANDOM_KEY" user-service-ref="userDetailsService" />
```
### References
- [Relevant lines in the security configuration](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336)
- [Spring Security Remember-Me Authentication Documentation](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html#remember-me-hash-token)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at [security@opencast.org](mailto:security@opencast.org)
### Thanks
Thanks to @LukasKalbertodt for reporting the issue. | {'CVE-2020-5222'} | 2022-03-03T05:12:50.912934Z | 2020-01-30T21:21:44Z | MODERATE | null | {'CWE-798'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363', 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222'} | null |
Maven | GHSA-5qfv-rr79-chx5 | Cross-site Scripting in Ignite Realtime Openfire | Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test. | {'CVE-2019-15488'} | 2022-03-03T05:13:02.984293Z | 2019-08-27T17:37:33Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-15488', 'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5', 'https://github.com/igniterealtime/Openfire/pull/1441'} | null |
Maven | GHSA-8p36-q63g-68qh | Autobinding vulnerability in MITREid Connect | org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest. | {'CVE-2021-27582'} | 2022-03-03T05:13:05.884875Z | 2021-05-13T22:31:22Z | CRITICAL | null | {'CWE-915'} | {'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'} | null |
Maven | GHSA-872g-2h8h-362q | High severity vulnerability that affects org.eclipse.jetty:jetty-server | The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. | {'CVE-2016-4800'} | 2022-03-03T05:13:00.470482Z | 2018-10-19T16:16:16Z | CRITICAL | null | {'CWE-284'} | {'http://www.zerodayinitiative.com/advisories/ZDI-16-362', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html', 'http://www.ocert.org/advisories/ocert-2016-001.html', 'https://security.netapp.com/advisory/ntap-20190307-0006/', 'https://github.com/advisories/GHSA-872g-2h8h-362q', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4800', 'http://www.securityfocus.com/bid/90945', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-vwxj-6m5m-rrvh | The REST Plugin in Apache Struts is using an outdated XStream library | The REST Plugin in Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload. | {'CVE-2017-9793'} | 2022-04-26T19:15:06.767596Z | 2018-10-16T19:37:22Z | HIGH | null | {'CWE-20'} | {'https://security.netapp.com/advisory/ntap-20180629-0001/', 'https://struts.apache.org/docs/s2-051.html', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'http://www.securityfocus.com/bid/100611', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'http://www.securitytracker.com/id/1039262', 'https://github.com/advisories/GHSA-vwxj-6m5m-rrvh', 'http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9793'} | null |
Maven | GHSA-mf7q-gw5f-q8jj | Cross-site Scripting in Apache Zeppelin | Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0. | {'CVE-2021-27578'} | 2022-03-03T05:13:54.679706Z | 2021-09-07T22:55:56Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/r31012f2c8e39a5e12e14c1de030012cb8b51c037d953d73b291b7b50@%3Cusers.zeppelin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27578', 'http://www.openwall.com/lists/oss-security/2021/09/02/3', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/apache/zeppelin', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d%40%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-c2cp-3xj9-97w9 | Denial of service in Spring Security OAuth | Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only. | {'CVE-2022-22969'} | 2022-05-04T04:01:59.344898Z | 2022-04-22T00:00:33Z | MODERATE | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22969', 'https://tanzu.vmware.com/security/cve-2022-22969'} | null |
Maven | GHSA-hwj3-m3p6-hj38 | dom4j allows External Entities by default which might enable XXE attacks | dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended. | {'CVE-2020-10683'} | 2022-03-03T05:12:57.574058Z | 2020-06-05T16:13:36Z | CRITICAL | null | {'CWE-611'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E', 'https://github.com/dom4j/dom4j/issues/87', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10683', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1694235', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html', 'https://github.com/dom4j/dom4j/releases/tag/version-2.1.3', 'https://usn.ubuntu.com/4575-1/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'https://github.com/dom4j/dom4j', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://github.com/dom4j/dom4j/commits/version-2.0.3'} | null |
Maven | GHSA-2x6r-7427-95cm | Deserialization of Untrusted Data in Apache Camel RabbitMQ | Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0. | {'CVE-2020-11972'} | 2022-03-03T05:13:05.973641Z | 2021-05-21T19:20:47Z | HIGH | null | {'CWE-502'} | {'http://www.openwall.com/lists/oss-security/2020/05/14/8', 'https://camel.apache.org/security/CVE-2020-11972.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11972', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-f32v-vf79-p29q | Improper authorization in Keycloak | Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted. | {'CVE-2022-1466'} | 2022-04-28T21:15:07.134396Z | 2022-04-27T00:00:19Z | HIGH | null | {'CWE-863'} | {'https://github.com/keycloak/keycloak', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1466', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt', 'https://bugzilla.redhat.com/show_bug.cgi?id=2050228', 'https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076'} | null |
Maven | GHSA-qcxh-w3j9-58qr | Denial of Service in Tomcat | The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. | {'CVE-2019-0199'} | 2022-03-03T05:13:04.596233Z | 2020-06-15T18:51:09Z | HIGH | null | {'CWE-400'} | {'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'https://support.f5.com/csp/article/K17321505', 'https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199', 'https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'http://www.securityfocus.com/bid/107674', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E'} | null |
Maven | GHSA-v528-7hrm-frqp | Improper Check for Unusual or Exceptional Conditions in json-smart | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | {'CVE-2021-27568'} | 2022-04-26T21:00:32.613340Z | 2021-06-16T18:03:47Z | CRITICAL | null | {'CWE-754'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netplex/json-smart-v2/issues/60', 'https://github.com/netplex/json-smart-v2', 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af', 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v2/pull/72', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568', 'https://github.com/netplex/json-smart-v2/issues/62', 'https://github.com/netplex/json-smart-v1/issues/7'} | null |
Maven | GHSA-p2xq-vcm7-xjj6 | Low severity vulnerability that affects org.apache.mesos:mesos | When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable. | {'CVE-2018-11793'} | 2022-03-03T05:13:19.142099Z | 2019-03-06T17:36:22Z | HIGH | null | {'CWE-119'} | {'http://www.securityfocus.com/bid/107281', 'https://github.com/advisories/GHSA-p2xq-vcm7-xjj6', 'https://lists.apache.org/thread.html/9be975c53e5ad612c7e0af39f5b88837fbfbc32108e587d3d8499844@%3Cdev.mesos.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11793'} | null |
Maven | GHSA-49r2-73m6-pp8f | Directory traversal in development mode handler in Vaadin 14 and 15-17 | Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-2020-36321 | {'CVE-2020-36321'} | 2022-03-03T05:14:00.244416Z | 2021-04-19T14:51:58Z | MODERATE | null | {'CWE-20', 'CWE-22'} | {'https://vaadin.com/security/cve-2020-36321', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36321', 'https://github.com/vaadin/flow/security/advisories/GHSA-49r2-73m6-pp8f', 'https://github.com/vaadin/flow/pull/9392'} | null |
Maven | GHSA-h3cw-g4mq-c5x2 | Code Injection in jackson-databind | This project contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP). | {'CVE-2020-24616'} | 2022-04-22T18:30:32.530898Z | 2021-12-09T19:14:51Z | HIGH | null | {'CWE-502', 'CWE-94'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24616', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://github.com/FasterXML/jackson-databind/issues/2814', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html'} | null |
Maven | GHSA-86qr-9vqc-pgc6 | Code execution in Spring Integration | Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code. | {'CVE-2020-5413'} | 2022-04-25T23:16:59.419794Z | 2020-08-05T14:53:06Z | CRITICAL | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05', 'https://tanzu.vmware.com/security/cve-2020-5413', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413', 'https://github.com/spring-projects/spring-integration', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html'} | null |
Maven | GHSA-p8pq-r894-fm8f | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39146](https://x-stream.github.io/CVE-2021-39146.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39146'} | 2022-04-22T15:47:26.694015Z | 2021-08-25T14:47:57Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/CVE-2021-39146.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39146', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-vhxc-8jjq-859j | Moderate severity vulnerability that affects org.apache.ranger:ranger | In Apache Ranger before 0.6.2, users with "keyadmin" role should not be allowed to change password for users with "admin" role. | {'CVE-2016-6815'} | 2022-03-03T05:13:31.185150Z | 2018-10-17T17:21:44Z | MODERATE | null | null | {'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'http://www.securityfocus.com/bid/94221', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6815', 'https://github.com/advisories/GHSA-vhxc-8jjq-859j'} | null |
Maven | GHSA-g6ww-2x43-h963 | Cross-site scripting in Apache JSPWiki | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. | {'CVE-2019-10090'} | 2022-03-03T05:14:05.909220Z | 2019-10-11T18:41:44Z | MODERATE | null | {'CWE-79'} | {'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10090', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10090'} | null |
Maven | GHSA-mgpf-hhgf-cxg4 | In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. | In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. | {'CVE-2021-45457'} | 2022-03-03T05:13:19.991532Z | 2022-01-08T00:43:16Z | MODERATE | null | {'CWE-522'} | {'https://github.com/apache/kylin', 'https://github.com/apache/kylin/pull/1782', 'https://lists.apache.org/thread/rzv4mq58okwj1n88lry82ol2wwm57q1m', 'https://github.com/apache/kylin/pull/1781', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45457', 'http://www.openwall.com/lists/oss-security/2022/01/06/2'} | null |
Maven | GHSA-9gp4-qrff-c648 | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. | {'CVE-2016-1000345'} | 2022-03-03T05:12:59.881779Z | 2018-10-18T18:04:13Z | MODERATE | null | null | {'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345', 'https://github.com/advisories/GHSA-9gp4-qrff-c648', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'} | null |
Maven | GHSA-vmm8-82m2-pcp5 | Use of a Broken or Risky Cryptographic Algorithm in PostgreSQL | A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2020-25694'} | 2022-04-15T19:47:06.390060Z | 2022-02-15T01:57:18Z | HIGH | null | {'CWE-327'} | {'https://security.gentoo.org/glsa/202012-07', 'https://bugzilla.redhat.com/show_bug.cgi?id=1894423', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25694', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html', 'https://security.netapp.com/advisory/ntap-20201202-0003/', 'https://www.postgresql.org/support/security/'} | null |
Maven | GHSA-94jq-q5v2-76wj | Improper certificate management in AWS IoT Device SDK v2 | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows. | {'CVE-2021-40828'} | 2022-03-03T05:13:50.572827Z | 2021-11-24T21:02:24Z | MODERATE | null | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-40828', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2'} | null |
Maven | GHSA-v4rr-65x6-g69f | XXE vulnerability in Jenkins Flaky Test Handler Plugin | Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2022-28140'} | 2022-05-03T21:01:58.771749Z | 2022-03-30T00:00:25Z | HIGH | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-28140', 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896', 'https://github.com/jenkinsci/flaky-test-handler-plugin'} | null |
Maven | GHSA-h4rc-386g-6m85 | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly). | {'CVE-2020-11620'} | 2022-03-03T05:14:17.580448Z | 2020-04-23T20:19:02Z | HIGH | null | {'CWE-502'} | {'https://security.netapp.com/advisory/ntap-20200511-0004/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://github.com/FasterXML/jackson-databind/issues/2682', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11620'} | null |
Maven | GHSA-64xx-cq4q-mf44 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39139](https://x-stream.github.io/CVE-2021-39139.html).
### Credits
Lai Han of nsfocus security team found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39139'} | 2022-04-22T15:47:46.951721Z | 2021-08-25T14:48:47Z | HIGH | null | {'CWE-502'} | {'https://x-stream.github.io/CVE-2021-39139.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39139', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-hp5r-mhgp-56c9 | Cross-site Scriptin in JSPWiki | A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable. | {'CVE-2019-10078'} | 2022-03-03T05:14:08.567626Z | 2019-06-06T15:29:29Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10078', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078'} | null |
Maven | GHSA-84q7-p226-4x5w | Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response. | {'CVE-2017-7656'} | 2022-03-03T05:13:29.115956Z | 2018-10-19T16:16:27Z | HIGH | null | {'CWE-444'} | {'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7656', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/rbf4565a0b63f9c8b07fab29352a97bbffe76ecafed8b8555c15b83c6@%3Cissues.maven.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535667', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.debian.org/security/2018/dsa-4278', 'https://github.com/advisories/GHSA-84q7-p226-4x5w', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-gg9m-x3cg-69vh | Access key stored in plain text by Jenkins Metrics Plugin | Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | {'CVE-2022-20621'} | 2022-05-04T21:01:56.226583Z | 2022-01-13T00:00:57Z | MODERATE | null | {'CWE-522'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-20621', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624', 'https://github.com/jenkinsci/metrics-plugin', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'} | null |
Maven | GHSA-7vx9-xjhr-rw6h | Cross-site Scripting in Eclipse Jetty | In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents. | {'CVE-2019-10241'} | 2022-04-25T23:46:54.746318Z | 2019-04-23T16:06:02Z | MODERATE | null | {'CWE-79'} | {'https://www.debian.org/security/2021/dsa-4949', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546121', 'https://lists.apache.org/thread.html/bcfb37bfba7b3d7e9c7808b5e5a38a98d6bb714d52cf5162bdd48e32@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/8bff534863c7aaf09bb17c3d0532777258dd3a5c7ddda34198cc2742@%3Cdev.kafka.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10241', 'https://lists.apache.org/thread.html/d7c4a664a34853f57c2163ab562f39802df5cf809523ea40c97289c1@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/464892b514c029dfc0c8656a93e1c0de983c473df70fdadbd224e09f@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/01e004c3f7c7365863a27e7038b7f32dae56ccf3a496b277c9b7f7b6@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'} | null |
Maven | GHSA-q897-9jxf-jg9r | Security check skip in Apache Dubbo | The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found. | {'CVE-2021-37579'} | 2022-03-03T05:13:06.468417Z | 2021-09-10T17:56:23Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/apache/dubbo', 'https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37579'} | null |
Maven | GHSA-rxmr-c9jm-7mm8 | Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false. | {'CVE-2018-1284'} | 2022-03-03T05:11:04.096586Z | 2018-11-21T22:24:22Z | LOW | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284', 'http://www.securityfocus.com/bid/103750', 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'} | null |
Maven | GHSA-hc33-32vw-rpp9 | Remote Code Execution Vulnerability in Session Storage | ### Impact
A malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store.
If your application does not use Ratpack's session mechanism, it is not vulnerable.
### Details
Attackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code.
This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”.
Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies.
When using server side storage, the attacker would need to obtain the ability to write to the session data store.
When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies.
Ratpack's session mechanism allows storing serialized objects, of arbitrary types.
The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match.
However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types.
By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used.
The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used.
To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data.
All concrete types of objects serialized must be explicitly declared as safe.
Some standard well known JDK types are registered by default.
Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html).
Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing.
The default serializer implementation has been updated to use this mechanism.
Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data.
Warnings will be logged any time an implementation that does not implement the new methods is used.
Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...))
### Patches
Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used.
### Workarounds
The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store.
Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.
### References
- https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
- https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data
| {'CVE-2021-29485'} | 2022-03-03T05:13:47.427719Z | 2021-07-01T17:01:16Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/ratpack/ratpack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29485', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9', 'https://mvnrepository.com/artifact/io.ratpack/ratpack-core'} | null |
Maven | GHSA-82mf-mmh7-hxp5 | Directory traversal in development mode handler in Vaadin 14 and 15-17 | Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-2020-36321 | null | 2022-03-03T05:13:37.315065Z | 2021-04-19T14:48:15Z | MODERATE | null | {'CWE-20'} | {'https://vaadin.com/security/cve-2020-36321', 'https://github.com/vaadin/platform', 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5'} | null |
Maven | GHSA-3cv4-xxv7-934q | Improper Verification of Cryptographic Signature in Apache Pulsar | If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins). | {'CVE-2021-22160'} | 2022-03-03T05:13:55.029210Z | 2021-06-01T21:53:49Z | CRITICAL | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22160', 'https://github.com/apache/pulsar/releases/tag/v2.7.2', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cusers.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df@%3Cdev.pulsar.apache.org%3E'} | null |
Maven | GHSA-2c25-xfpq-8w9r | Cross-site scripting in jfinal | An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases. | {'CVE-2021-33348'} | 2022-03-03T05:09:27.392758Z | 2021-08-13T15:22:14Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jfinal/jfinal/issues/188', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33348'} | null |
Maven | GHSA-8fx9-5hx8-crhm | Apache Struts 2.0.1 uses an unintentional expression in a Freemarker tag instead of string literal | In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack. | {'CVE-2017-12611'} | 2022-04-26T19:00:20.622976Z | 2018-10-16T19:35:40Z | CRITICAL | null | {'CWE-20'} | {'https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001', 'http://www.securityfocus.com/bid/100829', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12611', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'https://github.com/advisories/GHSA-8fx9-5hx8-crhm', 'https://struts.apache.org/docs/s2-053.html', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'} | null |
Maven | GHSA-c738-77x8-wmq5 | Uncontrolled Resource Consumption in XNIO | A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final. | {'CVE-2020-14340'} | 2022-04-22T16:01:58.961847Z | 2021-06-08T22:29:29Z | MODERATE | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1860218', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-vjqw-r3ww-wj2w | Expression Language Injection in Apache Syncope | A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code. | {'CVE-2020-1959'} | 2022-03-03T05:12:55.888371Z | 2021-06-16T17:18:58Z | CRITICAL | null | {'CWE-917'} | {'http://syncope.apache.org/security', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1959'} | null |
Maven | GHSA-rpvr-mw7r-25xx | Path traversal in MCMS | MCMS v5.2.5 was discovered to contain an arbitrary file deletion vulnerability via the component oldFileName. | {'CVE-2021-46062'} | 2022-03-07T20:46:58.824903Z | 2022-02-19T00:01:24Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46062', 'https://github.com/ming-soft/MCMS/issues/59'} | null |
Maven | GHSA-m98g-63qj-fp8j | Reflected XSS on clients-registrations endpoint | A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser.
### Acknowledgement
Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue. | null | 2022-04-28T21:15:21.430165Z | 2022-04-28T21:01:28Z | MODERATE | null | {'CWE-79'} | {'https://github.com/keycloak/keycloak', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j'} | null |
Maven | GHSA-fjqm-246c-mwqg | In Bouncy Castle JCE Provider the other party DH public key is not fully validated | In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation. | {'CVE-2016-1000346'} | 2022-04-27T13:45:14.853516Z | 2018-10-17T16:27:28Z | LOW | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'} | null |
Maven | GHSA-h6xq-3h62-99qx | Cross-site scripting in Apache Atlas | Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability. | {'CVE-2020-13928'} | 2022-03-03T05:14:10.068818Z | 2022-02-10T20:51:46Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13928', 'https://mvnrepository.com/artifact/org.apache.atlas/apache-atlas'} | null |
Maven | GHSA-f93p-f762-vr53 | Reflected Cross-Site Scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable. | {'CVE-2019-17573'} | 2022-03-03T05:14:06.048096Z | 2020-06-10T20:02:33Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
Maven | GHSA-2382-qx5h-rvqh | SQL Injection in odata4j | odata4j 0.7.0 allows ExecuteCountQueryCommand.java SQL injection. NOTE, this product is apparently discontinued. | {'CVE-2016-11023'} | 2022-03-03T05:13:00.560702Z | 2021-05-07T15:52:56Z | HIGH | null | {'CWE-89'} | {'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11023'} | null |
Maven | GHSA-9qgc-p27w-3hjg | High severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12 | The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb. | {'CVE-2018-16131'} | 2022-03-03T05:13:27.727873Z | 2018-10-22T20:37:07Z | HIGH | null | {'CWE-400'} | {'https://github.com/akka/akka-http/issues/2137', 'https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found', 'https://github.com/advisories/GHSA-9qgc-p27w-3hjg', 'https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16131', 'https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg'} | null |
Maven | GHSA-xgrx-xpv2-6vp4 | Improper Authentication in Apache ActiveMQ | Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12. | {'CVE-2020-13920'} | 2022-03-03T05:12:43.671222Z | 2022-02-09T22:15:00Z | MODERATE | null | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13920', 'http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00013.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'} | null |
Maven | GHSA-p426-qw2p-v95v | Argument Injection in Apache Geode server | When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster. | {'CVE-2017-15694'} | 2022-03-03T05:12:36.295339Z | 2019-06-26T01:09:35Z | MODERATE | null | {'CWE-88'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-15694', 'https://lists.apache.org/thread.html/311505e7b7a045aaa246f0a1935703acacf41b954621b1363c40bf6f@%3Cuser.geode.apache.org%3E'} | null |
Maven | GHSA-rqj9-cq6j-958r | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user. | {'CVE-2018-11766'} | 2022-03-03T05:13:12.549978Z | 2018-12-21T17:50:26Z | HIGH | null | null | {'http://www.securityfocus.com/bid/106035', 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11766', 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'} | null |
Maven | GHSA-r3gr-cxrf-hg25 | Serialization gadgets exploit in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource. | {'CVE-2020-35491'} | 2022-04-22T17:31:07.285566Z | 2021-12-09T19:15:11Z | HIGH | null | {'CWE-502', 'CWE-913'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35491', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/issues/2986', 'https://security.netapp.com/advisory/ntap-20210122-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-m9cj-v55f-8x26 | Authentication Bypass in keycloak | A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application. | {'CVE-2020-27826'} | 2022-03-18T18:02:27.911017Z | 2022-03-18T17:55:26Z | HIGH | null | {'CWE-250'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72', 'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://access.redhat.com/security/cve/cve-2020-27826'} | null |
Maven | GHSA-r9ch-m4fh-fc7q | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well. | {'CVE-2016-1000341'} | 2022-03-03T05:13:58.446532Z | 2018-10-17T16:24:00Z | MODERATE | null | null | {'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce', 'https://github.com/bcgit/bc-java', 'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000341', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'} | null |
Maven | GHSA-f62v-xpxf-3v68 | Code injection in Apache Ant | As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. | {'CVE-2020-11979'} | 2022-04-22T17:30:20.141853Z | 2021-02-03T19:16:35Z | HIGH | null | {'CWE-74', 'CWE-94'} | {'https://github.com/apache/ant', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/', 'https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://security.gentoo.org/glsa/202011-18', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11979', 'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'} | null |
Maven | GHSA-26p8-xrj2-mv53 | Apache NiFi process group information disclosure | When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to. | {'CVE-2019-10083'} | 2022-03-03T05:13:57.239864Z | 2019-12-02T18:18:37Z | MODERATE | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10083', 'https://nifi.apache.org/security.html#CVE-2019-10083', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'} | null |
Maven | GHSA-67f6-c8mx-4q2m | Uncontrolled Resource Consumption in JPA Server in HAPI FHIR | JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests. | {'CVE-2021-32053'} | 2022-03-03T05:11:48.864054Z | 2021-06-16T17:21:11Z | MODERATE | null | {'CWE-400'} | {'https://hapifhir.io', 'https://github.com/hapifhir/hapi-fhir/issues/2641', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32053', 'https://github.com/hapifhir/hapi-fhir/pull/2642'} | null |
Maven | GHSA-gh38-x2wm-xmc8 | Code injection in ShenYu | Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | {'CVE-2021-45029'} | 2022-03-03T05:13:04.708348Z | 2022-01-28T22:13:27Z | CRITICAL | null | {'CWE-94'} | {'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/25/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45029', 'https://lists.apache.org/thread/3zzmwvg3012tg306x8o893fvdcssx639', 'http://www.openwall.com/lists/oss-security/2022/01/26/1'} | null |
Maven | GHSA-r2pp-x4mm-4999 | Moderate severity vulnerability that affects org.neo4j.procedure:apoc | neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c. | {'CVE-2018-1000820'} | 2022-03-03T05:13:23.286337Z | 2018-12-20T22:02:02Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-r2pp-x4mm-4999', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000820', 'https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/', 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931'} | null |
Maven | GHSA-9448-c9wq-jg9v | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf | In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user. | {'CVE-2018-11786'} | 2022-03-03T05:13:57.808419Z | 2018-12-21T17:49:33Z | HIGH | null | {'CWE-269'} | {'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E', 'https://github.com/advisories/GHSA-9448-c9wq-jg9v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786', 'https://issues.apache.org/jira/browse/KARAF-5427', 'http://karaf.apache.org/security/cve-2018-11786.txt'} | null |
Maven | GHSA-vmfg-rjjm-rjrj | Deserialization of Untrusted Data | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory. | {'CVE-2017-5929'} | 2022-04-19T16:01:50.629989Z | 2021-06-07T16:07:36Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1675', 'https://github.com/qos-ch/logback', 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929', 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E', 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8', 'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://logback.qos.ch/news.html', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929', 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E'} | null |
Maven | GHSA-cxx2-fp39-rf3r | Cross-Site Scripting in JSPWiki | A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. | {'CVE-2019-10076'} | 2022-03-03T05:13:57.086828Z | 2019-06-06T15:29:22Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10076', 'http://www.openwall.com/lists/oss-security/2019/05/19/4', 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'http://www.securityfocus.com/bid/108437', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076'} | null |
Maven | GHSA-72w9-fcj5-3fcg | Improper Authentication in Apache Shiro | Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. | {'CVE-2020-11989'} | 2022-05-04T02:07:21.428982Z | 2021-05-07T15:53:10Z | CRITICAL | null | {'CWE-287'} | {'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11989', 'https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E'} | null |
Maven | GHSA-q8wc-9xvp-g3c3 | Cross-site scripting in Sakai | Sakai through 12.6 allows XSS via a chat user name. | {'CVE-2019-16148'} | 2022-03-03T05:13:54.803101Z | 2019-09-23T18:33:18Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16148', 'https://github.com/sakaiproject/sakai/pull/6971'} | null |
Maven | GHSA-gfx6-ph4q-q54q | Moderate severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12 | Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service | {'CVE-2017-1000118'} | 2022-03-03T05:14:16.191093Z | 2018-10-22T20:53:02Z | HIGH | null | {'CWE-119'} | {'https://doc.akka.io/docs/akka-http/10.0.6/security/2017-05-03-illegal-media-range-in-accept-header-causes-stackoverflowerror.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000118', 'https://github.com/advisories/GHSA-gfx6-ph4q-q54q'} | null |
Maven | GHSA-r28h-x6hv-2fq3 | Improper Verification of Cryptographic Signature in starkbank-ecdsa | The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | {'CVE-2021-43570'} | 2021-11-15T14:43:04Z | 2021-11-10T20:48:00Z | CRITICAL | null | {'CWE-347'} | {'https://github.com/starkbank/ecdsa-java', 'https://github.com/starkbank/ecdsa-java/releases/tag/v1.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43570', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'} | null |
Maven | GHSA-3w73-fmf3-hg5c | Policies not properly enforced in OWASP Java HTML Sanitizer | The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements. | {'CVE-2021-42575'} | 2022-03-03T05:13:08.035570Z | 2021-10-19T20:15:50Z | CRITICAL | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-42575', 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
Maven | GHSA-2rq5-68hm-h4j8 | Cross-Site Request Forgery in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website. | {'CVE-2021-25931'} | 2021-05-28T22:26:41Z | 2021-05-25T18:46:55Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'} | null |
Maven | GHSA-cc94-3v9c-7rm8 | Apache ActiveMQ webconsole admin GUI is open to XSS | In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue. | {'CVE-2020-1941'} | 2022-03-03T05:13:21.588819Z | 2020-05-21T21:08:56Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1941', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'} | null |
Maven | GHSA-4gq5-ch57-c2mg | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. | {'CVE-2018-14719'} | 2022-03-03T05:13:11.866366Z | 2019-01-04T19:09:49Z | CRITICAL | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.