ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-hrcp-8f3q-4w2c
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21351](https://x-stream.github.io/CVE-2021-21351.html). ### Credits wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21351'}
2022-03-03T05:13:12.676569Z
2021-03-22T23:29:37Z
MODERATE
null
{'CWE-502', 'CWE-434'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c', 'https://x-stream.github.io/CVE-2021-21351.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21351', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}
null
Maven
GHSA-fmpq-w5q6-9vf9
Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
{'CVE-2019-0224'}
2022-03-03T05:13:00.485023Z
2019-04-02T15:46:48Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E', 'https://github.com/advisories/GHSA-fmpq-w5q6-9vf9', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0224', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224', 'http://www.securityfocus.com/bid/107631'}
null
Maven
GHSA-3mqv-8gxg-pfm4
Cross-site scripting in twitter-server
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
{'CVE-2020-35774'}
2022-03-03T05:12:37.366113Z
2022-02-09T22:37:28Z
MODERATE
null
{'CWE-79'}
{'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0'}
null
Maven
GHSA-24wf-7vf2-pv59
XXE vulnerability on Launch import with externally-defined DTD file
### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. ### Patches Fixed with: https://github.com/reportportal/service-api/pull/1392 ### Binaries `docker pull reportportal/service-api:5.4.0` https://github.com/reportportal/service-api/packages/846871?version=5.4.0 ### For more information If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
{'CVE-2021-29620'}
2022-03-03T05:14:13.171729Z
2021-06-28T16:38:29Z
HIGH
null
{'CWE-611'}
{'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59'}
null
Maven
GHSA-chj8-5xgw-wcvj
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
{'CVE-2016-8750'}
2022-03-03T05:12:45.064223Z
2019-01-07T19:14:46Z
MODERATE
null
{'CWE-90'}
{'https://karaf.apache.org/security/cve-2016-8750.txt', 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj', 'https://access.redhat.com/errata/RHSA-2018:1322', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750', 'http://www.securityfocus.com/bid/103098'}
null
Maven
GHSA-cxrj-66c5-9fmh
Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
{'CVE-2018-1258'}
2022-04-27T15:16:59.008455Z
2018-10-17T20:05:49Z
HIGH
null
{'CWE-863'}
{'https://github.com/advisories/GHSA-cxrj-66c5-9fmh', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2413', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/104222', 'http://www.securitytracker.com/id/1041888', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'http://www.securitytracker.com/id/1041896', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1258', 'https://pivotal.io/security/cve-2018-1258'}
null
Maven
GHSA-29q4-gxjq-rx5c
Remote Code Execution in SCIMono
### Impact It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system. ### Patches The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19)
{'CVE-2021-21479'}
2022-03-03T05:13:28.940958Z
2021-02-10T02:31:53Z
HIGH
null
{'CWE-62', 'CWE-77', 'CWE-74', 'CWE-917', 'CWE-59', 'CWE-690'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80', 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c'}
null
Maven
GHSA-3gm7-v7vw-866c
XML External Entity (XXE) Injection in Apache Solr
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
{'CVE-2019-0193'}
2022-03-03T05:13:17.001738Z
2019-08-01T19:17:35Z
HIGH
null
{'CWE-94'}
{'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E', 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7', 'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html', 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193', 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'}
null
Maven
GHSA-484q-784p-8m5h
Cross-site Scripting in keycloak
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
{'CVE-2020-10776'}
2022-03-03T05:13:41.223323Z
2022-02-09T00:58:15Z
MODERATE
null
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1847428', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10776'}
null
Maven
GHSA-rcwj-2hj2-vmjj
Insufficient Session Expiration in Apache NiFi Registry
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi Registry.
{'CVE-2020-9482'}
2022-03-03T05:13:41.527509Z
2022-02-09T00:23:06Z
MODERATE
null
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9482', 'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482'}
null
Maven
GHSA-qrx8-8545-4wg2
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39148](https://x-stream.github.io/CVE-2021-39148.html). ### Credits wh1t3p1g from TSRC (Tencent Security Response Center) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39148'}
2022-04-22T15:47:29.758126Z
2021-08-25T14:47:38Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39148', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-39148.html'}
null
Maven
GHSA-rvjg-gxwx-j5gf
OIDC Logout redirect in keycloak
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.
{'CVE-2020-10734'}
2022-04-28T17:15:13.609199Z
2022-04-28T17:13:58Z
LOW
null
{'CWE-601'}
{'https://issues.redhat.com/browse/KEYCLOAK-13653', 'https://github.com/keycloak/keycloak', 'https://bugzilla.redhat.com/show_bug.cgi?id=1831662', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734'}
null
Maven
GHSA-25pc-85qf-6j69
Deserialization of Untrusted Data in Apache Storm
In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.
{'CVE-2018-11779'}
2022-03-03T05:14:14.838858Z
2019-08-01T19:17:53Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'}
null
Maven
GHSA-mm57-9j6q-rxm2
High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12
Akka versions <=2.4.16 and 2.5-M1 are vulnerable to a java deserialization attack in its Remoting component resulting in remote code execution in the context of the ActorSystem.
{'CVE-2017-1000034'}
2022-03-03T05:13:01.831641Z
2018-10-22T20:52:38Z
HIGH
null
{'CWE-502'}
{'https://github.com/advisories/GHSA-mm57-9j6q-rxm2', 'http://doc.akka.io/docs/akka/2.4/security/2017-02-10-java-serialization.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000034'}
null
Maven
GHSA-ghgj-3xqr-6jfm
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak.
{'CVE-2015-2080'}
2022-03-03T05:13:12.650171Z
2018-11-09T17:50:00Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-2080', 'http://www.securitytracker.com/id/1031800', 'https://github.com/eclipse/jetty.project/blob/jetty-9.2.x/advisories/2015-02-24-httpparser-error-buffer-bleed.md', 'http://www.securityfocus.com/bid/72768', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html', 'https://github.com/advisories/GHSA-ghgj-3xqr-6jfm', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html', 'http://seclists.org/fulldisclosure/2015/Mar/12', 'https://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.html', 'http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html', 'http://www.securityfocus.com/archive/1/534755/100/1600/threaded', 'https://security.netapp.com/advisory/ntap-20190307-0005/'}
null
Maven
GHSA-f263-c949-w85g
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.
{'CVE-2020-7692'}
2022-05-04T02:37:13.286190Z
2021-09-28T16:16:52Z
HIGH
null
{'CWE-863', 'CWE-862'}
{'https://tools.ietf.org/html/rfc7636%23section-1', 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/googleapis/google-oauth-java-client', 'https://github.com/googleapis/google-oauth-java-client/issues/469', 'https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7692', 'https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824', 'https://tools.ietf.org/html/rfc8252%23section-8.1'}
null
Maven
GHSA-fcrx-8829-jpqx
Improper Restriction of XML External Entity Reference in wutka jox
An XML External Entity (XXE) vulnerability exists in wutka jox 1.16 in the readObject method in JOXSAXBeanInput.
{'CVE-2021-43142'}
2022-04-01T20:00:13.875439Z
2022-04-01T00:00:45Z
MODERATE
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43142', 'https://novysodope.github.io/2021/10/29/64/'}
null
Maven
GHSA-6f54-3qr9-pjgj
Unauthenticated Access Via OAI-PMH
### Impact Media publication via OAI-PMH allows unauthenticated public access to all media and metadata by default. OAI-PMH is part of the default workflow and is activated by default, requiring active user intervention of users to protect media. This leads to users unknowingly handing out public access to events without their knowledge. ### Patches The problem has been addressed in Opencast 7.6 and 8.1 where the OAI-PMH endpoint is configured to require users with `ROLE_ADMIN` by default. In addition to this, Opencast 9 removes the OAI-PMH publication from the default workflow, making the publication a conscious decision users have to make by updating their workflows. ### Workarounds In the organization security configuration (`etc/security/mh_default_org.xml`), change the roles required for accessing `/oaipmh` from `ROLE_ANONYMOUS` to `ROLE_ADMIN`. ### References - [Public access configuration in the organization's security configuration](https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5228'}
2022-03-03T05:14:21.090816Z
2020-01-30T21:22:06Z
HIGH
null
{'CWE-862'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-6f54-3qr9-pjgj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5228', 'https://github.com/opencast/opencast/blob/1fb812c7810c78f09f29a7f455ff920417924307/etc/security/mh_default_org.xml#L271-L276'}
null
Maven
GHSA-jwqm-c9f2-2cq3
Cleartext Transmission of Sensitive Information, Inclusion of Functionality from Untrusted Control Sphere , and Download of Code Without Integrity Check in Eclipse hawkBit
Eclipse hawkBit versions prior to 0.3.0M2 resolved Maven build artifacts for the Vaadin based UI over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of hawkBit might be infected.
{'CVE-2019-10240'}
2022-03-03T05:13:06.515019Z
2019-04-15T16:19:23Z
HIGH
null
{'CWE-319', 'CWE-829', 'CWE-494'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10240', 'https://github.com/advisories/GHSA-jwqm-c9f2-2cq3'}
null
Maven
GHSA-c332-w4jm-55wv
Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8
Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
{'CVE-2021-31409'}
2022-03-03T05:13:42.933608Z
2021-05-04T17:42:02Z
HIGH
null
{'CWE-400'}
{'https://github.com/vaadin/framework/security/advisories/GHSA-c332-w4jm-55wv', 'https://vaadin.com/security/cve-2021-31409', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31409', 'https://github.com/vaadin/framework/pull/12241', 'https://github.com/vaadin/framework/issues/12240'}
null
Maven
GHSA-4mpj-488r-vh6m
Path traversal in Neo4j Graph Database
### Impact Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files. ### Patches The users should aim to use the latest released version compatible with their Neo4j version. The minimum versions containing patch for this vulnerability (for Neo4j 4.2, 4.3, and 4.4 bundled with APOC, upgrade to the appropriate patched version): 3.5 - bundle n/a, standalone 3.5.0.17 4.2 - bundle 4.2.13, standalone 4.2.10 4.3 - bundle 4.3.9, standalone 4.3.0.4 4.4 - bundle 4.4.2, standalone 4.4.0.1 ### Workarounds If you cannot upgrade the library, you can control the [allowlist of the functions](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/#config_dbms.security.procedures.allowlist) that can be used in your system: ### For more information If you have any questions or comments about this advisory: * Open an issue in [neo4j-apoc-procedures](https://github.com/neo4j-contrib/neo4j-apoc-procedures) * Email us at [security@neo4j.com](mailto:security@neo4j.com) ### Credits We want to publicly recognize the contribution of Nicolai Grødum from the Red Team of PwC Norway for reporting this issue and following the responsible disclosure [policy](https://neo4j.com/trust-center/responsible-disclosure/).
{'CVE-2021-42767'}
2022-03-18T21:00:15.042165Z
2022-02-01T22:01:14Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42767', 'https://neo4j.com'}
null
Maven
GHSA-qcgx-crrx-38v5
Denial of service in DataCommunicator class in Vaadin 8
Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
{'CVE-2021-33609'}
2022-03-03T05:13:08.172522Z
2021-10-13T18:54:09Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33609', 'https://github.com/vaadin/framework/pull/12415', 'https://github.com/vaadin/framework', 'https://vaadin.com/security/cve-2021-33609', 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5'}
null
Maven
GHSA-pc4w-8v5j-29w9
Deserialization of Untrusted Data in Neo4j
Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
{'CVE-2021-34371'}
2022-03-03T05:13:11.587363Z
2021-09-01T18:31:29Z
CRITICAL
null
{'CWE-502'}
{'https://www.exploit-db.com/exploits/50170', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34371', 'https://github.com/neo4j/neo4j'}
null
Maven
GHSA-38cr-2ph5-frr9
Apache Struts REST Plugin can potentially allow a DoS attack
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16.
{'CVE-2018-1327'}
2022-04-26T19:00:11.501189Z
2018-10-16T19:35:26Z
HIGH
null
{'CWE-91'}
{'https://security.netapp.com/advisory/ntap-20180330-0001/', 'https://cwiki.apache.org/confluence/display/WW/S2-056', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1327', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1040575', 'http://www.securityfocus.com/bid/103516', 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E', 'https://github.com/advisories/GHSA-38cr-2ph5-frr9', 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89dbf7f16ae00a4aa79a544a1e72b2326db@%3Cissues.struts.apache.org%3E'}
null
Maven
GHSA-rmm5-g63h-m6g9
Moderate severity vulnerability that affects ro.pippo:pippo-core
jaxb/JaxbEngine.java in Pippo 1.11.0 allows XXE.
{'CVE-2018-20059'}
2022-03-03T05:13:03.042718Z
2018-12-19T19:24:39Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-rmm5-g63h-m6g9', 'https://github.com/pippo-java/pippo/issues/486', 'https://github.com/pippo-java/pippo', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20059'}
null
Maven
GHSA-jgcr-fg3g-qvw8
Improper permission handling in Apache Solr
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.
{'CVE-2021-29262'}
2022-03-03T05:12:47.046939Z
2021-05-10T15:18:17Z
HIGH
null
{'CWE-522', 'CWE-279'}
{'https://lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29262', 'https://security.netapp.com/advisory/ntap-20210604-0009/', 'https://issues.apache.org/jira/browse/SOLR-15249', 'https://lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3E'}
null
Maven
GHSA-95cm-88f5-f2c7
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
{'CVE-2020-10672'}
2022-03-03T05:13:15.484462Z
2020-04-23T16:32:59Z
HIGH
null
null
{'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html', 'https://github.com/FasterXML/jackson-databind/issues/2659', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10672', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-h362-m8f2-5x7c
Password Hashing: Do not use MD5
### Impact User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for popular users like the default `admin` user. This essentially means that for an attacker, it might be feasible to reconstruct a user's password given access to these hashes. Note that attackers needing access to the hashes means that they must gain access to the database in which these are stored first to be able to start cracking the passwords. ### Patches The problem is addressed in Opencast 8.1 which now uses the modern and much stronger bcrypt password hashing algorithm for storing passwords. Note, that old hashes remain MD5 until the password is updated. For a list of users whose password hashes are stored using MD5, take a look at the `/user-utils/users/md5.json` REST endpoint. ### Workarounds There is no workaround. ### References - [MD5 (Wikipedia)](https://en.wikipedia.org/wiki/MD5) - [bcrypt (Wikipedia)](https://en.wikipedia.org/wiki/Bcrypt) - [How weak is MD5 as a password hashing function?](https://security.stackexchange.com/q/52461) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5229'}
2022-03-03T05:14:06.782689Z
2020-01-30T21:21:58Z
LOW
null
{'CWE-327'}
{'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'}
null
Maven
GHSA-6w3v-66mj-2qm6
Moderate severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j
A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected. An authentication of incoming AMQP connections in Apache Qpid Broker-J is performed by special entities called "Authentication Providers". Each Authentication Provider can support several SASL mechanisms which are offered to the connecting clients as part of SASL negotiation process. The client chooses the most appropriate SASL mechanism for authentication. Authentication Providers of following types supports PLAIN SASL mechanism: Plain, PlainPasswordFile, SimpleLDAP, Base64MD5PasswordFile, MD5, SCRAM-SHA-256, SCRAM-SHA-1. XOAUTH2 SASL mechanism is supported by Authentication Providers of type OAuth2. If an AMQP port is configured with any of these Authentication Providers, the Broker may be vulnerable.
{'CVE-2018-1298'}
2021-09-02T18:30:03Z
2018-10-19T16:41:46Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1298', 'https://lists.apache.org/thread.html/d9087e9e57c9b6376754e2b4ea8cd5e9ae6449ed17fc384640c9c9e1@%3Cusers.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-6w3v-66mj-2qm6'}
null
Maven
GHSA-f34x-8pf6-qc9c
HTTP header injection in Sonatype Nexus Repository
Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance.
{'CVE-2021-40143'}
2022-03-03T05:13:17.153801Z
2021-09-08T17:42:18Z
HIGH
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40143', 'https://issues.sonatype.org/secure/ReleaseNote.jspa', 'https://support.sonatype.com/hc/en-us/articles/4405941762579', 'https://github.com/sonatype/nexus-public', 'https://help.sonatype.com/repomanager3/release-notes/2021-release-notes'}
null
Maven
GHSA-cf6r-3wgc-h863
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14892'}
2022-03-03T05:13:43.282192Z
2020-05-15T18:58:58Z
HIGH
null
{'CWE-502'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892', 'https://security.netapp.com/advisory/ntap-20200904-0005/', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://github.com/FasterXML/jackson-databind/issues/2462', 'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b'}
null
Maven
GHSA-v596-fwhq-8x48
High severity vulnerability that affects org.springframework.security:spring-security-core, org.springframework.security:spring-security-core , and org.springframework:spring-core
Spring Security (Spring Security 4.1.x before 4.1.5, 4.2.x before 4.2.4, and 5.0.x before 5.0.1; and Spring Framework 4.3.x before 4.3.14 and 5.0.x before 5.0.3) does not consider URL path parameters when processing security constraints. By adding a URL path parameter with special encodings, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification. Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. In this particular attack, different character encodings used in path parameters allows secured Spring MVC static resource URLs to be bypassed.
{'CVE-2018-1199'}
2022-03-03T05:13:02.030122Z
2018-10-17T20:01:54Z
MODERATE
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-v596-fwhq-8x48', 'https://pivotal.io/security/cve-2018-1199', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1199', 'https://lists.apache.org/thread.html/4ed49b103f64a0cecb38064f26cbf1389afc12124653da2d35166dbe@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ab825fcade0b49becfa30235b3d54f4a51bb74ea96b6c9adb5d1378c@%3Cissues.activemq.apache.org%3E'}
null
Maven
GHSA-mh8g-hprg-8363
Hard-Coded Key Used For Remember-me Token in Opencast
### Impact The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the large XML file and never mentions to change this, basically ensuring that all systems use the same key: ```xml <sec:remember-me key="opencast" user-service-ref="userDetailsService" /> ``` This means that an attacker getting access to a remember-me token for one server can get access to all servers which allow log-in using the same credentials without ever needing the credentials. For example, a remember-me token obtained from develop.opencast.org can be used on stable.opencast.org without actually knowing the log-in credentials. Such an attack will usually not work on different installations – assuming that safe, unique passwords are used – but it is basically guaranteed to work to get access to all machines of one cluster if a token from one machine is compromised. ### Patches This problem is fixed in Opencast 7.6 and Opencast 8.1 ### Workarounds We strongly recommend updating to the patched version. Still, as a workaround for older versions, in `etc/security/mh_default_org.xml`, set a custom key for each server: ```xml <sec:remember-me key="CUSTOM_RANDOM_KEY" user-service-ref="userDetailsService" /> ``` ### References - [Relevant lines in the security configuration](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336) - [Spring Security Remember-Me Authentication Documentation](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html#remember-me-hash-token) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at [security@opencast.org](mailto:security@opencast.org) ### Thanks Thanks to @LukasKalbertodt for reporting the issue.
{'CVE-2020-5222'}
2022-03-03T05:12:50.912934Z
2020-01-30T21:21:44Z
MODERATE
null
{'CWE-798'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363', 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222'}
null
Maven
GHSA-5qfv-rr79-chx5
Cross-site Scripting in Ignite Realtime Openfire
Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.
{'CVE-2019-15488'}
2022-03-03T05:13:02.984293Z
2019-08-27T17:37:33Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15488', 'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5', 'https://github.com/igniterealtime/Openfire/pull/1441'}
null
Maven
GHSA-8p36-q63g-68qh
Autobinding vulnerability in MITREid Connect
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
{'CVE-2021-27582'}
2022-03-03T05:13:05.884875Z
2021-05-13T22:31:22Z
CRITICAL
null
{'CWE-915'}
{'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'}
null
Maven
GHSA-872g-2h8h-362q
High severity vulnerability that affects org.eclipse.jetty:jetty-server
The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes.
{'CVE-2016-4800'}
2022-03-03T05:13:00.470482Z
2018-10-19T16:16:16Z
CRITICAL
null
{'CWE-284'}
{'http://www.zerodayinitiative.com/advisories/ZDI-16-362', 'http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00092.html', 'http://www.ocert.org/advisories/ocert-2016-001.html', 'https://security.netapp.com/advisory/ntap-20190307-0006/', 'https://github.com/advisories/GHSA-872g-2h8h-362q', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4800', 'http://www.securityfocus.com/bid/90945', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-vwxj-6m5m-rrvh
The REST Plugin in Apache Struts is using an outdated XStream library
The REST Plugin in Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
{'CVE-2017-9793'}
2022-04-26T19:15:06.767596Z
2018-10-16T19:37:22Z
HIGH
null
{'CWE-20'}
{'https://security.netapp.com/advisory/ntap-20180629-0001/', 'https://struts.apache.org/docs/s2-051.html', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'http://www.securityfocus.com/bid/100611', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'http://www.securitytracker.com/id/1039262', 'https://github.com/advisories/GHSA-vwxj-6m5m-rrvh', 'http://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-429.htm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9793'}
null
Maven
GHSA-mf7q-gw5f-q8jj
Cross-site Scripting in Apache Zeppelin
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0.
{'CVE-2021-27578'}
2022-03-03T05:13:54.679706Z
2021-09-07T22:55:56Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r31012f2c8e39a5e12e14c1de030012cb8b51c037d953d73b291b7b50@%3Cusers.zeppelin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27578', 'http://www.openwall.com/lists/oss-security/2021/09/02/3', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/apache/zeppelin', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d%40%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r90590aa5ea788128ecc2e822e1e64d5200b4cb92b06707b38da4cb3d@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-c2cp-3xj9-97w9
Denial of service in Spring Security OAuth
Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session. This vulnerability exposes OAuth 2.0 Client applications only.
{'CVE-2022-22969'}
2022-05-04T04:01:59.344898Z
2022-04-22T00:00:33Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22969', 'https://tanzu.vmware.com/security/cve-2022-22969'}
null
Maven
GHSA-hwj3-m3p6-hj38
dom4j allows External Entities by default which might enable XXE attacks
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy artifacts. To resolve this a change to the latest version of `org.dom4j:dom4j` is recommended.
{'CVE-2020-10683'}
2022-03-03T05:12:57.574058Z
2020-06-05T16:13:36Z
CRITICAL
null
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r51f3f9801058e47153c0ad9bc6209d57a592fc0e7aefd787760911b8@%3Cdev.velocity.apache.org%3E', 'https://github.com/dom4j/dom4j/issues/87', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10683', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rb1b990d7920ae0d50da5109b73b92bab736d46c9788dd4b135cb1a51@%3Cnotifications.freemarker.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1694235', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html', 'https://github.com/dom4j/dom4j/releases/tag/version-2.1.3', 'https://usn.ubuntu.com/4575-1/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'https://github.com/dom4j/dom4j', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://github.com/dom4j/dom4j/commits/version-2.0.3'}
null
Maven
GHSA-2x6r-7427-95cm
Deserialization of Untrusted Data in Apache Camel RabbitMQ
Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
{'CVE-2020-11972'}
2022-03-03T05:13:05.973641Z
2021-05-21T19:20:47Z
HIGH
null
{'CWE-502'}
{'http://www.openwall.com/lists/oss-security/2020/05/14/8', 'https://camel.apache.org/security/CVE-2020-11972.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11972', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-f32v-vf79-p29q
Improper authorization in Keycloak
Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.
{'CVE-2022-1466'}
2022-04-28T21:15:07.134396Z
2022-04-27T00:00:19Z
HIGH
null
{'CWE-863'}
{'https://github.com/keycloak/keycloak', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1466', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt', 'https://bugzilla.redhat.com/show_bug.cgi?id=2050228', 'https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076'}
null
Maven
GHSA-qcxh-w3j9-58qr
Denial of Service in Tomcat
The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
{'CVE-2019-0199'}
2022-03-03T05:13:04.596233Z
2020-06-15T18:51:09Z
HIGH
null
{'CWE-400'}
{'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'https://support.f5.com/csp/article/K17321505', 'https://lists.apache.org/thread.html/e56886e1bac9319ecce81b3612dd7a1a43174a3a741a1c805e16880e@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0199', 'https://lists.apache.org/thread.html/ac0185ce240a711b542a55bccf9349ab0c2f343d70cf7835e08fabc9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e1b0b273b6e8ddcc72c9023bc2394b1276fc72664144bf21d0a87995@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/dddb3590bac28fbe89f69f5ccbe26283d014ddc691abdd042de14600@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/158ab719cf60448ddbb074798f09152fdb572fc8f781e70a56118d1a@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'http://www.securityfocus.com/bid/107674', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/a7a201bd23e67fd3326c9b22b814dd0537d3270b3b54a768e2e7ef50@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00013.html', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/cf4eb2bd2083cebb3602a293c653f9a7faa96c86f672c876f25b37ef@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/7bb193bc68b28d21ff1c726fd38bea164deb6333b59eec2eb3661da6@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/9fe25f98bac6d66f8a663a15c37a98bc2d8f8bbed1d408791a3e4067@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e87733036e8c84ea648cdcdca3098f3c8a897e2652c33062b2b1535c@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/4c438fa4c78cb1ce8979077f668ab7145baf83e7c59f2faf7eccf094@%3Cdev.tomcat.apache.org%3E'}
null
Maven
GHSA-v528-7hrm-frqp
Improper Check for Unusual or Exceptional Conditions in json-smart
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
{'CVE-2021-27568'}
2022-04-26T21:00:32.613340Z
2021-06-16T18:03:47Z
CRITICAL
null
{'CWE-754'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netplex/json-smart-v2/issues/60', 'https://github.com/netplex/json-smart-v2', 'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af', 'https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v2/pull/72', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27568', 'https://github.com/netplex/json-smart-v2/issues/62', 'https://github.com/netplex/json-smart-v1/issues/7'}
null
Maven
GHSA-p2xq-vcm7-xjj6
Low severity vulnerability that affects org.apache.mesos:mesos
When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.
{'CVE-2018-11793'}
2022-03-03T05:13:19.142099Z
2019-03-06T17:36:22Z
HIGH
null
{'CWE-119'}
{'http://www.securityfocus.com/bid/107281', 'https://github.com/advisories/GHSA-p2xq-vcm7-xjj6', 'https://lists.apache.org/thread.html/9be975c53e5ad612c7e0af39f5b88837fbfbc32108e587d3d8499844@%3Cdev.mesos.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11793'}
null
Maven
GHSA-49r2-73m6-pp8f
Directory traversal in development mode handler in Vaadin 14 and 15-17
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder. - https://vaadin.com/security/cve-2020-36321
{'CVE-2020-36321'}
2022-03-03T05:14:00.244416Z
2021-04-19T14:51:58Z
MODERATE
null
{'CWE-20', 'CWE-22'}
{'https://vaadin.com/security/cve-2020-36321', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36321', 'https://github.com/vaadin/flow/security/advisories/GHSA-49r2-73m6-pp8f', 'https://github.com/vaadin/flow/pull/9392'}
null
Maven
GHSA-h3cw-g4mq-c5x2
Code Injection in jackson-databind
This project contains the general-purpose data-binding functionality and tree-model for Jackson Data Processor. FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
{'CVE-2020-24616'}
2022-04-22T18:30:32.530898Z
2021-12-09T19:14:51Z
HIGH
null
{'CWE-502', 'CWE-94'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24616', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://github.com/FasterXML/jackson-databind/issues/2814', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
Maven
GHSA-86qr-9vqc-pgc6
Code execution in Spring Integration
Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution during deserialization. In order to protect against this type of attack, Kryo can be configured to require a set of trusted classes for (de)serialization. Spring Integration should be proactive against blocking unknown "deserialization gadgets" when configuring Kryo in code.
{'CVE-2020-5413'}
2022-04-25T23:16:59.419794Z
2020-08-05T14:53:06Z
CRITICAL
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05', 'https://tanzu.vmware.com/security/cve-2020-5413', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413', 'https://github.com/spring-projects/spring-integration', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
Maven
GHSA-p8pq-r894-fm8f
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39146](https://x-stream.github.io/CVE-2021-39146.html). ### Credits Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39146'}
2022-04-22T15:47:26.694015Z
2021-08-25T14:47:57Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/CVE-2021-39146.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39146', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'}
null
Maven
GHSA-vhxc-8jjq-859j
Moderate severity vulnerability that affects org.apache.ranger:ranger
In Apache Ranger before 0.6.2, users with "keyadmin" role should not be allowed to change password for users with "admin" role.
{'CVE-2016-6815'}
2022-03-03T05:13:31.185150Z
2018-10-17T17:21:44Z
MODERATE
null
null
{'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'http://www.securityfocus.com/bid/94221', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6815', 'https://github.com/advisories/GHSA-vhxc-8jjq-859j'}
null
Maven
GHSA-g6ww-2x43-h963
Cross-site scripting in Apache JSPWiki
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
{'CVE-2019-10090'}
2022-03-03T05:14:05.909220Z
2019-10-11T18:41:44Z
MODERATE
null
{'CWE-79'}
{'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10090', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10090'}
null
Maven
GHSA-mgpf-hhgf-cxg4
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin.
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
{'CVE-2021-45457'}
2022-03-03T05:13:19.991532Z
2022-01-08T00:43:16Z
MODERATE
null
{'CWE-522'}
{'https://github.com/apache/kylin', 'https://github.com/apache/kylin/pull/1782', 'https://lists.apache.org/thread/rzv4mq58okwj1n88lry82ol2wwm57q1m', 'https://github.com/apache/kylin/pull/1781', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45457', 'http://www.openwall.com/lists/oss-security/2022/01/06/2'}
null
Maven
GHSA-9gp4-qrff-c648
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
{'CVE-2016-1000345'}
2022-03-03T05:12:59.881779Z
2018-10-18T18:04:13Z
MODERATE
null
null
{'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345', 'https://github.com/advisories/GHSA-9gp4-qrff-c648', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'}
null
Maven
GHSA-vmm8-82m2-pcp5
Use of a Broken or Risky Cryptographic Algorithm in PostgreSQL
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2020-25694'}
2022-04-15T19:47:06.390060Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-327'}
{'https://security.gentoo.org/glsa/202012-07', 'https://bugzilla.redhat.com/show_bug.cgi?id=1894423', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25694', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html', 'https://security.netapp.com/advisory/ntap-20201202-0003/', 'https://www.postgresql.org/support/security/'}
null
Maven
GHSA-94jq-q5v2-76wj
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.
{'CVE-2021-40828'}
2022-03-03T05:13:50.572827Z
2021-11-24T21:02:24Z
MODERATE
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40828', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2'}
null
Maven
GHSA-v4rr-65x6-g69f
XXE vulnerability in Jenkins Flaky Test Handler Plugin
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2022-28140'}
2022-05-03T21:01:58.771749Z
2022-03-30T00:00:25Z
HIGH
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28140', 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896', 'https://github.com/jenkinsci/flaky-test-handler-plugin'}
null
Maven
GHSA-h4rc-386g-6m85
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
{'CVE-2020-11620'}
2022-03-03T05:14:17.580448Z
2020-04-23T20:19:02Z
HIGH
null
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200511-0004/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://github.com/FasterXML/jackson-databind/issues/2682', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11620'}
null
Maven
GHSA-64xx-cq4q-mf44
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39139](https://x-stream.github.io/CVE-2021-39139.html). ### Credits Lai Han of nsfocus security team found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39139'}
2022-04-22T15:47:46.951721Z
2021-08-25T14:48:47Z
HIGH
null
{'CWE-502'}
{'https://x-stream.github.io/CVE-2021-39139.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39139', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'}
null
Maven
GHSA-hp5r-mhgp-56c9
Cross-site Scriptin in JSPWiki
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.
{'CVE-2019-10078'}
2022-03-03T05:14:08.567626Z
2019-06-06T15:29:29Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10078', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078'}
null
Maven
GHSA-84q7-p226-4x5w
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
{'CVE-2017-7656'}
2022-03-03T05:13:29.115956Z
2018-10-19T16:16:27Z
HIGH
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7656', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/rbf4565a0b63f9c8b07fab29352a97bbffe76ecafed8b8555c15b83c6@%3Cissues.maven.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535667', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.debian.org/security/2018/dsa-4278', 'https://github.com/advisories/GHSA-84q7-p226-4x5w', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-gg9m-x3cg-69vh
Access key stored in plain text by Jenkins Metrics Plugin
Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
{'CVE-2022-20621'}
2022-05-04T21:01:56.226583Z
2022-01-13T00:00:57Z
MODERATE
null
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-20621', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624', 'https://github.com/jenkinsci/metrics-plugin', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}
null
Maven
GHSA-7vx9-xjhr-rw6h
Cross-site Scripting in Eclipse Jetty
In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.
{'CVE-2019-10241'}
2022-04-25T23:46:54.746318Z
2019-04-23T16:06:02Z
MODERATE
null
{'CWE-79'}
{'https://www.debian.org/security/2021/dsa-4949', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546121', 'https://lists.apache.org/thread.html/bcfb37bfba7b3d7e9c7808b5e5a38a98d6bb714d52cf5162bdd48e32@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/8bff534863c7aaf09bb17c3d0532777258dd3a5c7ddda34198cc2742@%3Cdev.kafka.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10241', 'https://lists.apache.org/thread.html/d7c4a664a34853f57c2163ab562f39802df5cf809523ea40c97289c1@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/464892b514c029dfc0c8656a93e1c0de983c473df70fdadbd224e09f@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/01e004c3f7c7365863a27e7038b7f32dae56ccf3a496b277c9b7f7b6@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}
null
Maven
GHSA-q897-9jxf-jg9r
Security check skip in Apache Dubbo
The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
{'CVE-2021-37579'}
2022-03-03T05:13:06.468417Z
2021-09-10T17:56:23Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/apache/dubbo', 'https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37579'}
null
Maven
GHSA-rxmr-c9jm-7mm8
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
{'CVE-2018-1284'}
2022-03-03T05:11:04.096586Z
2018-11-21T22:24:22Z
LOW
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/29184dbce4a37be2af36e539ecb479b1d27868f73ccfdff46c7174b4@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1284', 'http://www.securityfocus.com/bid/103750', 'https://github.com/advisories/GHSA-rxmr-c9jm-7mm8'}
null
Maven
GHSA-hc33-32vw-rpp9
Remote Code Execution Vulnerability in Session Storage
### Impact A malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If your application does not use Ratpack's session mechanism, it is not vulnerable. ### Details Attackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code. This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”. Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies. When using server side storage, the attacker would need to obtain the ability to write to the session data store. When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies. Ratpack's session mechanism allows storing serialized objects, of arbitrary types. The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match. However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types. By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used. The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used. To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data. All concrete types of objects serialized must be explicitly declared as safe. Some standard well known JDK types are registered by default. Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html). Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing. The default serializer implementation has been updated to use this mechanism. Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data. Warnings will be logged any time an implementation that does not implement the new methods is used. Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...)) ### Patches Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. ### Workarounds The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list. ### References - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ - https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data
{'CVE-2021-29485'}
2022-03-03T05:13:47.427719Z
2021-07-01T17:01:16Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/ratpack/ratpack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29485', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9', 'https://mvnrepository.com/artifact/io.ratpack/ratpack-core'}
null
Maven
GHSA-82mf-mmh7-hxp5
Directory traversal in development mode handler in Vaadin 14 and 15-17
Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder. - https://vaadin.com/security/cve-2020-36321
null
2022-03-03T05:13:37.315065Z
2021-04-19T14:48:15Z
MODERATE
null
{'CWE-20'}
{'https://vaadin.com/security/cve-2020-36321', 'https://github.com/vaadin/platform', 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5'}
null
Maven
GHSA-3cv4-xxv7-934q
Improper Verification of Cryptographic Signature in Apache Pulsar
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
{'CVE-2021-22160'}
2022-03-03T05:13:55.029210Z
2021-06-01T21:53:49Z
CRITICAL
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22160', 'https://github.com/apache/pulsar/releases/tag/v2.7.2', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf2e90942996dceebac8296abf39257cfeb5ae918f82f7af3d37a48c5@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9a12b4da2f26ce9b8f7e7117a879efaa973dab7e54717bbc7923fab1%40%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra49cb62105154e4795b259c79a6b27d63bfa2ab5787ff8529b089550@%3Cusers.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbe845aa1573a61769b9c5916c62971f4b10de87c2ea5f38a97f0cf84@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/re2ae364e0c02093dc721699698c6f23cfbba0220c78b5e28cafeae81@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf54fefc25c49d4715d484133d438f13bf2e515a5fed5d3a745d4f6e7@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r347650d15a3e9c5f58b83e918b6ad6dedc2a63d3eb63da8e6a7be87e%40%3Cusers.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r08c7df60cae031361df7fbac39d08b6d5b5079e74db5195d409db9a2@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8e545559781231a83bf0644548c660255859e52feb86bbfcd42590da@%3Cdev.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rca54f4b26ba5e6f2e39732b47ec51640e89f57e3b6a38ac3bab314df@%3Cdev.pulsar.apache.org%3E'}
null
Maven
GHSA-2c25-xfpq-8w9r
Cross-site scripting in jfinal
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
{'CVE-2021-33348'}
2022-03-03T05:09:27.392758Z
2021-08-13T15:22:14Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jfinal/jfinal/issues/188', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33348'}
null
Maven
GHSA-8fx9-5hx8-crhm
Apache Struts 2.0.1 uses an unintentional expression in a Freemarker tag instead of string literal
In Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
{'CVE-2017-12611'}
2022-04-26T19:00:20.622976Z
2018-10-16T19:35:40Z
CRITICAL
null
{'CWE-20'}
{'https://kb.netapp.com/support/s/article/ka51A000000CgttQAC/NTAP-20170911-0001', 'http://www.securityfocus.com/bid/100829', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12611', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'https://github.com/advisories/GHSA-8fx9-5hx8-crhm', 'https://struts.apache.org/docs/s2-053.html', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}
null
Maven
GHSA-c738-77x8-wmq5
Uncontrolled Resource Consumption in XNIO
A vulnerability was discovered in XNIO where file descriptor leak caused by growing amounts of NIO Selector file handles between garbage collection cycles. It may allow the attacker to cause a denial of service. It affects XNIO versions 3.6.0.Beta1 through 3.8.1.Final.
{'CVE-2020-14340'}
2022-04-22T16:01:58.961847Z
2021-06-08T22:29:29Z
MODERATE
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1860218', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14340', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-vjqw-r3ww-wj2w
Expression Language Injection in Apache Syncope
A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
{'CVE-2020-1959'}
2022-03-03T05:12:55.888371Z
2021-06-16T17:18:58Z
CRITICAL
null
{'CWE-917'}
{'http://syncope.apache.org/security', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1959'}
null
Maven
GHSA-rpvr-mw7r-25xx
Path traversal in MCMS
MCMS v5.2.5 was discovered to contain an arbitrary file deletion vulnerability via the component oldFileName.
{'CVE-2021-46062'}
2022-03-07T20:46:58.824903Z
2022-02-19T00:01:24Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46062', 'https://github.com/ming-soft/MCMS/issues/59'}
null
Maven
GHSA-m98g-63qj-fp8j
Reflected XSS on clients-registrations endpoint
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak. When a malicious request is sent to the client registration endpoint, the error message is not properly escaped, allowing an attacker to execute malicious scripts into the user's browser. ### Acknowledgement Keycloak would like to thank Quentin TEXIER (Pentester at Opencyber) for reporting this issue.
null
2022-04-28T21:15:21.430165Z
2022-04-28T21:01:28Z
MODERATE
null
{'CWE-79'}
{'https://github.com/keycloak/keycloak', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-m98g-63qj-fp8j'}
null
Maven
GHSA-fjqm-246c-mwqg
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.
{'CVE-2016-1000346'}
2022-04-27T13:45:14.853516Z
2018-10-17T16:27:28Z
LOW
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'}
null
Maven
GHSA-h6xq-3h62-99qx
Cross-site scripting in Apache Atlas
Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability.
{'CVE-2020-13928'}
2022-03-03T05:14:10.068818Z
2022-02-10T20:51:46Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13928', 'https://mvnrepository.com/artifact/org.apache.atlas/apache-atlas'}
null
Maven
GHSA-f93p-f762-vr53
Reflected Cross-Site Scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.
{'CVE-2019-17573'}
2022-03-03T05:14:06.048096Z
2020-06-10T20:02:33Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/rf3b50583fefce2810cbd37c3d358cbcd9a03e750005950bf54546194@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-2382-qx5h-rvqh
SQL Injection in odata4j
odata4j 0.7.0 allows ExecuteCountQueryCommand.java SQL injection. NOTE, this product is apparently discontinued.
{'CVE-2016-11023'}
2022-03-03T05:13:00.560702Z
2021-05-07T15:52:56Z
HIGH
null
{'CWE-89'}
{'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11023'}
null
Maven
GHSA-9qgc-p27w-3hjg
High severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
The decodeRequest and decodeRequestWith directives in Lightbend Akka HTTP 10.1.x through 10.1.4 and 10.0.x through 10.0.13 allow remote attackers to cause a denial of service (memory consumption and daemon crash) via a ZIP bomb.
{'CVE-2018-16131'}
2022-03-03T05:13:27.727873Z
2018-10-22T20:37:07Z
HIGH
null
{'CWE-400'}
{'https://github.com/akka/akka-http/issues/2137', 'https://akka.io/blog/news/2018/08/30/akka-http-dos-vulnerability-found', 'https://github.com/advisories/GHSA-9qgc-p27w-3hjg', 'https://doc.akka.io/docs/akka-http/current/security/2018-09-05-denial-of-service-via-decodeRequest.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16131', 'https://groups.google.com/forum/#!topic/akka-security/Dj7INsYWdjg'}
null
Maven
GHSA-xgrx-xpv2-6vp4
Improper Authentication in Apache ActiveMQ
Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
{'CVE-2020-13920'}
2022-03-03T05:12:43.671222Z
2022-02-09T22:15:00Z
MODERATE
null
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13920', 'http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00013.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'}
null
Maven
GHSA-p426-qw2p-v95v
Argument Injection in Apache Geode server
When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.
{'CVE-2017-15694'}
2022-03-03T05:12:36.295339Z
2019-06-26T01:09:35Z
MODERATE
null
{'CWE-88'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15694', 'https://lists.apache.org/thread.html/311505e7b7a045aaa246f0a1935703acacf41b954621b1363c40bf6f@%3Cuser.geode.apache.org%3E'}
null
Maven
GHSA-rqj9-cq6j-958r
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop 2.7.4 to 2.7.6, the security fix for CVE-2016-6811 is incomplete. A user who can escalate to yarn user can possibly run arbitrary commands as root user.
{'CVE-2018-11766'}
2022-03-03T05:13:12.549978Z
2018-12-21T17:50:26Z
HIGH
null
null
{'http://www.securityfocus.com/bid/106035', 'https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11766', 'https://github.com/advisories/GHSA-rqj9-cq6j-958r'}
null
Maven
GHSA-r3gr-cxrf-hg25
Serialization gadgets exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.
{'CVE-2020-35491'}
2022-04-22T17:31:07.285566Z
2021-12-09T19:15:11Z
HIGH
null
{'CWE-502', 'CWE-913'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35491', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/issues/2986', 'https://security.netapp.com/advisory/ntap-20210122-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-m9cj-v55f-8x26
Authentication Bypass in keycloak
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
{'CVE-2020-27826'}
2022-03-18T18:02:27.911017Z
2022-03-18T17:55:26Z
HIGH
null
{'CWE-250'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72', 'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://access.redhat.com/security/cve/cve-2020-27826'}
null
Maven
GHSA-r9ch-m4fh-fc7q
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well.
{'CVE-2016-1000341'}
2022-03-03T05:13:58.446532Z
2018-10-17T16:24:00Z
MODERATE
null
null
{'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce', 'https://github.com/bcgit/bc-java', 'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000341', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'}
null
Maven
GHSA-f62v-xpxf-3v68
Code injection in Apache Ant
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
{'CVE-2020-11979'}
2022-04-22T17:30:20.141853Z
2021-02-03T19:16:35Z
HIGH
null
{'CWE-74', 'CWE-94'}
{'https://github.com/apache/ant', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/', 'https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://security.gentoo.org/glsa/202011-18', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11979', 'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'}
null
Maven
GHSA-26p8-xrj2-mv53
Apache NiFi process group information disclosure
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.
{'CVE-2019-10083'}
2022-03-03T05:13:57.239864Z
2019-12-02T18:18:37Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10083', 'https://nifi.apache.org/security.html#CVE-2019-10083', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}
null
Maven
GHSA-67f6-c8mx-4q2m
Uncontrolled Resource Consumption in JPA Server in HAPI FHIR
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests.
{'CVE-2021-32053'}
2022-03-03T05:11:48.864054Z
2021-06-16T17:21:11Z
MODERATE
null
{'CWE-400'}
{'https://hapifhir.io', 'https://github.com/hapifhir/hapi-fhir/issues/2641', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32053', 'https://github.com/hapifhir/hapi-fhir/pull/2642'}
null
Maven
GHSA-gh38-x2wm-xmc8
Code injection in ShenYu
Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2021-45029'}
2022-03-03T05:13:04.708348Z
2022-01-28T22:13:27Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/25/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45029', 'https://lists.apache.org/thread/3zzmwvg3012tg306x8o893fvdcssx639', 'http://www.openwall.com/lists/oss-security/2022/01/26/1'}
null
Maven
GHSA-r2pp-x4mm-4999
Moderate severity vulnerability that affects org.neo4j.procedure:apoc
neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.
{'CVE-2018-1000820'}
2022-03-03T05:13:23.286337Z
2018-12-20T22:02:02Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-r2pp-x4mm-4999', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000820', 'https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/', 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931'}
null
Maven
GHSA-9448-c9wq-jg9v
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
In Apache Karaf prior to 4.2.0 release, if the sshd service in Karaf is left on so an administrator can manage the running instance, any user with rights to the Karaf console can pivot and read/write any file on the file system to which the Karaf process user has access. This can be locked down a bit by using chroot to change the root directory to protect files outside of the Karaf install directory; it can be further locked down by defining a security manager policy that limits file system access to those directories beneath the Karaf home that are necessary for the system to run. However, this still allows anyone with ssh access to the Karaf process to read and write a large number of files as the Karaf process user.
{'CVE-2018-11786'}
2022-03-03T05:13:57.808419Z
2018-12-21T17:49:33Z
HIGH
null
{'CWE-269'}
{'https://lists.apache.org/thread.html/5b7ac762c6bbe77ac5d9389f093fc6dbf196c36d788e3d7629e6c1d9@%3Cdev.karaf.apache.org%3E', 'https://github.com/advisories/GHSA-9448-c9wq-jg9v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11786', 'https://issues.apache.org/jira/browse/KARAF-5427', 'http://karaf.apache.org/security/cve-2018-11786.txt'}
null
Maven
GHSA-vmfg-rjjm-rjrj
Deserialization of Untrusted Data
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStream, without validating the data beforehand. When data is received from the Socket, to be logged, it is deserialized into Java objects.An attacker can exploit this vulnerability by sending malicious, serialized Java objects over the connection to the Socket, which may result in execution of arbitrary code when those objects are deserialized. Note that although logback-core is implicated by the Logback project here, the Sonatype Security Research team discovered that the vulnerability is actually present in the logback-classic and logback-access components. Versions prior to 1.2.0 are vulnerable, as stated in the advisory.
{'CVE-2017-5929'}
2022-04-19T16:01:50.629989Z
2021-06-07T16:07:36Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1675', 'https://github.com/qos-ch/logback', 'https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5929', 'https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E', 'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8', 'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://logback.qos.ch/news.html', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929', 'https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E', 'https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E'}
null
Maven
GHSA-cxx2-fp39-rf3r
Cross-Site Scripting in JSPWiki
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
{'CVE-2019-10076'}
2022-03-03T05:13:57.086828Z
2019-06-06T15:29:22Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10076', 'http://www.openwall.com/lists/oss-security/2019/05/19/4', 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'http://www.securityfocus.com/bid/108437', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076'}
null
Maven
GHSA-72w9-fcj5-3fcg
Improper Authentication in Apache Shiro
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
{'CVE-2020-11989'}
2022-05-04T02:07:21.428982Z
2021-05-07T15:53:10Z
CRITICAL
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675%40%3Cuser.shiro.apache.org%3E', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/rcf3d8041e1232201fe5d74fc612a193e435784d64002409b448b58fe@%3Cdev.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11989', 'https://lists.apache.org/thread.html/r408fe60bc8fdfd7c74135249d646d7abadb807ebf90f6fd2b014df21@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r72815a124a119c450b86189767d06848e0d380b1795c6c511d54a675@%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E'}
null
Maven
GHSA-q8wc-9xvp-g3c3
Cross-site scripting in Sakai
Sakai through 12.6 allows XSS via a chat user name.
{'CVE-2019-16148'}
2022-03-03T05:13:54.803101Z
2019-09-23T18:33:18Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16148', 'https://github.com/sakaiproject/sakai/pull/6971'}
null
Maven
GHSA-gfx6-ph4q-q54q
Moderate severity vulnerability that affects com.typesafe.akka:akka-http-core_2.11 and com.typesafe.akka:akka-http-core_2.12
Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service
{'CVE-2017-1000118'}
2022-03-03T05:14:16.191093Z
2018-10-22T20:53:02Z
HIGH
null
{'CWE-119'}
{'https://doc.akka.io/docs/akka-http/10.0.6/security/2017-05-03-illegal-media-range-in-accept-header-causes-stackoverflowerror.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000118', 'https://github.com/advisories/GHSA-gfx6-ph4q-q54q'}
null
Maven
GHSA-r28h-x6hv-2fq3
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43570'}
2021-11-15T14:43:04Z
2021-11-10T20:48:00Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/starkbank/ecdsa-java', 'https://github.com/starkbank/ecdsa-java/releases/tag/v1.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43570', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}
null
Maven
GHSA-3w73-fmf3-hg5c
Policies not properly enforced in OWASP Java HTML Sanitizer
The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements.
{'CVE-2021-42575'}
2022-03-03T05:13:08.035570Z
2021-10-19T20:15:50Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42575', 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
Maven
GHSA-2rq5-68hm-h4j8
Cross-Site Request Forgery in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.
{'CVE-2021-25931'}
2021-05-28T22:26:41Z
2021-05-25T18:46:55Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}
null
Maven
GHSA-cc94-3v9c-7rm8
Apache ActiveMQ webconsole admin GUI is open to XSS
In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.
{'CVE-2020-1941'}
2022-03-03T05:13:21.588819Z
2020-05-21T21:08:56Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1941', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'}
null
Maven
GHSA-4gq5-ch57-c2mg
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
{'CVE-2018-14719'}
2022-03-03T05:13:11.866366Z
2019-01-04T19:09:49Z
CRITICAL
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.debian.org/security/2019/dsa-4452'}
null