ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-fxph-q3j8-mv87 | Deserialization of Untrusted Data in Log4j | In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. | {'CVE-2017-5645'} | 2022-04-01T21:17:01.212164Z | 2020-01-06T18:43:38Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5645', 'https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://access.redhat.com/errata/RHSA-2017:1802', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/97702', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8@%3Cgithub.beam.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2633', 'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2888', 'https://access.redhat.com/errata/RHSA-2017:2636', 'https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180726-0002/', 'https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f@%3Cgithub.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1801', 'https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2808', 'https://access.redhat.com/errata/RHSA-2017:3400', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2017:2811', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://access.redhat.com/errata/RHSA-2017:2423', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd@%3Cgithub.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1545', 'https://access.redhat.com/errata/RHSA-2017:2635', 'https://github.com/apache/logging-log4j2', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44@%3Cgithub.beam.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1417', 'http://www.openwall.com/lists/oss-security/2019/12/19/2', 'https://access.redhat.com/errata/RHSA-2017:2810', 'http://www.securitytracker.com/id/1041294', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3Ccommits.logging.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3399', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422@%3Ccommits.doris.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2637', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4J2-1863', 'https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E', 'http://www.securitytracker.com/id/1040200', 'https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83@%3Cgithub.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20181107-0002/', 'https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E'} | null |
Maven | GHSA-j4mm-7pj3-jf7v | HTTP Method Spoofing | Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site request forgery (CSRF) attacks, which would otherwise not be possible.
### Impact
The vulnerability allows attackers to craft links or forms which may change the server state. For example, the following GET request would create a new user:
```sh
% curl -i -u admin:opencast \
'https://legacy.opencast.org/admin-ng/users/test.json?_method=PUT&username=test&password=attack'
HTTP/2 200
…
```
If an admin is logged in to legacy.opencast.org and accidentally clicks this link, a user will silently be created.
### Patches
This issue is fixed in Opencast 9.10 and 10.0.
### Workarounds
You can mitigate the problem by setting the `SameSite=Strict` attribute for your cookies. If this is a viable option for you depends on your integrations. We strongly recommend updating in any case.
### References
- [Fix for 10.0](https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8)
- [Fix for 9.10](https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
| {'CVE-2021-43807'} | 2022-03-03T05:13:41.892420Z | 2021-12-14T21:43:00Z | HIGH | null | {'CWE-290'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43807', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v'} | null |
Maven | GHSA-h5f5-rj4r-42f6 | Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication | Due to incorrect access control in Neo4j Enterprise Database Server 3.4.x before 3.4.9, the setting of LDAP for authentication with STARTTLS, and System Account for authorization, allows an attacker to log into the server by sending any valid username with an arbitrary password. | {'CVE-2018-18389'} | 2022-04-27T14:30:13.978978Z | 2018-10-17T17:31:26Z | CRITICAL | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-18389', 'https://github.com/neo4j/neo4j/issues/12047', 'https://github.com/neo4j/neo4j', 'https://github.com/advisories/GHSA-h5f5-rj4r-42f6'} | null |
Maven | GHSA-v3xw-c963-f5hc | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). | {'CVE-2020-11111'} | 2022-03-03T05:13:31.297203Z | 2020-05-15T18:58:50Z | HIGH | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11111', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://github.com/FasterXML/jackson-databind/issues/2664', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-r86j-2gc6-2cq9 | High severity vulnerability that affects org.apache.hbase:hbase-thrift | An issue in Apache HBase affects the optional "Thrift 1" API server when running over HTTP. There is a race-condition which could lead to authenticated sessions being incorrectly applied to users, e.g. one authenticated user would be considered a different user or an unauthenticated user would be treated as an authenticated user. https://issues.apache.org/jira/browse/HBASE-20664 implements a fix for this issue. It has been fixed in versions: 1.2.6.1, 1.3.2.1, 1.4.5, 2.0.1. | {'CVE-2018-8025'} | 2022-03-03T05:13:51.196245Z | 2018-10-18T18:05:02Z | HIGH | null | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8025', 'https://github.com/advisories/GHSA-r86j-2gc6-2cq9', 'https://lists.apache.org/thread.html/a919e38f587c714c386a01d40fc8f45bd4219a65aaf2dc0bb4eccc96@%3Cdev.hbase.apache.org%3E', 'http://www.securityfocus.com/bid/104554'} | null |
Maven | GHSA-7wfc-x4f7-gg2x | Code injection in Apache Dubbo | Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors. | {'CVE-2021-30180'} | 2022-03-21T22:16:49.458179Z | 2022-03-18T17:58:01Z | CRITICAL | null | {'CWE-444', 'CWE-94'} | {'https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30180'} | null |
Maven | GHSA-g9hh-vvx3-v37v | Denial of service in HtmlUnit-Neko | Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24939. | {'CVE-2022-28366'} | 2022-05-05T16:18:26.198640Z | 2022-04-23T00:03:04Z | HIGH | null | null | {'https://sourceforge.net/projects/htmlunit/files/htmlunit/2.27/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28366', 'https://github.com/HtmlUnit/htmlunit-neko', 'https://search.maven.org/artifact/net.sourceforge.htmlunit/neko-htmlunit', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6'} | null |
Maven | GHSA-4q98-wr72-h35w | Improper input validation in Apache Santuario XML Security for Java | In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4. | {'CVE-2019-12400'} | 2022-03-03T05:13:12.731478Z | 2019-08-27T17:41:33Z | MODERATE | null | {'CWE-20'} | {'https://access.redhat.com/errata/RHSA-2020:0804', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190910-0003/', 'https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12400', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E'} | null |
Maven | GHSA-58pp-9c76-5625 | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy). | {'CVE-2020-11112'} | 2022-03-03T05:13:16.595065Z | 2020-06-10T21:12:41Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://github.com/FasterXML/jackson-databind/issues/2666', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11112'} | null |
Maven | GHSA-26hm-r6mg-963c | SQL Injection in JeecgBoot | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch. | {'CVE-2021-46089'} | 2022-03-03T05:13:23.136820Z | 2022-01-26T00:01:25Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/jeecgboot/jeecg-boot/issues/3331', 'https://github.com/jeecgboot/jeecg-boot'} | null |
Maven | GHSA-9c8w-jrw3-q2c3 | Cross-site Scripting in OWASP AntiSamy | OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character. | {'CVE-2021-35043'} | 2022-04-22T15:47:44.173481Z | 2021-08-02T16:58:43Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-35043', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.4', 'https://github.com/nahsra/antisamy', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/nahsra/antisamy/pull/87', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-5q75-cxcq-wr26 | Low severity vulnerability that affects org.apache.jspwiki:jspwiki-war | A carefully crafted URL could trigger an XSS vulnerability on Apache JSPWiki, from versions up to 2.10.5, which could lead to session hijacking. | {'CVE-2018-20242'} | 2022-03-03T05:13:34.517823Z | 2019-02-12T17:26:07Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/8ee4644432c0a433c5c514a57d940cf6dcb0a0094acd97b36290f0b4@%3Cuser.jspwiki.apache.org%3E', 'http://www.securityfocus.com/bid/106804', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20242', 'https://github.com/advisories/GHSA-5q75-cxcq-wr26'} | null |
Maven | GHSA-h4m4-pgp4-whgm | The reset password form reveal users email address | ### Impact
The reset password form reveals the email address of users just by giving their username.
### Patches
The problem has been patched on XWiki 13.2RC1.
### Workarounds
It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2
### References
https://jira.xwiki.org/browse/XWIKI-18400
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xiwki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
| {'CVE-2021-32731'} | 2021-07-02T16:39:50Z | 2021-07-02T19:19:04Z | MODERATE | null | {'CWE-668', 'CWE-200'} | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm', 'https://jira.xwiki.org/browse/XWIKI-18400'} | null |
Maven | GHSA-g5mm-vmx4-3rg7 | Improper handling of case sensitivity in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path. Versions 5.3.19 and 5.2.21 contain a patch for this issue. | {'CVE-2022-22968'} | 2022-04-25T23:31:54.337548Z | 2022-04-15T00:00:32Z | HIGH | null | {'CWE-178'} | {'https://tanzu.vmware.com/security/cve-2022-22968', 'https://github.com/spring-projects/spring-framework', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22968'} | null |
Maven | GHSA-qhh5-9738-g9mx | Incorrect Default Permissions in Apache DolphinScheduler | Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface. | {'CVE-2020-13922'} | 2022-03-03T05:13:34.456850Z | 2022-02-09T22:26:32Z | MODERATE | null | {'CWE-276'} | {'https://www.mail-archive.com/announce@apache.org/msg06076.html', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'} | null |
Maven | GHSA-gwrp-pvrq-jmwv | Path Traversal and Improper Input Validation in Apache Commons IO | In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. | {'CVE-2021-29425'} | 2022-04-22T18:30:36.718609Z | 2021-04-26T16:04:00Z | MODERATE | null | {'CWE-20', 'CWE-22'} | {'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html', 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E', 'https://issues.apache.org/jira/browse/IO-556', 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0004/', 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425', 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E'} | null |
Maven | GHSA-5chj-xprr-7qqx | Cross-site Scripting in GwtUpload | The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename. | {'CVE-2020-9447'} | 2022-03-03T05:14:01.348802Z | 2021-04-22T16:15:33Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9447', 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality', 'https://github.com/manolo/gwtupload/issues/32', 'https://github.com/manolo/gwtupload'} | null |
Maven | GHSA-vf7p-j8x6-xvwp | Incorrect Authorization in Apache Solr | When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts. | {'CVE-2021-29943'} | 2022-03-03T05:13:40.007522Z | 2021-05-10T15:17:58Z | CRITICAL | null | {'CWE-863'} | {'https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29943', 'https://security.netapp.com/advisory/ntap-20210604-0009/'} | null |
Maven | GHSA-gc52-xj6p-9pxp | Exposure of Sensitive Information to an Unauthorized Actor in Keycloak | Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session. | {'CVE-2019-3868'} | 2022-03-03T05:13:28.887967Z | 2019-04-30T15:37:21Z | MODERATE | null | {'CWE-200'} | {'https://access.redhat.com/errata/RHSA-2019:1140', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3868', 'http://www.securityfocus.com/bid/108061', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3868'} | null |
Maven | GHSA-44cw-p2hm-gpf6 | Disabled Hostname Verification in Opencast | Opencast before version 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests.
Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks.
### Patches
This problem is fixed in Opencast 7.9 and Opencast 8.9
### Self-Signed Certificates
Please be aware that fixing the problem means that Opencast will not simply accept any self-signed certificates any longer without properly importing them. If you need those, please make sure to import them into the Java key store. Better yet, get a valid certificate e.g. from [Let's Encrypt](https://letsencrypt.org). | {'CVE-2020-26234'} | 2022-03-03T05:12:06.667135Z | 2020-12-08T22:37:59Z | HIGH | null | {'CWE-297'} | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc', 'https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26234'} | null |
Maven | GHSA-42f2-f9vc-6365 | Private key leak in Apache CXF | Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter `rs.security.keystore.type` to `jwk`. For this case all keys are returned in this file "as is", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. `oct` keys, which contain secret keys, are not returned at all. | {'CVE-2019-12423'} | 2022-03-03T05:14:12.091098Z | 2020-05-22T19:23:04Z | HIGH | null | {'CWE-522'} | {'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12423', 'https://lists.apache.org/thread.html/rd588ff96f18563aeb5f87ac8c6bce7aae86cb1a4d4be483f96e7208c@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
Maven | GHSA-vmm6-w4cf-7f3x | Authentication Bypass For Endpoints With Anonymous Access in Opencast | ### Impact
Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access.
This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication.
### Patches
This problem is fixed in Opencast 7.6 and Opencast 8.1
### Workarounds
As a workaround for older, unpatched versions, disabling remember-me cookies in `etc/security/mh_default_org.xml` will mitigate the problem but will obviously also disable this feature without obvious indication. To deactivate this, remove the following line from the security configuration:
```xml
<sec:remember-me … />
```
### References
- [Remember-me cookie in the security configuration file](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5206'} | 2022-03-03T05:13:57.051323Z | 2020-01-30T21:21:30Z | CRITICAL | null | {'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5206', 'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8', 'https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x'} | null |
Maven | GHSA-9rr6-jpg7-9jg6 | Authentication Bypass by Capture-replay in Apache Spark | Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later | {'CVE-2021-38296'} | 2022-03-15T21:32:40Z | 2022-03-11T00:02:36Z | HIGH | null | {'CWE-294'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-38296', 'https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd'} | null |
Maven | GHSA-g5w6-mrj7-75h2 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39141](https://x-stream.github.io/CVE-2021-39141.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39141'} | 2022-04-22T15:47:04.481804Z | 2021-08-25T14:48:31Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39141', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2', 'https://x-stream.github.io/CVE-2021-39141.html'} | null |
Maven | GHSA-mm8j-9x84-m9cv | Arbitrary code injection in json-sanitizer | OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents. | {'CVE-2021-23899'} | 2022-03-03T05:13:26.047631Z | 2021-06-16T17:34:18Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899'} | null |
Maven | GHSA-3357-829x-m9pr | Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-spring2 | Application plugins in Apache CXF Fediz before 1.1.3 and 1.2.x before 1.2.1 allow remote attackers to cause a denial of service. | {'CVE-2015-5175'} | 2022-03-03T05:14:04.771892Z | 2018-10-18T16:57:00Z | HIGH | null | {'CWE-20'} | {'https://cxf.apache.org/security-advisories.data/CVE-2015-5175.txt.asc?version=1&modificationDate=1440598018000&api=v2', 'http://www.securityfocus.com/bid/76486', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://mail-archives.apache.org/mod_mbox/cxf-dev/201508.mbox/%3CCAB8XdGAx=VL_uepDSecE2h8ggTD4kpagXnyfegVjt7Axi_Ossw@mail.gmail.com%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2015/08/26/3', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5175', 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=f65c961ea31e3c1851daba8e7e49fc37bbf77b19', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-3357-829x-m9pr'} | null |
Maven | GHSA-8p8g-f9vg-r7xr | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later. | {'CVE-2018-1000850'} | 2022-03-03T05:13:12.591547Z | 2018-12-21T17:48:19Z | HIGH | null | {'CWE-22'} | {'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/square/retrofit', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/square/retrofit/blob/master/CHANGELOG.md', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982', 'https://ihacktoprotect.com/post/retrofit-path-traversal/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'} | null |
Maven | GHSA-3j6g-hxx5-3q26 | Observable Discrepancy in Apache Kafka | Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0. | {'CVE-2021-38153'} | 2022-02-08T20:43:00Z | 2021-09-23T23:18:58Z | MODERATE | null | {'CWE-203'} | {'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cusers.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38153', 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cusers.kafka.apache.org%3E', 'https://github.com/apache/kafka', 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cusers.kafka.apache.org%3E', 'https://kafka.apache.org/cve-list', 'https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cdev.kafka.apache.org%3E'} | null |
Maven | GHSA-hfg5-xpvw-c9x4 | Improper Input Validation in Apache Camel | Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0. | {'CVE-2020-11971'} | 2021-09-01T19:36:12Z | 2021-05-21T19:20:30Z | HIGH | null | {'CWE-20'} | {'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://github.com/apache/camel', 'https://lists.apache.org/thread.html/rc907a3d385a9c62416d686608e7241c864be8ef2ac16a3bdb0e33649@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r16f4f9019840bc923e25d1b029fb42fe2676c4ba36e54824749a8da9@%3Ccommits.camel.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c', 'https://lists.apache.org/thread.html/r938dc2ded68039ab747f6d7a12153862495d4b38107d3ed111994386@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r45da6abb42a9e6853ec8affdbf591f1db3e90c5288de9d3753124c79@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r3d0ae14ca224e69fb1c653f0a5d9e56370ee12d8896aa4490aeae14a@%3Ccommits.camel.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/05/14/7', 'https://issues.apache.org/jira/browse/CAMEL-14811', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11971', 'https://lists.apache.org/thread.html/r7968b5086e861da2cf635a7b215e465ce9912d5f16c683b8e56819c4@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r8988311eb2481fd8a87e69cf17ffb8dc81bfeba5503021537f72db0a@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb0033c4e9dade1fdf22493314062364ff477e9a8b417f687dc168468@%3Cissues.activemq.apache.org%3E', 'https://camel.apache.org/security/CVE-2020-11971.html'} | null |
Maven | GHSA-gj76-429m-56wc | Deserialization of Untrusted Data in Apache Olingo | Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case. | {'CVE-2019-17556'} | 2022-03-03T05:14:09.427603Z | 2020-02-04T22:38:22Z | CRITICAL | null | {'CWE-502'} | {'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E', 'https://github.com/apache/olingo-odata4/pull/60/files', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17556', 'https://issues.apache.org/jira/browse/OLINGO-1410'} | null |
Maven | GHSA-h48w-c35p-6m8x | Out-of-bounds Write in Play Framework | An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service. | {'CVE-2020-27196'} | 2021-04-22T17:02:38Z | 2022-02-10T20:23:25Z | HIGH | null | {'CWE-787'} | {'https://www.playframework.com/security/vulnerability/CVE-2020-27196-DosViaJsonStackOverflow', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27196', 'https://github.com/playframework/playframework/pull/10321'} | null |
Maven | GHSA-3h2h-xqr2-2jp7 | Cross-site Scripting (XSS) in Apache ActiveMQ Artemis | In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section. | {'CVE-2020-13932'} | 2022-03-03T05:12:54.161936Z | 2022-02-09T22:14:01Z | MODERATE | null | {'CWE-79'} | {'https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt', 'https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13932'} | null |
Maven | GHSA-fxhp-wrw9-3r97 | XML external entity (XXE) injection in Apache Nutch | An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Nutch 1.18. | {'CVE-2021-23901'} | 2022-03-18T18:03:06.872576Z | 2022-03-18T17:46:29Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/apache/nutch/pull/563', 'https://security.netapp.com/advisory/ntap-20210513-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23901', 'https://lists.apache.org/thread.html/r090321840b44cc91086c4e317bf2baffa270749dde6c1273b6567f7c%40%3Cdev.nutch.apache.org%3E', 'https://lists.apache.org/thread.html/r7ddfd680aa7ea001ca8da63bb23e3f8caa095a8b4f2261e46bade5c7@%3Cdev.nutch.apache.org%3E', 'https://issues.apache.org/jira/browse/NUTCH-2841', 'https://lists.apache.org/thread.html/r5e2f7737b42c73a3325f3c2c8cdee1ec27631b3a0e144104d84d70e6@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-ff2w-cq2g-wv5f | HTTP Request Smuggling in Netty | Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869. | {'CVE-2020-7238'} | 2022-03-03T05:13:53.923311Z | 2020-02-21T18:55:50Z | HIGH | null | {'CWE-444'} | {'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://netty.io/news/', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://github.com/netty/netty/pull/9865', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://github.com/jdordonezn/CVE-2020-72381/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7238', 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/issues/9861', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://access.redhat.com/errata/RHSA-2020:0601'} | null |
Maven | GHSA-8786-wg74-f522 | Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7. | {'CVE-2020-25803'} | 2022-03-03T05:12:35.927290Z | 2022-02-09T23:07:54Z | HIGH | null | {'CWE-913'} | {'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080102', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25803'} | null |
Maven | GHSA-r577-4hq7-73qh | Remote Code Execution in Apache Dubbo | Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2 | {'CVE-2021-36162'} | 2022-03-03T05:13:26.695928Z | 2021-09-08T20:14:24Z | HIGH | null | {'CWE-77'} | {'https://github.com/apache/dubbo', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36162', 'https://lists.apache.org/thread.html/rfa351115a459e214b99ffcc52c35f33359f3370c547d9c6ba1a60037%40%3Cdev.dubbo.apache.org%3E'} | null |
Maven | GHSA-3gg9-f3vh-866f | Improper Certificate Validation in Graylog | Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not implement proper certificate validation (regardless of whether the "Allow self-signed certificates" option is used). Therefore, any attacker with the ability to intercept network traffic between a Graylog server and an LDAP server is able to redirect traffic to a different LDAP server (unnoticed by the Graylog server due to the lack of certificate validation), effectively bypassing Graylog's authentication mechanism. | {'CVE-2020-15813'} | 2022-03-03T05:13:18.965087Z | 2022-02-10T22:39:58Z | HIGH | null | {'CWE-295'} | {'https://github.com/Graylog2/graylog2-server/issues/5906', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15813', 'https://github.com/Graylog2/graylog2-server/pull/8569'} | null |
Maven | GHSA-xhw6-hjc9-679m | Token validation bypass in Pac4j | Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value. | {'CVE-2021-44878'} | 2022-04-01T18:17:03.461426Z | 2022-01-08T00:36:05Z | HIGH | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44878', 'https://www.pac4j.org/blog/cve_2021_44878_is_this_serious.html', 'https://github.com/pac4j/pac4j', 'https://openid.net/specs/openid-connect-core-1_0.html#IDToken', 'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'} | null |
Maven | GHSA-763g-fqq7-48wg | XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled)) | Due to an incomplete fix for [CVE-2019-9658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9658), checkstyle was still vulnerable to XML External Entity (XXE) Processing.
### Impact
#### User: Build Maintainers
This vulnerability probably doesn't impact Maven/Gradle users as, in most cases, these builds are processing files that are trusted, or pre-vetted by a pull request reviewer before being run on internal CI infrastructure.
#### User: Static Analysis as a Service
If you operate a site/service that parses "untrusted" Checkstyle XML configuration files, you are vulnerable to this and should patch.
Note from the discoverer of the original CVE-2019-9658:
> While looking at a few companies that run Checkstyle/PMD/ect... as a service I notice that it's a common pattern to run the static code analysis tool inside of a Docker container with the following flags:
> ```
> --net=none \
> --privileged=false \
> --cap-drop=ALL
> ```
> Running the analysis in Docker has the advantage that there should be no sensitive local file information that XXE can exfiltrate from the container. Additionally, these flags prevent vulnerabilities in static analysis tools like Checkstyle from being used to exfiltrate data via XXE or to perform SSRF.
> \- [Jonathan Leitschuh](https://twitter.com/jlleitschuh)
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Patched, will be released with version 8.29 at 26 Jan 2020.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No workaround are available
### References
- [CWE-611: Improper Restriction of XML External Entity Reference](https://cwe.mitre.org/data/definitions/611.html)
- GitHub Issue https://github.com/checkstyle/checkstyle/issues/7468
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/checkstyle/checkstyle/issues
| {'CVE-2019-10782'} | 2022-03-03T05:13:51.546007Z | 2020-01-31T18:00:07Z | MODERATE | null | {'CWE-611'} | {'https://github.com/checkstyle/checkstyle/issues/7468', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00008.html', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E', 'https://github.com/checkstyle/checkstyle/security/advisories/GHSA-763g-fqq7-48wg', 'https://snyk.io/vuln/SNYK-JAVA-COMPUPPYCRAWLTOOLS-543266', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10782', 'https://github.com/checkstyle/checkstyle/commit/c46a16d177e6797895b195c288ae9a9a096254b8'} | null |
Maven | GHSA-cjjf-94ff-43w7 | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. | {'CVE-2018-12022'} | 2022-03-03T05:13:35.749753Z | 2019-03-25T18:03:09Z | HIGH | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12022', 'https://access.redhat.com/errata/RHSA-2019:1106', 'http://www.securityfocus.com/bid/107585', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://bugzilla.redhat.com/show_bug.cgi?id=1671098', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/FasterXML/jackson-databind/issues/2052', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://github.com/advisories/GHSA-cjjf-94ff-43w7', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Maven | GHSA-2363-cqg2-863c | XML External Entity (XXE) Injection in JDOM | An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. At this time there is not released fixed version of JDOM. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded. | {'CVE-2021-33813'} | 2022-04-22T16:01:59.574173Z | 2021-07-27T19:02:56Z | HIGH | null | {'CWE-611'} | {'https://alephsecurity.com/vulns/aleph-2021003', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/', 'https://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89@%3Cissues.solr.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33813', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00026.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/', 'https://github.com/hunterhacker/jdom/pull/188', 'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361', 'https://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b@%3Cissues.solr.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00012.html', 'https://github.com/hunterhacker/jdom/releases', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f@%3Cissues.solr.apache.org%3E', 'https://github.com/hunterhacker/jdom', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E'} | null |
Maven | GHSA-h2f4-v4c4-6wx4 | Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings. | {'CVE-2018-12545'} | 2022-03-03T05:13:46.650050Z | 2019-03-28T18:33:38Z | HIGH | null | {'CWE-400'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIS4LALKZNLF5X5IGNGRSKERG7FY4QG6/', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-h2f4-v4c4-6wx4', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/70744fe4faba8e2fa7e50a7fc794dd03cb28dad8b21e08ee59bb1606@%3Cdevnull.infra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12545', 'https://lists.apache.org/thread.html/febc94ffec9275dcda64633e0276a1400cd318e571009e4cda9b7a79@%3Cnotifications.accumulo.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=538096', 'https://lists.apache.org/thread.html/13f5241048ec0bf966a6ddd306feaf40de5b20e1f09096b9cddeddf2@%3Ccommits.accumulo.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-86fh-j58m-7pf5 | Improper Privilege Management in Apache Ozone | In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked. | {'CVE-2021-36372'} | 2021-11-22T19:04:02Z | 2021-11-23T17:57:14Z | CRITICAL | null | {'CWE-273'} | {'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36372', 'http://www.openwall.com/lists/oss-security/2021/11/19/1'} | null |
Maven | GHSA-q7pf-qr96-2vq5 | Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser | A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. | {'CVE-2017-1000208'} | 2022-03-03T05:13:09.316550Z | 2018-10-19T16:46:41Z | HIGH | null | {'CWE-502'} | {'https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000208', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://github.com/advisories/GHSA-q7pf-qr96-2vq5', 'https://github.com/swagger-api/swagger-parser'} | null |
Maven | GHSA-g8j8-mgh9-q77p | File upload leading to RCE in MCMS | An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code. | {'CVE-2021-46036'} | 2022-03-07T20:47:33.857967Z | 2022-02-19T00:01:25Z | CRITICAL | null | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46036', 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'} | null |
Maven | GHSA-xfv3-rrfm-f2rv | Information Exposure in Netty | Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters. | {'CVE-2015-2156'} | 2022-03-03T05:13:47.779414Z | 2020-06-30T21:01:21Z | HIGH | null | {'CWE-20'} | {'http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159166.html', 'https://github.com/netty/netty/pull/3754', 'https://lists.apache.org/thread.html/dc1275aef115bda172851a231c76c0932d973f9ffd8bc375c4aba769@%3Ccommits.cassandra.apache.org%3E', 'https://github.com/netty/netty', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2156', 'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/a19bb1003b0d6cd22475ba83c019b4fc7facfef2a9e13f71132529d3@%3Ccommits.cassandra.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-IONETTY-73571', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159379.html', 'http://netty.io/news/2015/05/08/3-9-8-Final-and-3.html', 'http://www.openwall.com/lists/oss-security/2015/05/17/1', 'https://www.playframework.com/security/vulnerability/CVE-2015-2156-HttpOnlyBypass', 'https://bugzilla.redhat.com/show_bug.cgi?id=1222923', 'http://www.securityfocus.com/bid/74704', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752'} | null |
Maven | GHSA-hwpc-8xqv-jvj4 | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html).
### Credits
钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21345'} | 2022-03-03T05:14:20.972819Z | 2021-03-22T23:28:38Z | MODERATE | null | {'CWE-94'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21345', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://github.com/x-stream/xstream', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://x-stream.github.io/CVE-2021-21345.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'} | null |
Maven | GHSA-qv32-7r6p-xhhh | Moderate severity vulnerability that affects com.adobe.xmp:xmpcore | XMPCore in Adobe XMP Toolkit for Java before 5.1.3 allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | {'CVE-2016-4216'} | 2022-03-03T05:13:11.386429Z | 2018-10-19T16:39:29Z | HIGH | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-qv32-7r6p-xhhh', 'http://www.securityfocus.com/bid/91717', 'https://helpx.adobe.com/security/products/xmpcore/apsb16-24.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4216'} | null |
Maven | GHSA-crv7-7245-f45f | Improper Handling of Length Parameter Inconsistency in Compress | When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package. | {'CVE-2021-35516'} | 2022-04-22T16:01:59.991289Z | 2021-08-02T16:55:15Z | HIGH | null | {'CWE-770', 'CWE-130'} | {'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/2', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35516', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b1016fb15b7118b9a5e16bb0b78cb4f1dfcf7821eb137ab5757c91@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-7hmh-8gwv-mfvq | SQL Injection in Kylin | Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries. | {'CVE-2020-1937'} | 2022-03-03T05:13:29.470212Z | 2020-07-27T22:51:47Z | MODERATE | null | {'CWE-89'} | {'https://github.com/apache/kylin', 'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-552148', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937', 'https://lists.apache.org/thread.html/rc574fef23740522f62ab3bbda4f6171be98aa7a25f3f54be143a80a8%40%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'} | null |
Maven | GHSA-g3wg-6mcf-8jj6 | Local Temp Directory Hijacking Vulnerability | ### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
Additionally, any user code uses of [WebAppContext::getTempDirectory](https://www.eclipse.org/jetty/javadoc/9.4.31.v20200723/org/eclipse/jetty/webapp/WebAppContext.html#getTempDirectory()) would similarly be vulnerable.
Additionally, any user application code using the `ServletContext` attribute for the tempdir will also be impacted.
See: https://javaee.github.io/javaee-spec/javadocs/javax/servlet/ServletContext.html#TEMPDIR
For example:
```java
import java.io.File;
import java.io.IOException;
import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
public class ExampleServlet extends HttpServlet {
@Override
protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
File tempDir = (File)getServletContext().getAttribute(ServletContext.TEMPDIR); // Potentially compromised
// do something with that temp dir
}
}
```
Example: The JSP library itself will use the container temp directory for compiling the JSP source into Java classes before executing them.
### CVSSv3.1 Evaluation
This vulnerability has been calculated to have a [CVSSv3.1 score of 7.8/10 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1)
### Patches
Fixes were applied to the 9.4.x branch with:
- https://github.com/eclipse/jetty.project/commit/53e0e0e9b25a6309bf24ee3b10984f4145701edb
- https://github.com/eclipse/jetty.project/commit/9ad6beb80543b392c91653f6bfce233fc75b9d5f
These will be included in releases: 9.4.33, 10.0.0.beta3, 11.0.0.beta3
### Workarounds
A work around is to set a temporary directory, either for the server or the context, to a directory outside of the shared temporary file system.
For recent releases, a temporary directory can be created simple by creating a directory called `work` in the ${jetty.base} directory (the parent directory of the `webapps` directory).
Alternately the java temporary directory can be set with the System Property `java.io.tmpdir`. A more detailed description of how jetty selects a temporary directory is below.
The Jetty search order for finding a temporary directory is as follows:
1. If the [`WebAppContext` has a temp directory specified](https://www.eclipse.org/jetty/javadoc/current/org/eclipse/jetty/webapp/WebAppContext.html#setTempDirectory(java.io.File)), use it.
2. If the `ServletContext` has the `javax.servlet.context.tempdir` attribute set, and if directory exists, use it.
3. If a `${jetty.base}/work` directory exists, use it (since Jetty 9.1)
4. If a `ServletContext` has the `org.eclipse.jetty.webapp.basetempdir` attribute set, and if the directory exists, use it.
5. Use `System.getProperty("java.io.tmpdir")` and use it.
Jetty will end traversal at the first successful step.
To mitigate this vulnerability the directory must be set to one that is not writable by an attacker. To avoid information leakage, the directory should also not be readable by an attacker.
#### Setting a Jetty server temporary directory.
Choices 3 and 5 apply to the server level, and will impact all deployed webapps on the server.
For choice 3 just create that work directory underneath your `${jetty.base}` and restart Jetty.
For choice 5, just specify your own `java.io.tmpdir` when you start the JVM for Jetty.
``` shell
[jetty-distribution]$ java -Djava.io.tmpdir=/var/web/work -jar start.jar
```
#### Setting a Context specific temporary directory.
The rest of the choices require you to configure the context for that deployed webapp (seen as `${jetty.base}/webapps/<context>.xml`)
Example (excluding the DTD which is version specific):
``` xml
<Configure class="org.eclipse.jetty.webapp.WebAppContext">
<Set name="contextPath"><Property name="foo"/></Set>
<Set name="war">/var/web/webapps/foo.war</Set>
<Set name="tempDirectory">/var/web/work/foo</Set>
</Configure>
```
### References
- https://github.com/eclipse/jetty.project/issues/5451
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
- [CodeQL Query PR To Detect Similar Vulnerabilities](https://github.com/github/codeql/pull/4473)
### Similar Vulnerabilities
Similar, but not the same.
- JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
### For more information
The original report of this vulnerability is below:
> On Thu, 15 Oct 2020 at 21:14, Jonathan Leitschuh <jonathan.leitschuh@gmail.com> wrote:
> Hi WebTide Security Team,
>
> I'm a security researcher writing some custom CodeQL queries to find Local Temporary Directory Hijacking Vulnerabilities. One of my queries flagged an issue in Jetty.
>
> https://lgtm.com/query/5615014766184643449/
>
> I've recently been looking into security vulnerabilities involving the temporary directory because on unix-like systems, the system temporary directory is shared between all users.
> There exists a race condition between the deletion of the temporary file and the creation of the directory.
>
> ```java
> // ensure file will always be unique by appending random digits
> tmpDir = File.createTempFile(temp, ".dir", parent); // Attacker knows the full path of the file that will be generated
> // delete the file that was created
> tmpDir.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Jetty.
> // and make a directory of the same name
> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Jetty and now owns this directory
> tmpDir.mkdirs();
> ```
>
> https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L511-L518
>
> In several cases the `parent` parameter will not be the system temporary directory. However, there is one case where it will be, as the last fallback.
>
>
> https://github.com/eclipse/jetty.project/blob/1b59672b7f668b8a421690154b98b4b2b03f254b/jetty-webapp/src/main/java/org/eclipse/jetty/webapp/WebInfConfiguration.java#L467-L468
>
> If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
>
> Would your team be willing to open a GitHub security advisory to continue the discussion and disclosure there? https://github.com/eclipse/jetty.project/security/advisories
>
> **This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.**
>
> Cheers,
> Jonathan Leitschuh
| {'CVE-2020-27216'} | 2022-03-03T05:14:14.647632Z | 2020-11-04T17:50:24Z | HIGH | null | {'CWE-379', 'CWE-552', 'CWE-378'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27216', 'https://github.com/github/codeql/pull/4473', 'https://lists.apache.org/thread.html/rbf99e4495461099cad9aa62e0164f8f25a7f97b791b4ace56e375f8d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r547bb14c88c5da2588d853ed3030be0109efa537dd797877dff14afd@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ree506849c4f04376793b1a3076bc017da60b8a2ef2702dc214ff826f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rf00ea6376f3d0e8b8f62cf6d4a4f28b24e27193acd2c851f618aa41e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/re08b03cd1754b32f342664eead415af48092c630c8e3e0deba862a26@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r44115ebfbf3b7d294d7a75f2d30bcc822dab186ebbcc2dce11915ca9@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r503045a75f4419d083cb63ac89e765d6fb8b10c7dacc0c54fce07cff@%3Creviews.iotdb.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921', 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E', 'https://lists.apache.org/thread.html/r769411eb43dd9ef77665700deb7fc491fc3ceb532914260c90b56f2f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra5b7313d8cc9411db6790adfba33f2cf0665cb77adb7b02043c95867@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rc4b972ea10c5a65c6a88a6e233778718ab9af7f484affdd5e5de0cff@%3Ccommits.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rb5f2558ea2ac63633dfb04db1e8a6ea6bb1a2b8614899095e16c6233@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rc1646894341450fdc4f7e96a88f5e2cf18d8004714f98aec6b831b3e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcdcf32952397c83a1d617a8c9cd5c15c98b8d0d38a607972956bde7e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/re5706141ca397587f7ee0f500a39ccc590a41f802fc125fc135cb92f@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/issues/5451', 'https://lists.apache.org/thread.html/rdddb4b06e86fd58a1beda132f22192af2f9b56aae8849cb3767ccd55@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rcff5caebfd535195276aaabc1b631fd55a4ff6b14e2bdfe33f18ff91@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rde11c433675143d8d27551c3d9e821fe1955f1551a518033d3716553@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r171846414347ec5fed38241a9f8a009bd2c89d902154c6102b1fb39a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1d40368a309f9d835dcdd900249966e4fcbdf98c1cc4c84db2cd9964@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r2f732ee49d00610683ab5ddb4692ab25136b00bfd132ca3a590218a9@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r87b0c69fef09277333a7e1716926d1f237d462e143a335854ddd922f@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r66e99d973fd79ddbcb3fbdb24f4767fe9b911f5b0abb05d7b6f65801@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c010b79140452294292379183e7fe8e3533c5bb4db3f3fb39a6df61@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r336b1694a01858111e4625fb9ab2b07ad43a64a525cf6402e06aa6bf@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9b790fe3a93121199f41258474222f15002b2f729495aa7ecbf90718@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r2e02700f7cfecb213de50be83e066086bea90278cd753db7fdc2ccff@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0e9efe032cc65433251ee6470c66c334d4e7db9101e24cf91a3961f2@%3Ccommits.directory.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6#advisory-comment-63053', 'https://lists.apache.org/thread.html/r2122537d3f9beb0ce59f44371a951b226406719919656ed000984bd0@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra1f19625cc67ac1b459c558f2ea5647d71ce51c6fe4f4cb03baec849@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r3b0ce1549a1ccdd7e51ec66daf8d54d46f1571edbda88ed09c96d7da@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc1d9b8e9d17749d4d2b9abaaa72c422d090315bd6bc0ae73a16abc1c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6236ae4adc401e3b2f2575c22865f2f6c6ea9ff1d7b264b40d9602af@%3Cissues.beam.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/rc2e24756d28580eeac811c5c6a12012c9f424b6e5bffb89f98ee3d03@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r71da5f51ef04cb95abae560425dce9667740cbd567920f516f76efb7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb69b1d7008a4b3de5ce5867e41a455693907026bc70ead06867aa323@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6b83ca85c8f9a6794b1f85bc70d1385ed7bc1ad07750d0977537154a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc77918636d8744d50312e4f67ba2e01f47db3ec5144540df8745cb38@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb81a018f83fe02c95a2138a7bb4f1e1677bd7e1fc1e7024280c2292d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0f5e9b93133ef3aaf31484bc3e15cc4b85f8af0fe4de2dacd9379d72@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r73b5a9b677b707bbb7c1469ea746312c47838b312603bada9e382bba@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb8ad3745cb94c60d44cc369aff436eaf03dbc93112cefc86a2ed53ba@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r351298dd39fc1ab63303be94b0c0d08acd72b17448e0346d7386189b@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r874688141495df766e62be095f1dfb0bf4a24ca0340d8e0215c03fab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8866f0cd2a3b319288b7eea20ac137b9f260c813d10ee2db88b65d32@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5a8d7a0a13bc8152d427a7e9097cdeb139c6cfe111b2f00f26d16b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r916b6542bd5b15a8a7ff8fc14a0e0331e8e3e9d682f22768ae71d775@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r556787f1ab14da034d79dfff0c123c05877bbe89ef163fd359b4564c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r761a52f1e214efec286ee80045d0012e955eebaa72395ad62cccbcfc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8045eedd6bb74efcd8e01130796adbab98ee4a0d1273509fb1f2077a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rad255c736fad46135f1339408cb0147d0671e45c376c3be85ceeec1a@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20201123-0005/', 'https://lists.apache.org/thread.html/r568d354961fa88f206dc345411fb11d245c6dc1a8da3e80187fc6706@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfd9f102864a039f7fda64a580dfe1a342d65d7b723ca06dc9fbceb31@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8dd01541fc49d24ec223365a9974231cbd7378b749247a89b0a52210@%3Cissues.beam.apache.org%3E', 'https://cwe.mitre.org/data/definitions/379.html', 'https://lists.apache.org/thread.html/r1ef28b89ff0281c87ba3a7659058789bf28a99b8074191f1c3678db8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r819857361f5a156e90d6d06ccf6c41026bc99030d60d0804be3a9957@%3Cissues.beam.apache.org%3E', 'https://cwe.mitre.org/data/definitions/378.html', 'https://lists.apache.org/thread.html/r9cd444f944241dc26d9b8b007fe8971ed7f005b56befef7a4f4fb827@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc8dd95802be0cca8d7d0929c0c8484ede384ecb966b2a9dc7197b089@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/rd7e62e2972a41c2658f41a824b8bdd15644d80fcadc51fe7b7c855de@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1dbb87c9255ecefadd8de514fa1d35c1d493c0527d7672cf40505d04@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0d7ad4f02c44d5d53a9ffcbca7ff4a8138241322da9c5c35b5429630@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rdbf1cd0ab330c032f3a09b453cb6405dccc905ad53765323bddab957@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0df8fe10fc36028cf6d0381ab66510917d0d68bc5ef7042001d03830@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7bdc83513c12db1827b79b8d57a7a0975a25d28bc6c5efe590ec1e02@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcdd56ab4255801a0964dcce3285e87f2c6994e6469e189f6836f34e3@%3Cnotifications.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r70f8bcccd304bd66c1aca657dbfc2bf11f73add9032571b01f1f733d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rf3bc023a7cc729aeac72f482e2eeeab9008aa6b1dadbeb3f45320cae@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r59e0878013d329dcc481eeafebdb0ee445b1e2852d0c4827b1ddaff2@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r93d5e81e879120d8d87925dbdd4045cb3afa9b066f4370f60b626ce3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r407c316f6113dfc76f7bb3cb1693f08274c521064a92e5214197548e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rafb023a7c61180a1027819678eb2068b0b60cd5c2559cb8490e26c81@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfe6ba83d14545e982400dea89e68b10113cb5202a3dcb558ce64842d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1fe31643fc34b4a33ae3d416d92c271aa97663f1782767d25e1d9ff8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c007f87dc57731a7b9a3b05364530422535b7e0bc6a0c5b68d4d55@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rff0ad6a7dac2182421e2db2407e44fbb61a89904adfd91538f21fbf8@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rb7e159636b26156f6ef2b2a1a79b3ec9a026923b5456713e68f7c18e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r8cacf91ae1b17cc6531d20953c52fa52f6fd3191deb3383446086ab7@%3Cissues.beam.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6', 'https://lists.apache.org/thread.html/r7da5ae60d7973e8894cfe92f49ecb5b47417eefab4c77cc87514d3cf@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/r58f5b14dc5ae43583db3a7e872419aca97ebe47bcd7f7334f4128016@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rc9d2ab8a6c7835182f20b01104798e67c75db655c869733a0713a590@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3e05ab0922876e74fea975d70af82b98580f4c14ba643c4f8a9e3a94@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r100c5c7586a23a19fdb54d8a32e17cd0944bdaa46277b35c397056f6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r19e8b338af511641d211ff45c43646fe1ae19dc9897d69939c09cabe@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/raf9c581b793c30ff8f55f2415c7bd337eb69775aae607bf9ed1b16fb@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rae15d73cabef55bad148e4e6449b05da95646a2a8db3fc938e858dff@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r87d8337300a635d66f0bb838bf635cdfcbba6b92c608a7813adbf4f4@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r185d10aae8161c08726f3ba9a1f1c47dfb97624ea6212fa217173204@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6dfa64ecc3d67c1a71c08bfa04064549179d499f8e20a8285c57bd51@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r18b6f10d9939419bae9c225d5058c97533cb376c9d6d0a0733ddd48d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0d95e01f52667f44835c40f6dea72bb4397f33cd70a564ea74f3836d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4946ffd86ad6eb7cb7863311235c914cb41232380de8d9dcdb3c115c@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3a763de620be72b6d74f46ec4bf39c9f35f8a0b39993212c0ac778ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9f8c45a2a4540911cd8bd0485f67e8091883c9234d7a3aeb349c46c1@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r2d17b2a4803096ba427f3575599ea29b55f5cf9dbc1f12ba044cae1a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3f32cb4965239399c22497a0aabb015b28b2372d4897185a6ef0ccd7@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1ed79516bd6d248ea9f0e704dbfd7de740d5a75b71c7be8699fec824@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r911c1879258ebf98bca172c0673350eb7ea6569ca1735888d4cb7adc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/raa9c370ab42d737e93bc1795bb6a2187d7c60210cd5e3b3ce8f3c484@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r07525dc424ed69b3919618599e762f9ac03791490ca9d724f2241442@%3Cdev.felix.apache.org%3E', 'https://lists.apache.org/thread.html/rde782fd8e133f7e04e50c8aaa4774df524367764eb5b85bf60d96747@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc44d1147f78496ec9932a38b28795ff4fd0c4fa6e3b6f5cc33c14d29@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r382870d6ccfd60533eb0d980688261723ed8a0704dafa691c4e9aa68@%3Ccommits.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r77dd041d8025a869156481d2268c67ad17121f64e31f9b4a1a220145@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r5494fdaf4a0a42a15c49841ba7ae577d466d09239ee1050458da0f29@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r93b240be16e642579ed794325bae31b040e1af896ecc12466642e19d@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/refbbb0eb65c185d1fa491cee08ac8ed32708ce3b269133a6da264317@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rd58b60ab2e49ebf21022e59e280feb25899ff785c88f31fe314aa5b9@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb077d35f2940191daeefca0d6449cddb2e9d06bcf8f5af4da2df3ca2@%3Cissues.beam.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r827d17bf6900eddc686f4b6ee16fc5e52ca0070f8df7612222c40ac5@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r6f51a654ac2e67e3d1c65a8957cbbb127c3f15b64b4fcd626df03633@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5a622401924fadab61e07393235838918228b3d8a1a6704295b032@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r4f29fb24639ebc5d15fc477656ebc2b3aa00fcfbe197000009c26b40@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5a07f274f355c914054c7357ad6d3456ffaca064f26cd780acb90a9a@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r5a9462096c71593e771602beb0e69357adb5175d9a5c18d5181e0ab4@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r9cc76b98f87738791b8ec3736755f92444d3c8cb26bd4e4ffdb5c1cc@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/ra55e04d5a73afcb8383f4386e2b26832c6e3972e53827021ab885943@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r279254a1bd6434c943da52000476f307e62b6910755387aeca1ec9a1@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r09b345099b4f88d2bed7f195a96145849243fb4e53661aa3bcf4c176@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4179c71908778cc0598ee8ee1eaed9b88fc5483c65373f45e087f650@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r2aa316d008dab9ae48350b330d15dc1b863ea2a933558fbfc42b91a6@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rcfb95a7c69c4b9c082ea1918e812dfc45aa0d1e120fd47f68251a336@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rfe5caef1fd6cf4b8ceac1b63c33195f2908517b665c946c020d3fbd6@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r90b5ac6e2bf190a5297bda58c7ec76d01cd86ff050b2470fcd9f4b35@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/rccedec4cfd5df6761255b71349e3b7c27ee0745bd33698a71b1775cf@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r1d45051310b11c6d6476f20d71b08ea97cb76846cbf61d196bac1c3f@%3Cdev.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8fead0144bb84d8714695c43607dca9c5101aa028a431ec695882fe5@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r0259b14ae69b87821e27fed1f5333ea86018294fd31aab16b1fac84e@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/r3042a9dd2973aa229e52d022df7813e4d74b67df73bfa6d97bb0caf8@%3Cissues.beam.apache.org%3E'} | null |
Maven | GHSA-xw4p-crpj-vjx2 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | ### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39152](https://x-stream.github.io/CVE-2021-39152.html).
### Credits
m0d9 of the Security Team of Alibaba Cloud found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39152'} | 2022-04-22T15:47:38.383084Z | 2021-08-25T14:46:59Z | HIGH | null | {'CWE-502', 'CWE-918'} | {'https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-39152.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39152'} | null |
Maven | GHSA-8ffc-79xg-29w8 | Code Injection in Apache Cassandra | When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE. | {'CVE-2021-44521'} | 2022-03-03T05:13:32.951563Z | 2022-02-12T00:00:48Z | CRITICAL | null | {'CWE-94'} | {'https://issues.apache.org/jira/browse/CASSANDRA-17352', 'https://github.com/apache/cassandra', 'http://www.openwall.com/lists/oss-security/2022/02/11/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44521', 'https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-user-defined-functions-for-remote-code-execution/', 'https://security.netapp.com/advisory/ntap-20220225-0001/', 'https://lists.apache.org/thread/y4nb9s4co34j8hdfmrshyl09lokm7356'} | null |
Maven | GHSA-gf7x-2j2x-7f73 | Missing authorization in xwiki-platform | ### Impact
Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page.
### Patches
It has been patched in XWiki 13.2CR1 and 12.10.6
### Workarounds
There is no workaround beside patching.
### References
https://jira.xwiki.org/browse/XWIKI-18430
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org)
| {'CVE-2022-23617'} | 2022-02-09T21:41:46Z | 2022-02-09T21:41:46Z | MODERATE | null | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23617', 'https://jira.xwiki.org/browse/XWIKI-18430', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73', 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5', 'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554'} | null |
Maven | GHSA-pfwp-8pq4-g7pv | Moderate severity vulnerability that affects com.alipay.sofa:hessian | SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget. | {'CVE-2019-9212'} | 2022-03-03T05:13:27.271034Z | 2019-03-06T17:36:08Z | CRITICAL | null | {'CWE-502', 'CWE-184'} | {'https://github.com/advisories/GHSA-pfwp-8pq4-g7pv', 'https://github.com/alipay/sofa-hessian/issues/34', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9212', 'https://github.com/alipay/sofa-hessian'} | null |
Maven | GHSA-rjmq-6v55-4rjv | Improper Authorization in org.cometd.oort | ### Impact
Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels.
By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data.
By publishing to those channels, a remote user may be able to create/modify/delete other user's data and modify the cluster structure.
The issue impacts any version up to 5.0.10, 6.0.5 and 7.0.5.
### Patches
The issue has been fixed in 5.0.11, 6.0.6 and 7.0.6.
### Workarounds
The workaround is to install a custom `SecurityPolicy` that forbids subscription and publishing to remote, non-Oort, sessions on Oort and Seti channels.
This workaround could be implemented in any affected version.
### References
cometd/cometd#1146
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@webtide.com](mailto:security@webtide.com)
### Credits
https://www.redteam-pentesting.de/ | {'CVE-2022-24721'} | 2022-03-16T22:01:59.681034Z | 2022-03-15T19:02:36Z | HIGH | null | {'CWE-863'} | {'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929', 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv', 'https://github.com/cometd/cometd', 'https://github.com/cometd/cometd/issues/1146', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24721'} | null |
Maven | GHSA-v33x-prhc-gph5 | Insufficiently Protected Credentials and Improper Authentication in Spring Security | Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?. | {'CVE-2019-11272'} | 2022-03-03T05:09:50.948217Z | 2019-06-27T17:24:58Z | HIGH | null | {'CWE-522', 'CWE-287'} | {'https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11272', 'https://pivotal.io/security/cve-2019-11272'} | null |
Maven | GHSA-mqvp-7rrg-9jxc | Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad | A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1. | {'CVE-2022-26336'} | 2022-03-29T19:15:11.472868Z | 2022-03-05T00:00:44Z | MODERATE | null | {'CWE-770', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-26336', 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j'} | null |
Maven | GHSA-rc75-cf5c-mxvh | Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml | The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml. | {'CVE-2019-10755'} | 2022-03-03T05:14:08.505074Z | 2019-11-06T17:06:28Z | MODERATE | null | {'CWE-338'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407', 'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10755'} | null |
Maven | GHSA-vjv5-gp2w-65vm | Encoded URIs can access WEB-INF directory in Eclipse Jetty | ### Description
URIs can be crafted using some encoded characters to access the content of the `WEB-INF` directory and/or bypass some security constraints.
This is a variation of the vulnerability reported in [CVE-2021-28164](https://nvd.nist.gov/vuln/detail/CVE-2021-28164)/[GHSA-v7ff-8wcx-gmc5](https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5).
### Impact
The default compliance mode allows requests with URIs that contain a %u002e segment to access protected resources within the WEB-INF directory. For example, a request to `/%u002e/WEB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. Similarly, an encoded null character can prevent correct normalization so that /.%00/WEB-INF/web.xml cal also retrieve the web.xml file.
### Workarounds
Some Jetty [rewrite rules](https://www.eclipse.org/jetty/documentation/jetty-9/index.html#rewrite-handler) can be deployed to rewrite any request containing encoded dot segments or null characters in the raw request URI, to a known not found resource:
```xml
<Call name="addRule">
<Arg>
<New class="org.eclipse.jetty.rewrite.handler.RewriteRegexRule">
<Set name="regex">.*/(?:\.+/)+.*</Set>
<Set name="replacement">/WEB-INF/Not-Found</Set>
</New>
</Arg>
</Call>
<Call name="addRule">
<Arg>
<New class="org.eclipse.jetty.rewrite.handler.ValidUrlRule"/>
</Arg>
</Call>
```
### Analysis
Prior to 9.4.37, Jetty was protected from this style of attack by two lines of defense:
+ URIs were decoded first and then normalized for `.` and `..` sequences. Whilst this is not according to the RFC, it did remove relative segments that were encoded or parameterized and made the resulting URI paths safe from any repeated normalization (often done by URI manipulation and file system mapping).
+ The `FileResource` class treated any difference between absolute path and canonical path of a resource as an alias, and thus the resource would not be served by default.
Prior to 9.4.37, the `FileResource` class was replaced by the `PathResource` class that did not treat normalization differences as aliases. Then release 9.4.37 updated the URI parsing to be compliant with the RFC, in that normalization is done before decoding. This allowed various encodings or adornments to relative path segments that would not be normalized by the pure RFC URI normalization, but were normalized by the file system, thus allowing protected resources to be accessed via an alias. Specifically by decoding URIs after normalization, it left them vulnerable to any subsequent normalization (potentially after checking security constraints) changing the URI singificantly. Such extra normalization is often down by URI manipulation code and file systems.
With Jetty releases 9.4.43, 10.0.6, 11.0.6, we have restored several lines of defense:
+ URIs are first decoded and then normalized which is not strictly according to the current RFC. Since the normalization is done after decoding, the URI paths produced are safe from further normalisation and the referenced resource cannot easily be so changed after passing security constraints.
+ During URI parsing checks are made for some specific segments/characters that are possible to be seen ambiguously by an application (e.g. encode dot segments, encoded separators, empty segments, parameterized dot segments and/or null characters). So even though Jetty code handles these URIs correctly, there is a risk that an application may not do so, thus such requests are rejected with a 400 Bad Request unless a specific compliance mode is set.
+ Once decoded and normalized by initial URI processing, Jetty will not decode or normalize a received URI again within its own resource handling. This avoids to possibility of double decode attacks.
+ The `ContextHandler.getResource(String path)` method always checks that the passed path is normalized, only accepting a non normal path if approved by an AliasChecker. This is the method that is directly used by Jetty resource serving.
+ The API methods like `ServletContext.getResource(String path)` will normalize the prior to calling `ContextHandler.getResource(String path)`. This allows applications to use non normal paths.
+ The `PathResource` class now considers any difference in normal/canonical name between a request resource name and the found resource name to be an alias, which will only be served if approved by an explicit `AliasChecker`
In summary, the defense is a front line of detection of specific known URI alias attacks, with the last line defense of not allowing any aliasing of resources.
Many thanks to @cangqingzhe from @CloverSecLabs for reporting this issue. | {'CVE-2021-34429'} | 2022-04-22T15:47:41.556322Z | 2021-07-19T15:15:24Z | MODERATE | null | {'CWE-863', 'CWE-551', 'CWE-200'} | {'https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cdad6668aa94c456dba6@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d50751465f8f1952ace0c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441ecdbcf91986c3bc17@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9d31a8727338f213c1@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d8eaf11a9df5dbeb46@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e0c1afd30625685a9c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d08b8e7ff2c2723aaa1@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a72bb315550489f052e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e766258518faee63c31d3ea@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132edc0a14f41c26b01e@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r833a4c8bdbbfeb8a2cd38238e7b59f83edd5c1a0e508b587fc551a46@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e94440798fd64c55a4941de3e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e8978b417e0c2b0857@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0b4cb09223d4b7e500@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.43.v20210629', 'https://lists.apache.org/thread.html/r0626f279ebf65506110a897e3a57ccd4072803ee5434b2503e070398@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259a2556c97a989f2fe8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68f72e17666f2f30f24@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf24f93206a34923fc64@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r721ab6a5fa8d45bec76714b674f5d4caed2ebfeca69ad1d6d4caae6c@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/re850203ef8700cb826534dd4a1cb9f5b07bb8f6f973b39ff7838d3ba@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7eb74d31a5b33344ce@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210819-0006/', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34429', 'https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e8195ddbc0c00f58d5fe@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f47a92f1c9d14391fc0@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm', 'https://lists.apache.org/thread.html/r48a93f2bc025acd7c7e341ed3864bfdeb75f0c768d41bc247e1a1f63@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc62724b0cce67e8892a45@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r44ea39ca8110de7353bfec88f58aa3aa58a42bb324b8772512ee190c@%3Ccommits.zookeeper.apache.org%3E'} | null |
Maven | GHSA-2m8h-fgr8-2q9w | Pivotal Spring Framework Paths provided to the ResourceServlet were not properly sanitized | An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks. | {'CVE-2016-9878'} | 2022-04-26T18:48:01.928168Z | 2018-10-04T20:29:55Z | HIGH | null | {'CWE-22'} | {'https://pivotal.io/security/cve-2016-9878', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securityfocus.com/bid/95072', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securitytracker.com/id/1040698', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://github.com/advisories/GHSA-2m8h-fgr8-2q9w', 'https://security.netapp.com/advisory/ntap-20180419-0002/', 'https://access.redhat.com/errata/RHSA-2017:3115', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9878', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'} | null |
Maven | GHSA-hhh6-cm2m-3fhc | Allocation of Resources Without Limits or Throttling in iText | iText v7.1.17 was discovered to contain an out-of-memory error via the component readStreamBytesRaw, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. | {'CVE-2022-24196'} | 2022-04-15T16:45:08.217256Z | 2022-02-02T00:01:45Z | MODERATE | null | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24196', 'https://github.com/itext/itext7/pull/78#issuecomment-1089279222', 'https://github.com/itext/itext7/pull/78', 'https://github.com/itext/itext7'} | null |
Maven | GHSA-cxfm-5m4g-x7xp | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | ### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39150](https://x-stream.github.io/CVE-2021-39150.html).
### Credits
Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39150'} | 2022-04-22T15:47:13.659037Z | 2021-08-25T14:47:19Z | HIGH | null | {'CWE-502', 'CWE-918'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39150', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-39150.html', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-q448-6c3m-cxmj | Cross-site Scripting in jeecg-boot | jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event. | {'CVE-2021-44585'} | 2022-03-28T14:45:07.274896Z | 2022-03-11T00:01:59Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44585', 'https://github.com/jeecgboot/jeecg-boot', 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91', 'https://github.com/jeecgboot/jeecg-boot/issues/3223'} | null |
Maven | GHSA-q4rf-3fhx-88pf | YAML deserialization can run untrusted code | ### Impact
An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition.
The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
* `admin` level access to the `system` resource type
The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
* `create` `update` or `admin` level access to a `project_acl` resource
* `create` `update` or `admin` level access to the `system_acl` resource
The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only.
### Patches
Versions 3.4.3, 3.3.14
### Workarounds
Please visit [https://rundeck.com/security](https://rundeck.com/security) for information about specific workarounds.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@rundeck.com](mailto:security@rundeck.com)
To report security issues to Rundeck please use the form at [https://rundeck.com/security](https://rundeck.com/security)
Reporter: Rojan Rijal from Tinder Red Team | {'CVE-2021-39132'} | 2022-03-03T05:13:37.221339Z | 2021-09-01T18:27:01Z | MODERATE | null | {'CWE-502'} | {'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39132', 'https://github.com/rundeck/rundeck', 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'} | null |
Maven | GHSA-m8wh-mqgf-rr8g | Code injection in Kubernetes Java Client | Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution. | {'CVE-2021-25738'} | 2022-03-03T05:12:37.786762Z | 2021-10-12T17:50:25Z | MODERATE | null | {'CWE-20'} | {'https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk', 'https://github.com/kubernetes-client/java', 'https://github.com/kubernetes-client/java/issues/1698', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25738'} | null |
Maven | GHSA-m6cj-93v6-cvr5 | Infinite loop in junrar | ### Impact
A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users.
### Patches
The problem is partially patched in 7.4.1
### Workarounds
None
### References
https://github.com/junrar/junrar/issues/73
https://github.com/junrar/junrar/issues/81
| {'CVE-2022-23596'} | 2022-04-19T18:00:13.490422Z | 2022-02-01T00:47:23Z | HIGH | null | {'CWE-400', 'CWE-835'} | {'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5', 'https://github.com/junrar/junrar', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23596', 'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7', 'https://github.com/junrar/junrar/issues/73'} | null |
Maven | GHSA-m2r5-4w96-qxg5 | Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml | ### Impact
It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service.
For example:
```
{{velocity}}
#set($xml=$services.get('xml'))
#set($xxe_payload = "<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root[<!ENTITY xxe SYSTEM 'file:///etc/passwd' >]><root><foo>&xxe;</foo></root>")
#set($doc=$xml.parse($xxe_payload))
$xml.serialize($doc)
{{/velocity}}
```
### Patches
The problem has been patched on versions 12.10.10, 13.4.4 and 13.8RC1.
### Workarounds
There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights.
### References
https://jira.xwiki.org/browse/XWIKI-18946
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [XWiki Security mailing-list](mailto:security@xwiki.org) | {'CVE-2022-24898'} | 2022-04-29T20:45:20.929502Z | 2022-04-28T19:31:55Z | MODERATE | null | {'CWE-611'} | {'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5', 'https://jira.xwiki.org/browse/XWIKI-18946', 'https://github.com/xwiki/xwiki-commons', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5'} | null |
Maven | GHSA-v2rg-8cwr-75g8 | Deserializer tampering in Apache Dubbo | Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction. This means that if a weak deserializer such as the Kryo and FST are somehow in code scope (e.g. if Kryo is somehow a part of a dependency), a remote unauthenticated attacker can tell the Provider to use the weak deserializer, and then proceed to exploit it. | {'CVE-2021-25641'} | 2022-03-21T22:00:08.151746Z | 2022-03-18T17:56:08Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'} | null |
Maven | GHSA-6v7p-v754-j89v | HTTP Response Splitting in Styx | # Vulnerability
Styx is vulnerable to CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting').
# Vulnerable Component
The vulnerable component is the `com.hotels.styx.api.HttpHeaders.Builder` due to disabling the HTTP Header validation built into Netty in these locations:
https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145
https://github.com/HotelsDotCom/styx/blob/e1d578e9b9c38df9cd19c21dc2eb9b949d85b558/components/api/src/main/java/com/hotels/styx/api/HttpHeaders.java#L145
`new DefaultHttpHeaders(false)` disables the built-in validation in Netty. Either use the default constructor or `new DefaultHttpHeaders(true` instead.
Additionally, another vulnerable component is the StyxToNettyResponseTranslator due to also disabling the HTTP Header validation built into netty in this location.
https://github.com/HotelsDotCom/styx/blob/8d60e5493e65d0d536afc0b350dcb02d24e0f7a7/components/server/src/main/java/com/hotels/styx/server/netty/connectors/StyxToNettyResponseTranslator.java#L30
`DefaultHttpResponse nettyResponse = new DefaultHttpResponse(version, httpResponseStatus, false); `
`new DefaultHttpResponse(version, httpResponseStatus, false);` disables the built-in validation in Netty. Please use the constructor `new DefaultHttpResponse(version, httpResponseStatus, true);`
# Proof of Concept
The following test plugin proves that there is no header validation occurring.
```java
static class VulnerablePlugin implements Plugin {
@Override
public Eventual<LiveHttpResponse> intercept(LiveHttpRequest request, Chain chain) {
String header = request.queryParam("header-value").get();
LiveHttpRequest newRequest = request.newBuilder()
.header("myRequestHeader", header)
.build();
return chain.proceed(newRequest).map(response ->
response.newBuilder().header("myResponseHeader", header).build()
) ;
}
}
@Test
public void simpleHeaderInjectionVulnerabilityPOC() {
Plugin vulnerablePlugin = new VulnerablePlugin();
// a simple way to mock the downstream system
HttpInterceptor.Chain chain = request -> {
assertThat(request.header("myRequestHeader").orElse(null), is("test\r\nAnother: CRLF_Injection"));
return Eventual.of(response(OK).build());
};
// an example request you expect your plugin to receive
String encodedGet = URLEncoder.encode("test\r\nAnother: CRLF_Injection");
LiveHttpRequest request = get("/foo?header-value=" + encodedGet)
.build();
// since this is a test, we want to wait for the response
LiveHttpResponse response = Mono.from(vulnerablePlugin.intercept(request, chain)).block();
assertThat(response.header("myResponseHeader").orElse(null), is("test\r\nAnother: CRLF_Injection"));
}
```
Additionally, if you run this LiveHttpResponse from this test through the `StyxToNettyResponseTranslator::toNettyResponse`, ideally, it would have caused an exception to be thrown. In its current state, it does not.
# Similar Vulnerabilities
There have been reports of similar vulnerabilities in other popular libraries.
GHSA-35fr-h7jr-hh86 -> CVE-2019-16771
GHSA-mvqp-q37c-wf9j -> CVE-2019-17513
# Finding
This vulnerability was found due to this query that [Jonathan Leitschuh](https://twitter.com/jlleitschuh) contributed to the Semmle QL project.
https://lgtm.com/rules/1510696449842/alerts/ | {'CVE-2020-6858'} | 2022-03-03T05:13:23.664990Z | 2020-03-03T15:32:03Z | MODERATE | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-6858', 'https://github.com/HotelsDotCom/styx/security/advisories/GHSA-6v7p-v754-j89v', 'https://twitter.com/JLLeitschuh'} | null |
Maven | GHSA-cmfg-87vq-g5g4 | Deserialization of untrusted data in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server. | {'CVE-2019-12814'} | 2022-03-03T05:13:00.222262Z | 2019-07-17T15:26:12Z | MODERATE | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190625-0006/', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2341', 'https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3292', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12814', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2936'} | null |
Maven | GHSA-qjwc-v72v-fq6r | HTTP request smuggling in Undertow | A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own. The highest threat from this vulnerability is to data confidentiality and integrity. | {'CVE-2021-20220'} | 2022-03-03T05:13:23.722795Z | 2021-06-16T17:47:52Z | MODERATE | null | {'CWE-444'} | {'https://security.netapp.com/advisory/ntap-20220210-0013/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20220', 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'} | null |
Maven | GHSA-r2wf-q3x4-hrv9 | Default development error handler in Ratpack is vulnerable to HTML content injection (XSS) | Versions of Ratpack from 0.9.10 through 1.7.5 are vulnerable to [CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html) (aka. XSS) in the development error handler. An attacker can utilize this to perform XSS when an exception message contains untrusted data.
As a simplistic example:
```java
RatpackServer startedServer = RatpackServer.start(server -> {
server.handlers(chain -> chain.all(ctx -> {
// User supplied query parameter
String message = ctx.getRequest().getQueryParams().get("message");
// User supplied data appended to the message in an exception
throw new RuntimeException("An error occurred: " + message);
}));
});
```
### Impact
- Cross-Site Scripting
### Patches
This vulnerability has been patched in Ratpack version 1.7.6.
### Workarounds
If you are unable to update your version of Ratpack, we recommend the following workarounds and mitigations.
- Ensure that development mode is disabled in production.
- Don't use real customer data (ie. untrusted user input) in development.
### References
- [Ratpack development mode](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#development-boolean-)
- [Code Patch - a3cbb13](https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [ratpack/ratpack](https://github.com/ratpack/ratpack/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc)
- Ask in our [Slack channel](https://slack-signup.ratpack.io/)
| {'CVE-2019-10770'} | 2022-03-03T05:13:37.516047Z | 2020-01-27T19:28:20Z | MODERATE | null | {'CWE-779'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10770', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-r2wf-q3x4-hrv9', 'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3', 'https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882'} | null |
Maven | GHSA-43hg-g44q-474q | Cross Site Scripting (XSS) in XWiki | XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section. | {'CVE-2021-3137'} | 2022-03-03T05:13:22.198391Z | 2021-01-29T18:13:03Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3137', 'https://www.exploit-db.com/exploits/49437'} | null |
Maven | GHSA-6x4w-8w53-xrvv | XXE in Apache Standard Taglibs | Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) <x:parse> or (2) <x:transform> JSTL XML tag. | {'CVE-2015-0254'} | 2022-03-03T05:13:58.689149Z | 2020-09-14T18:44:01Z | HIGH | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/rfc2bfd99c340dafd501676693cd889c1f9f838b97bdd0776a8f5557d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://lists.apache.org/thread.html/rc1686f6196bb9063bf26577a21b8033c19c1a30e5a9159869c8f3d38@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f@%3Cpluto-dev.portals.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2016:1376', 'http://rhn.redhat.com/errata/RHSA-2016-1840.html', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00033.html', 'http://packetstormsecurity.com/files/130575/Apache-Standard-Taglibs-1.2.1-XXE-Remote-Command-Execution.html', 'http://rhn.redhat.com/errata/RHSA-2016-1838.html', 'https://lists.apache.org/thread.html/rf1179e6971bc46f0f68879a9a10cc97ad4424451b0889aeef04c8077@%3Cpluto-scm.portals.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://rhn.redhat.com/errata/RHSA-2015-1695.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0254', 'http://rhn.redhat.com/errata/RHSA-2016-1839.html', 'http://www.ubuntu.com/usn/USN-2551-1', 'https://lists.apache.org/thread.html/8a20e48acb2a40be5130df91cf9d39d8ad93181989413d4abcaa4914@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-1841.html', 'http://mail-archives.apache.org/mod_mbox/tomcat-taglibs-user/201502.mbox/%3C82207A16-6348-4DEE-877E-F7B87292576A%40apache.org%3E', 'http://www.securitytracker.com/id/1034934', 'http://www.securityfocus.com/archive/1/534772/100/0/threaded', 'https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/72809'} | null |
Maven | GHSA-2m9w-9xh2-wxc3 | Link Following in Jenkins Pipeline Multibranch Plugin | Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system. | {'CVE-2022-25179'} | 2022-02-25T20:40:40Z | 2022-02-16T00:01:33Z | MODERATE | null | {'CWE-59'} | {'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25179'} | null |
Maven | GHSA-3ccq-5vw3-2p6x | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39149](https://x-stream.github.io/CVE-2021-39149.html).
### Credits
Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39149'} | 2022-04-22T15:47:26.220237Z | 2021-08-25T14:47:28Z | HIGH | null | {'CWE-502', 'CWE-434'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39149', 'https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/CVE-2021-39149.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-p6xc-xr62-6r2g | Improper Input Validation and Uncontrolled Recursion in Apache Log4j2 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.
# Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. | {'CVE-2021-45105'} | 2022-04-26T21:00:29.414165Z | 2021-12-18T18:00:07Z | HIGH | null | {'CWE-20', 'CWE-674'} | {'https://security.netapp.com/advisory/ntap-20211218-0001/', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.zerodayinitiative.com/advisories/ZDI-21-1541/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45105', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/', 'http://www.openwall.com/lists/oss-security/2021/12/19/1', 'https://www.debian.org/security/2021/dsa-5024', 'https://cert-portal.siemens.com/productcert/pdf/ssa-501673.pdf', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.kb.cert.org/vuls/id/930724', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032'} | null |
Maven | GHSA-r34r-f84j-5x4x | Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs. | {'CVE-2017-7678'} | 2022-03-03T05:14:17.457717Z | 2018-11-09T17:43:08Z | MODERATE | null | {'CWE-79'} | {'http://www.securityfocus.com/bid/99603', 'https://github.com/advisories/GHSA-r34r-f84j-5x4x', 'http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7678'} | null |
Maven | GHSA-pr38-qpxm-g88x | Uncontrolled Resource Consumption in Apache ActiveMQ Artemis | In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory. | {'CVE-2022-23913'} | 2022-05-03T02:32:19.369867Z | 2022-02-06T00:00:55Z | HIGH | null | {'CWE-400'} | {'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82', 'https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2', 'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7', 'https://security.netapp.com/advisory/ntap-20220303-0003/', 'https://github.com/apache/activemq-artemis', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913', 'https://issues.apache.org/jira/browse/ARTEMIS-3593', 'https://github.com/apache/activemq-artemis/pull/3871', 'https://github.com/github/codeql-java-CVE-coverage/issues/1061', 'https://github.com/apache/activemq-artemis/pull/3862'} | null |
Maven | GHSA-5xqr-grq4-qwgx | Moderate severity vulnerability that affects com.github.junrar:junrar | Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files. | {'CVE-2018-12418'} | 2022-03-03T05:13:15.624989Z | 2018-10-17T00:04:05Z | MODERATE | null | {'CWE-835'} | {'https://github.com/junrar/junrar', 'https://github.com/advisories/GHSA-5xqr-grq4-qwgx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12418', 'https://github.com/junrar/junrar/pull/8', 'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'} | null |
Maven | GHSA-xx65-cc7g-9pfp | Moderate severity vulnerability that affects org.springframework.boot:spring-boot | Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible. | {'CVE-2018-1196'} | 2022-03-03T05:13:11.305087Z | 2018-10-18T18:05:57Z | MODERATE | null | {'CWE-59'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1196', 'https://pivotal.io/security/cve-2018-1196', 'https://github.com/advisories/GHSA-xx65-cc7g-9pfp'} | null |
Maven | GHSA-q25j-gcmv-5qpp | Moderate severity vulnerability that affects org.grails.plugins:fields and org.grails:grails-core | Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnerability in Using the display tag that can result in XSS . This vulnerability appears to have been fixed in 2.2.8. | {'CVE-2018-1000529'} | 2022-03-03T05:14:06.891773Z | 2018-10-19T16:46:01Z | MODERATE | null | {'CWE-79'} | {'https://github.com/grails-fields-plugin/grails-fields', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000529', 'https://github.com/advisories/GHSA-q25j-gcmv-5qpp', 'https://github.com/grails-fields-plugin/grails-fields/issues/278', 'https://github.com/martinfrancois/CVE-2018-1000529'} | null |
Maven | GHSA-ghcq-472w-vf4h | Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx | ### Impact
Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those.
### Patches
This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6.
### Workarounds
There's no easy workaround for this issue, administrators should upgrade their wiki.
### References
https://jira.xwiki.org/browse/XWIKI-19155
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [XWiki Security ML](mailto:security@xwiki.org)
| {'CVE-2022-24821'} | 2022-04-08T21:59:04Z | 2022-04-08T21:59:04Z | MODERATE | null | {'CWE-648'} | {'https://jira.xwiki.org/browse/XWIKI-19155', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24821', 'https://github.com/xwiki/xwiki-platform'} | null |
Maven | GHSA-c2q3-4qrh-fm48 | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms). | {'CVE-2020-14061'} | 2022-03-03T05:13:51.797949Z | 2020-06-18T14:44:50Z | HIGH | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316', 'https://github.com/FasterXML/jackson-databind/issues/2698', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14061'} | null |
Maven | GHSA-792r-mh2q-p8qp | Server Side Request Forgery (SSRF) in org.mitre:openid-connect-server | The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network. | {'CVE-2021-26715'} | 2022-03-03T05:13:58.416044Z | 2021-05-13T22:30:52Z | HIGH | null | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26715', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases'} | null |
Maven | GHSA-6jq2-789q-fff2 | High severity vulnerability that affects org.apache.tika:tika-core | In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack. | {'CVE-2018-11761'} | 2022-03-03T05:14:13.365325Z | 2018-10-17T15:49:36Z | HIGH | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11761', 'http://www.securityfocus.com/bid/105514', 'https://github.com/advisories/GHSA-6jq2-789q-fff2'} | null |
Maven | GHSA-9gcm-f4x3-8jpw | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack. | {'CVE-2018-11039'} | 2022-03-03T05:13:20.851889Z | 2018-10-16T17:35:54Z | MODERATE | null | null | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://pivotal.io/security/cve-2018-11039', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.securityfocus.com/bid/107984', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11039', 'https://github.com/advisories/GHSA-9gcm-f4x3-8jpw', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'} | null |
Maven | GHSA-c4r5-xvgw-2942 | Metrics exposure in Wildfly | A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data. | {'CVE-2021-3503'} | 2022-04-28T21:30:08.144674Z | 2022-04-19T00:00:50Z | MODERATE | null | {'CWE-200'} | {'https://issues.redhat.com/browse/WFLY-11933', 'https://github.com/wildfly/wildfly/pull/14136', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3503', 'https://github.com/wildfly/wildfly', 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'} | null |
Maven | GHSA-4c32-xmgj-2g98 | High severity vulnerability that affects org.apache.pdfbox:pdfbox | Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF. | {'CVE-2016-2175'} | 2022-03-03T05:13:19.332001Z | 2018-10-17T18:22:15Z | HIGH | null | {'CWE-611'} | {'http://www.securityfocus.com/archive/1/538503/100/0/threaded', 'https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2175', 'https://github.com/advisories/GHSA-4c32-xmgj-2g98', 'http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html', 'http://svn.apache.org/viewvc?view=revision&revision=1739564', 'http://rhn.redhat.com/errata/RHSA-2017-0272.html', 'http://svn.apache.org/viewvc?view=revision&revision=1739565', 'http://rhn.redhat.com/errata/RHSA-2017-0248.html', 'http://www.securityfocus.com/bid/90902', 'http://rhn.redhat.com/errata/RHSA-2017-0179.html', 'http://rhn.redhat.com/errata/RHSA-2017-0249.html', 'http://www.debian.org/security/2016/dsa-3606'} | null |
Maven | GHSA-8q89-pwhh-7wfq | Moderate severity vulnerability that affects com.github.penggle:kaptcha | text/impl/DefaultTextCreator.java, text/impl/ChineseTextProducer.java, and text/impl/FiveLetterFirstNameTextCreator.java in kaptcha 2.3.2 use the Random (rather than SecureRandom) function for generating CAPTCHA values, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force approach. | {'CVE-2018-18531'} | 2022-03-03T05:12:49.494118Z | 2018-10-23T16:08:56Z | CRITICAL | null | {'CWE-330'} | {'https://github.com/penggle/kaptcha/issues/3', 'https://github.com/advisories/GHSA-8q89-pwhh-7wfq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18531', 'https://github.com/penggle/kaptcha'} | null |
Maven | GHSA-2m7g-9q74-9m3q | Improper Certificate Validation in Apache Beam | The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code running in the same JVM. | {'CVE-2020-1929'} | 2022-03-03T05:13:24.352659Z | 2020-05-06T20:49:04Z | HIGH | null | {'CWE-295'} | {'https://github.com/apache/beam', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929', 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b', 'https://lists.apache.org/thread.html/rdd0e85b71bf0274471b40fa1396d77f7b2d1165eaea4becbdc69aa04%40%3Cuser.beam.apache.org%3E'} | null |
Maven | GHSA-gww7-p5w4-wrfv | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. | {'CVE-2019-20330'} | 2022-04-07T17:01:58.003688Z | 2020-03-04T20:52:11Z | CRITICAL | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-20330', 'https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind', 'https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.netapp.com/advisory/ntap-20200127-0004/', 'https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2', 'https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528@%3Ccommits.druid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2526', 'https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8@%3Cnotifications.zookeeper.apache.org%3E'} | null |
Maven | GHSA-qvxv-pmq9-4q7g | High severity vulnerability that affects org.scala-lang:scala-compiler | The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges. | {'CVE-2017-15288'} | 2022-03-03T05:12:56.375274Z | 2018-10-19T16:51:11Z | HIGH | null | {'CWE-732'} | {'https://lists.apache.org/thread.html/r628ea3ea2fed4d9c1c5232a0b1ed108a15abc9fd2f0aaca1e8cc9164@%3Cdev.kafka.apache.org%3E', 'https://github.com/scala/scala/pull/6108', 'https://lists.apache.org/thread.html/r1d51eae81ceb7bfd1780936a48b460ab31d53ff2ed526a88a7f60fe4@%3Ccommits.druid.apache.org%3E', 'https://github.com/scala/scala/pull/6128', 'https://lists.apache.org/thread.html/r10dd8e5b3bbe3bb531aa4a65472ce56f91efbb77ea9fe04bb8272e2c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r18a05115cfa078c0f4e5c1ea2e8d64804f63e0095aa2174a3afecc0f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3f10022ec972c8df29a950d1a591c16562eeddd9194d3010e46b9b76@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://security.gentoo.org/glsa/201812-08', 'https://github.com/scala/scala', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-qvxv-pmq9-4q7g', 'https://github.com/scala/scala/pull/6120', 'https://lists.apache.org/thread.html/rf57e4d7211b30e51803911304f3b7b54393f7a4bd60bb0784c31eec1@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15288', 'https://lists.apache.org/thread.html/re72f4d04dfc398aae0e38dbfeccf44780df2782623a610cbfcec6f3a@%3Cjira.kafka.apache.org%3E', 'http://scala-lang.org/news/security-update-nov17.html', 'https://lists.apache.org/thread.html/r33665e9213cc6df1e48c3d99d1b0c7a3203e9bd0ef4fc4ba838bcb04@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5a1418a4f5101f5af3fc14bf358c54f2c7200e6a3701de2e2f581e1b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r32e0b1d5ff43ac3ed4b179a4e663022d1c5ccac77884a99ea149e633@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-cfh5-3ghh-wfjx | Moderate severity vulnerability that affects org.apache.httpcomponents:httpclient | org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field. | {'CVE-2014-3577'} | 2022-03-03T05:13:03.290545Z | 2018-10-17T00:05:06Z | MODERATE | null | {'CWE-347'} | {'http://rhn.redhat.com/errata/RHSA-2015-1888.html', 'http://seclists.org/fulldisclosure/2014/Aug/48', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2014-1146.html', 'http://secunia.com/advisories/60713', 'https://github.com/advisories/GHSA-cfh5-3ghh-wfjx', 'http://rhn.redhat.com/errata/RHSA-2014-1892.html', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2015-0720.html', 'http://rhn.redhat.com/errata/RHSA-2015-0125.html', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://secunia.com/advisories/60466', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/10/06/1', 'http://rhn.redhat.com/errata/RHSA-2016-1931.html', 'http://rhn.redhat.com/errata/RHSA-2015-0158.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05363782', 'http://rhn.redhat.com/errata/RHSA-2014-1833.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95327', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2014-1834.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://packetstormsecurity.com/files/127913/Apache-HttpComponents-Man-In-The-Middle.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564', 'http://rhn.redhat.com/errata/RHSA-2014-1835.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html', 'http://rhn.redhat.com/errata/RHSA-2016-1773.html', 'http://rhn.redhat.com/errata/RHSA-2014-1166.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3577', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'http://www.ubuntu.com/usn/USN-2769-1', 'http://secunia.com/advisories/60589', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://rhn.redhat.com/errata/RHSA-2014-1891.html', 'http://rhn.redhat.com/errata/RHSA-2015-0765.html', 'http://www.securitytracker.com/id/1030812', 'http://rhn.redhat.com/errata/RHSA-2015-1177.html', 'https://access.redhat.com/solutions/1165533', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html', 'http://www.securityfocus.com/bid/69258', 'http://rhn.redhat.com/errata/RHSA-2014-1836.html', 'http://www.osvdb.org/110143', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2015-1176.html'} | null |
Maven | GHSA-mx9v-gmh4-mgqw | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization. | {'CVE-2018-19361'} | 2022-03-03T05:11:54.751309Z | 2019-01-04T19:07:01Z | CRITICAL | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://github.com/advisories/GHSA-mx9v-gmh4-mgqw', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Maven | GHSA-p63h-7hw8-5cw4 | Cross-Site Request Forgery in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no validation of an existing user name while renaming a user. As a result, privileges of the renamed user are being overwritten by the old user and the old user is being deleted from the user list. | {'CVE-2021-25930'} | 2021-05-28T22:25:41Z | 2021-05-25T18:46:49Z | MODERATE | null | {'CWE-352'} | {'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25930', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'} | null |
Maven | GHSA-3rx2-x6mx-grj3 | Cross-site scripting in Apache JSPWiki | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the WYSIWYG editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. | {'CVE-2019-10089'} | 2022-03-03T05:14:04.393173Z | 2019-10-11T18:41:54Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10089', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10089'} | null |
Maven | GHSA-w9mp-p2wp-2xf7 | Improper file downloads in Apache Tapestry | In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run. | {'CVE-2020-13953'} | 2022-03-03T05:14:10.371770Z | 2022-02-10T20:35:42Z | MODERATE | null | {'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13953', 'https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63cbab91d180d19cc23dc1da3ed5b6e1280f%40%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E'} | null |
Maven | GHSA-9gp7-jvm2-r4mx | Moderate severity vulnerability that affects org.apache.struts:struts2-core | If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. Solution is to upgrade to Apache Struts version 2.5.12. | {'CVE-2017-7672'} | 2022-03-03T05:13:41.894757Z | 2018-10-16T19:36:43Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-7672', 'https://github.com/advisories/GHSA-9gp7-jvm2-r4mx', 'http://struts.apache.org/docs/s2-047.html', 'http://www.securitytracker.com/id/1039114', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'http://www.securityfocus.com/bid/99563'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.