ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-j39c-c8hj-x4j3
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
{'CVE-2021-25122'}
2022-03-03T05:14:05.681804Z
2021-06-16T17:45:29Z
HIGH
null
{'CWE-200'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b@%3Cusers.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4891', 'https://security.netapp.com/advisory/ntap-20210409-0002/', 'https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25122', 'https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947@%3Cusers.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/01/1'}
null
Maven
GHSA-p9w3-gwc2-cr49
HTTP Request Smuggling in Undertow
A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.
{'CVE-2020-10687'}
2022-03-03T05:13:21.962746Z
2021-04-30T17:28:52Z
MODERATE
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10687', 'https://security.netapp.com/advisory/ntap-20220210-0015/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1785049'}
null
Maven
GHSA-9jq9-c2cv-pcrj
Cross-site Scripting by SVG upload in xwiki-platform
### Impact When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. ### Patches This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. ### Workarounds This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload ### References https://jira.xwiki.org/browse/XWIKI-18368 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
{'CVE-2021-43841'}
2022-02-11T21:08:41Z
2022-02-10T22:42:48Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43841', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj', 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62', 'https://github.com/xwiki/xwiki-platform/', 'https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload', 'https://jira.xwiki.org/browse/XWIKI-18368'}
null
Maven
GHSA-9mgm-gcq8-86wq
Improper Authentication in Apache ActiveMQ and Apache Artemis
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
{'CVE-2021-26117'}
2022-03-03T05:13:31.345058Z
2021-06-16T17:39:35Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26117', 'https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rec93794f8aeddf8a5f1a643d264b4e66b933f06fd72a38f31448f0ac@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rd05b1c9d61dbd220664d559aa0e2b55e5830f006a09e82057f3f7863@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r519bfafd67091d0b91243efcb1c49b1eea27321355ba5594f679277d@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/raea451de09baed76950d6a60cc4bb1b74476c505e03205a3c68c9808@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rd75600cee29cb248d548edcf6338fe296466d63a69e2ed0afc439ec7@%3Cissues.activemq.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210304-0008/', 'https://issues.apache.org/jira/browse/AMQ-8035', 'https://lists.apache.org/thread.html/r3341d96d8f956e878fb7b463b08d57ca1d58fec9c970aee929b58e0d@%3Cissues.activemq.apache.org%3E', 'https://issues.apache.org/jira/browse/ARTEMIS-2895', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r110cacfa754471361234965ffe851a046e302ff2693b055f49f47b02@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rffa5cd05d01c4c9853b17f3004d80ea6eb8856c422a8545c5f79b1a6@%3Ccommits.activemq.apache.org%3E', 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3cCAH+vQmMeUEiKN4wYX9nLBbqmFZFPXqajNvBKmzb2V8QZANcSTA@mail.gmail.com%3e', 'https://lists.apache.org/thread.html/re1b98da90a5f2e1c2e2d50e31c12e2578d61fe01c0737f9d0bd8de99@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'https://lists.apache.org/thread.html/r5899ece90bcae5805ad6142fdb05c58595cff19cb2e98cc58a91f55b@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r70389648227317bdadcdecbd9f238571a6047469d156bd72bb0ca2f7@%3Cgitbox.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r22cdc0fb45e223ac92bc2ceff7af92f1193dfc614c8b248534456229@%3Cissues.activemq.apache.org%3E'}
null
Maven
GHSA-4p6w-m9wc-c9c9
Sensitive Data Exposure in Apache Ant
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.
{'CVE-2020-1945'}
2022-03-03T05:13:58.610289Z
2020-09-14T18:13:29Z
MODERATE
null
{'CWE-668', 'CWE-200'}
{'https://lists.apache.org/thread.html/rb8ec556f176c83547b959150e2108e2ddf1d61224295941908b0a81f@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rdaa9c51d5dc6560c9d2b3f3d742c768ad0705e154041e574a0fae45c@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r6030d34ceacd0098538425c5dac8251ffc7fd90b886942bc7ef87858@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cdev.groovy.apache.org%3E', 'https://security.gentoo.org/glsa/202007-34', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/rd7dda48ff835f4d0293949837d55541bfde3683bd35bd8431e324538@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r0d08a96ba9de8aa435f32944e8b2867c368a518d4ff57782e3637335@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r815f88d1044760176f30a4913b4baacd06f3eae4eb662de7388e46d8@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rfd346609527a79662c48b1da3ac500ec30f29f7ddaa3575051e81890@%3Ccommits.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQBR65TINSJRN7PTPIVNYS33P535WM74/', 'https://lists.apache.org/thread.html/r6970d196cd73863dafdbc3a7052562deedd338e3bd7d73d8171d92d6@%3Ccommits.groovy.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rce099751721c26a8166d8b6578293820832831a0b2cb8d93b8efa081@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r6e295d792032ec02b32be3846c21a58857fba4a077d22c5842d69ba2@%3Ctorque-dev.db.apache.org%3E', 'https://lists.apache.org/thread.html/re1ce84518d773a94a613d988771daf9252c9cf7375a9a477009f9735@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r8e24abb7dd77cda14c6df90a377c94f0a413bbfcec90a29540ff8adf@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r4b2904d64affd4266cd72ccb2fc3927c1c2f22009f183095aa46bf90@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc@%3Cdev.creadur.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00053.html', 'https://lists.apache.org/thread.html/r8e592bbfc016a5dbe2a8c0e81ff99682b9c78c453621b82c14e7b75e%40%3Cdev.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r95dc943e47a211d29df605e14f86c280fc9fa8d828b2b53bd07673c9@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb860063819b9c0990e1fbce29d83f4554766fe5a05e3b3939736bf2b@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r3cea0f3da4f6d06d7afb6c0804da8e01773a0f50a09b8d9beb2cda65@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rda80ac59119558eaec452e58ddfac2ccc9211da1c65f7927682c78b1@%3Cdev.creadur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1945', 'https://lists.apache.org/thread.html/r1863b9ce4c3e4b1e5b0c671ad05545ba3eb8399616aa746af5dfe1b1@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r1a9c992d7c8219dc15b4ad448649f0ffdaa88d76ef6a0035c49455f5@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rc89e491b5b270fb40f1210b70554527b737c217ad2e831b643ead6bc@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea@%3Cdev.ant.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/09/30/6', 'https://lists.apache.org/thread.html/rf07feaf78afc8f701e21948a06ef92565d3dff1242d710f4fbf900b2@%3Cdev.creadur.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/06/1', 'https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r6edd3e2cb79ee635630d891b54a4f1a9cd8c7f639d6ee34e75fbe830@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r5dfc77048b1f9db26622dce91a6edf083d499397256594952fad5f35@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://usn.ubuntu.com/4380-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRVAWTCVXJMRYKQKEXYSNBF7NLSR6OEI/', 'https://lists.apache.org/thread.html/ra12c3e23b021f259a201648005b9946acd7f618a6f32301c97047967@%3Cusers.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r1b32c76afffcf676e13ed635a3332f3e46e6aaa7722eb3fc7a28f58e@%3Cdev.hive.apache.org%3E'}
null
Maven
GHSA-55w9-c3g2-4rrh
Man-in-the-middle attack in Apache Axis
Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{'CVE-2012-5784'}
2022-03-03T05:13:18.729501Z
2020-10-07T17:51:02Z
MODERATE
null
{'CWE-20'}
{'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5784', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html', 'http://rhn.redhat.com/errata/RHSA-2013-0269.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79829', 'http://secunia.com/advisories/51219', 'http://www.securityfocus.com/bid/56408', 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2013-0683.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'http://rhn.redhat.com/errata/RHSA-2014-0037.html', 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf', 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E'}
null
Maven
GHSA-6xp6-fmc8-pmmr
Temporary Directory Hijacking Vulnerability in Keycloak
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
{'CVE-2021-20202'}
2022-05-03T19:22:00.995878Z
2022-03-18T17:50:45Z
HIGH
null
{'CWE-377'}
{'https://issues.redhat.com/browse/KEYCLOAK-17000', 'https://bugzilla.redhat.com/show_bug.cgi?id=1922128', 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20202'}
null
Maven
GHSA-gv3v-92v6-m48j
Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)
### Impact - Cross Site Scripting - Cache Poisoning - Page Hijacking ### Patches This was fixed in version `2.2.1`. ### Workarounds If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters. ### References ##### [CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) I've been poking at libraries to see if they are vulnerable to HTTP Response Splitting and Jooby is my third case of finding this vulnerability. ### Root Cause This roots cause back to this line in the Jooby codebase: https://github.com/jooby-project/jooby/blob/93cfc80aa20c188f71a442ea7a1827da380e1c27/modules/jooby-netty/src/main/java/io/jooby/internal/netty/NettyContext.java#L102 The `DefaultHttpHeaders` takes a parameter `validate` which, when `true` (as it is for the no-arg constructor) validates that the header isn't being abused to do HTTP Response Splitting. ### Reported By This vulnerability was reported by @JLLeitschuh ([Twitter](https://twitter.com/JLLeitschuh)) ### For more information If you have any questions or comments about this advisory: * Open an issue in [jooby-project/jooby](https://github.com/jooby-project/jooby/issues)
{'CVE-2020-7622'}
2022-03-03T05:14:07.280832Z
2020-04-03T15:23:30Z
CRITICAL
null
{'CWE-444'}
{'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622', 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249'}
null
Maven
GHSA-mgh8-hcwj-h57v
Improper Restriction of XML External Entity Reference in Apache Olingo
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
{'CVE-2019-17554'}
2022-03-03T05:14:02.923777Z
2020-02-04T22:37:43Z
MODERATE
null
{'CWE-611'}
{'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c', 'https://issues.apache.org/jira/browse/OLINGO-1409', 'http://packetstormsecurity.com/files/155619/Apache-Olingo-OData-4.6.x-XML-Injection.html', 'https://seclists.org/bugtraq/2019/Dec/11', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E', 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17554', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-7v35-qwwj-p98g
Improper Restriction of XML External Entity Reference in DiffPlug Spotless
In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file.
{'CVE-2019-9843'}
2022-03-03T05:13:06.546971Z
2019-07-05T21:07:40Z
HIGH
null
{'CWE-611'}
{'https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter', 'https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter', 'https://github.com/diffplug/spotless/issues/358', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9843', 'https://github.com/diffplug/spotless/pull/369'}
null
Maven
GHSA-59g4-hpg3-3gcp
Files Accessible to External Parties in Opencast
Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. ### Impact Before Opencast 10.6, Opencast would [open and include local files during ingests](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). Attackers could exploit this to include most local files the process has read access to, extracting secrets from the host machine. For example, to expose the `custom.properties` of develop.opencast.org via the asset manager, an attacker could have run: ``` curl -f -i -u admin:opencast \ https://develop.opencast.org/ingest/addMediaPackage/fast \ -F 'flavor=presenter/source'\ -F mediaUri=file:///srv/opencast/opencast-dist-allinone/etc/custom.properties\ -F title="custom.properties" ``` An attacker would need to have the privileges required to add new media to exploit this. But these are often widely given. ### Patches The issue has been fixed in Opencast 10.6 and 11.0. ### Workarounds You can mitigate this issue by narrowing down the read access Opencast has to files on the file system using UNIX permissions or mandatory access control systems like SELinux. This cannot prevent access to files Opencast needs to read though and we highly recommend updating. ### References - [Example of problematic code](https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587). - [Patch fixing the issue](https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2021-43821'}
2022-03-03T05:14:00.491448Z
2021-12-14T21:44:03Z
CRITICAL
null
{'CWE-552'}
{'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43821', 'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp', 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587', 'https://mvnrepository.com/artifact/org.opencastproject/opencast-ingest-service-impl'}
null
Maven
GHSA-535v-4x9q-446c
Moderate severity vulnerability that affects org.apache.hbase:hbase
In all previously released Apache HBase 2.x versions (2.0.0-2.0.4, 2.1.0-2.1.3), authorization was incorrectly applied to users of the HBase REST server. Requests sent to the HBase REST server were executed with the permissions of the REST server itself, not with the permissions of the end-user. This issue is only relevant when HBase is configured with Kerberos authentication, HBase authorization is enabled, and the REST server is configured with SPNEGO authentication. This issue does not extend beyond the HBase REST server.
{'CVE-2019-0212'}
2022-03-03T05:13:52.385100Z
2019-04-02T15:47:00Z
HIGH
null
{'CWE-285'}
{'http://www.openwall.com/lists/oss-security/2019/03/27/3', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-535v-4x9q-446c', 'https://lists.apache.org/thread.html/66535e15007cda8f9308eec10e12ffe349e0b8b55e56ec6ee02b71d2@%3Cdev.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0212', 'http://www.securityfocus.com/bid/107624', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}
null
Maven
GHSA-c9h6-xhg9-xxrv
Low severity vulnerability that affects org.apache.qpid:apache-qpid-broker-j
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 which allows an unauthenticated attacker to crash the broker instance by sending specially crafted commands using AMQP protocol versions below 1.0 (AMQP 0-8, 0-9, 0-91 and 0-10). Users of Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 utilizing AMQP protocols 0-8, 0-9, 0-91, 0-10 must upgrade to Qpid Broker-J versions 7.0.7 or 7.1.1 or later.
{'CVE-2019-0200'}
2022-03-03T05:11:47.129501Z
2019-03-07T18:48:08Z
HIGH
null
{'CWE-20'}
{'http://www.securityfocus.com/bid/107215', 'https://github.com/advisories/GHSA-c9h6-xhg9-xxrv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0200', 'https://lists.apache.org/thread.html/ac79d48de37d42b64da50384dbe9c8a329c5f553dd12ef7c28a832de@%3Cusers.qpid.apache.org%3E'}
null
Maven
GHSA-p9m8-27x8-rg87
Critical vulnerability found in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. ### Patches The issue was patched and a new version was released. Please upgrade to version 9.1.6. ### Workarounds There are no known workarounds up to this moment. ### References A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) ### For more information If you have any questions or comments about this advisory: Open an issue in the [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)
{'CVE-2021-41269'}
2022-03-03T05:13:37.090314Z
2021-11-15T23:27:11Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41269', 'https://github.com/jmrozanec/cron-utils', 'https://github.com/jmrozanec/cron-utils/issues/461', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87', 'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da'}
null
Maven
GHSA-f6pc-crhh-cp96
Privilege escalation in Presto
### Affected This affects Presto server installations. This does NOT affect clients such as the CLI or JDBC driver. ### Impact Authenticated users can bypass authorization checks by directly accessing internal APIs. This impacts Presto server installations with secure internal communication configured. This does not affect installations that have not configured secure internal communication, as these installations are inherently insecure. ### Patches This issue has been fixed starting with PrestoSQL version 337. ### Workarounds This issue can be mitigated by blocking network access to internal APIs on the coordinator and workers. ### References See the Presto documentation for [Secure Internal Communication](https://trino.io/docs/current/security/internal-communication.html). ### For more information If you have any questions or comments about this advisory: * Join the **#security** channel on [Slack](https://trino.io/slack.html). * Contact the security team at [security@trino.io](mailto:security@trino.io).
{'CVE-2020-15087'}
2022-03-03T05:13:24.863508Z
2020-06-30T16:33:23Z
HIGH
null
{'CWE-285'}
{'https://prestosql.io/docs/current/release/release-337.html#security-changes', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15087', 'https://github.com/prestosql/presto/security/advisories/GHSA-f6pc-crhh-cp96', 'https://trino.io/docs/current/release/release-337.html#security-changes', 'https://github.com/trinodb/trino/security/advisories/GHSA-f6pc-crhh-cp96'}
null
Maven
GHSA-77rv-6vfw-x4gc
Critical severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth and org.springframework.security.oauth:spring-security-oauth2
Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the "redirect_uri" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).
{'CVE-2019-3778'}
2022-03-03T05:12:19.875163Z
2019-03-14T15:39:30Z
CRITICAL
null
{'CWE-601'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-77rv-6vfw-x4gc', 'https://pivotal.io/security/cve-2019-3778', 'http://www.securityfocus.com/bid/107153', 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3778'}
null
Maven
GHSA-2h63-qp69-fwvw
Server-side request forgery (SSRF) in Apache Batik
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2020-11987'}
2022-03-03T05:13:00.592182Z
2022-01-06T20:35:54Z
HIGH
null
{'CWE-20', 'CWE-918'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E', 'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11987', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEDID4DAVPECE6O4QQCSIS75BLLBUUAM/', 'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://xmlgraphics.apache.org/security.html', 'https://github.com/apache/xmlgraphics-batik'}
null
Maven
GHSA-jpcm-4485-69p7
Sensitive information disclosure via log in com.bmuschko:gradle-vagrant-plugin
### Impact The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. ### Patches Fixed in version 3.0.0 ### References - https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44 - https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 - https://github.com/bmuschko/gradle-vagrant-plugin/pull/20 ### For more information If you have any questions or comments about this advisory: * Open an issue in [bmuschko/gradle-vagrant-plugin](https://github.com/bmuschko/gradle-vagrant-plugin)
{'CVE-2021-21361'}
2022-03-03T05:13:01.443834Z
2021-03-09T00:38:41Z
HIGH
null
{'CWE-532'}
{'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21361', 'https://github.com/bmuschko/gradle-vagrant-plugin/pull/20', 'https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44', 'https://github.com/bmuschko/gradle-vagrant-plugin/issues/19'}
null
Maven
GHSA-rvgg-f8qm-6h7j
High severity vulnerability that affects io.vertx:vertx-web
In version from 3.0.0 to 3.5.2 of Eclipse Vert.x, the CSRFHandler do not assert that the XSRF Cookie matches the returned XSRF header/form parameter. This allows replay attacks with previously issued tokens which are not expired yet.
{'CVE-2018-12540'}
2022-03-03T05:12:54.872818Z
2018-10-17T16:19:43Z
HIGH
null
{'CWE-352'}
{'https://access.redhat.com/errata/RHSA-2018:2371', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536948', 'https://lists.apache.org/thread.html/rc5b4ae8a7caae6d3d5b3266cb050823b96dd62b30718b90b778d3d8b@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12540', 'https://github.com/advisories/GHSA-rvgg-f8qm-6h7j', 'https://lists.apache.org/thread.html/r59482ebed302aa49ac7e0c51737499746b0d086fcdeb8f90e705951f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r10aef585c521f8ef603f5831f9d97a27d920624025131da950e0c62f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3fffda8e947edaa359152c8dc4c4ea9c96fd8ced1999bbce92bc6b25@%3Ccommits.pulsar.apache.org%3E'}
null
Maven
GHSA-94g7-hpv8-h9qm
Remote code injection in Log4j
### Impact Logging untrusted or user controlled data with a vulnerable version of Log4J may result in Remote Code Execution (RCE) against your application. This includes untrusted data included in logged errors such as exception traces, authentication failures, and other unexpected vectors of user controlled input. More Details: https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ### Patches Version 1.11.1 of the Splunk Logging for Java library. There is also a backport to version 1.6.2 released as a patch: 1.6.2-0-0. ### Workarounds If upgrading is not possible, then ensure the -Dlog4j2.formatMsgNoLookups=true system property is set on both client- and server-side components. ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/splunk/splunk-library-javalogging/issues * Email us at [devinfo@splunk.com](mailto:devinfo@splunk.com)
null
2021-12-14T20:00:34Z
2021-12-14T21:46:35Z
CRITICAL
null
null
{'https://github.com/splunk/splunk-library-javalogging', 'https://github.com/splunk/splunk-library-javalogging/security/advisories/GHSA-94g7-hpv8-h9qm'}
null
Maven
GHSA-qxf4-chvg-4r8r
Potential HTTP request smuggling in Apache Tomcat
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
{'CVE-2020-1935'}
2022-03-03T05:13:15.991411Z
2020-02-28T01:10:48Z
MODERATE
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1935', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200327-0005/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E', 'https://usn.ubuntu.com/4448-1/', 'https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E'}
null
Maven
GHSA-89r3-rcpj-h7w6
Path traversal attack on Windows platforms
Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.
{'CVE-2019-0207'}
2022-03-03T05:13:26.237643Z
2019-11-18T17:19:03Z
HIGH
null
{'CWE-22'}
{'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0207'}
null
Maven
GHSA-jpv3-g4cc-6vfx
Moderate severity vulnerability that affects org.apache.activemq:activemq-client
In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.
{'CVE-2019-0222'}
2022-03-03T05:14:04.389351Z
2019-04-02T15:46:42Z
HIGH
null
{'CWE-94'}
{'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-jpv3-g4cc-6vfx', 'https://lists.apache.org/thread.html/7da9636557118178b1690ba0af49c8a7b7b97d925218b5774622f488@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'http://www.securityfocus.com/bid/107622', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00004.html', 'https://lists.apache.org/thread.html/d1e334bd71d6e68462c62c726fe6db565c7a6283302f9c1feed087fa@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190502-0006/', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/71640324661c1b6d0b6708bd4fb20170e1b979370a4b8cddc4f8d485@%3Cdev.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0222', 'http://activemq.apache.org/security-advisories.data/CVE-2019-0222-announcement.txt', 'https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/03/27/2'}
null
Maven
GHSA-fmr4-w67p-vh8x
Moderate severity vulnerability that affects org.wildfly:wildfly-undertow
A flaw was found in Wildfly 9.x. A path traversal vulnerability through the org.wildfly.extension.undertow.deployment.ServletResourceManager.getResource method could lead to information disclosure of arbitrary local files.
{'CVE-2018-1047'}
2022-03-03T05:13:18.909350Z
2018-10-19T16:55:35Z
MODERATE
null
{'CWE-20'}
{'https://access.redhat.com/errata/RHSA-2018:2938', 'https://issues.jboss.org/browse/WFLY-9620', 'https://access.redhat.com/errata/RHSA-2018:1251', 'https://bugzilla.redhat.com/show_bug.cgi?id=1528361', 'https://github.com/advisories/GHSA-fmr4-w67p-vh8x', 'https://access.redhat.com/errata/RHSA-2018:1247', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1047', 'https://access.redhat.com/errata/RHSA-2018:1248', 'https://access.redhat.com/errata/RHSA-2018:1249'}
null
Maven
GHSA-q76j-58cx-wp5v
Vulnerability in RPKI manifest validation
A vulnerability in RPKI manifest validation exists when objects on the manifest are hidden, or expired objects are replayed. An attacker successfully exploiting this vulnerability could prevent new ROAs from being received or selectively hide ROAs, causing routes to become INVALID. To exploit this vulnerability, an attacker would need to perform a man in the middle attack on the TLS connection between the validator and an RRDP repository or perform a man in the middle attack against a rsync-only repository. The update addresses the vulnerability by implementing validation methods from [RFC 6486bis](https://datatracker.ietf.org/doc/draft-ietf-sidrops-6486bis/00/) and enabling strict validation by default.
null
2020-11-13T17:28:31Z
2020-11-13T17:28:49Z
HIGH
null
{'CWE-20'}
{'https://github.com/RIPE-NCC/rpki-validator-3/security/advisories/GHSA-q76j-58cx-wp5v'}
null
Maven
GHSA-3pqg-4rqg-pg9g
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
{'CVE-2022-28367'}
2022-05-04T04:20:29.353805Z
2022-04-23T00:03:04Z
MODERATE
null
{'CWE-79'}
{'https://github.com/nahsra/antisamy', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367', 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.6'}
null
Maven
GHSA-c6c4-7x48-4cqp
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack. - https://vaadin.com/security/cve-2021-31404
null
2022-03-03T05:13:24.872622Z
2021-04-19T14:47:47Z
MODERATE
null
{'CWE-208'}
{'https://vaadin.com/security/cve-2021-31404', 'https://github.com/vaadin/platform', 'https://github.com/vaadin/platform/security/advisories/GHSA-c6c4-7x48-4cqp'}
null
Maven
GHSA-qf76-pr7x-h7r4
Incorrect Access Control in Nacos
Nacos 1.1.4 is affected by: Incorrect Access Control. An environment can be set up locally to get the service details interface. Then other Nacos service names can be accessed through the service list interface. Service details can then be accessed when not logged in. (detail:https://github.com/alibaba/nacos/issues/2284)
{'CVE-2020-19676'}
2022-03-03T05:13:43.528317Z
2021-08-02T16:38:01Z
MODERATE
null
{'CWE-200'}
{'https://github.com/alibaba/nacos/releases/tag/1.2.0', 'https://github.com/alibaba/nacos/issues/2284', 'https://github.com/alibaba/nacos/issues/1105', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19676'}
null
Maven
GHSA-7qfm-6m33-rgg9
XML External Entity Reference
An issue was discovered in service-api before 4.3.12 and 5.x before 5.1.1 for Report Portal. It allows XXE, with resultant secrets disclosure and SSRF, via JUnit XML launch import.
null
2022-03-03T05:12:12.375571Z
2021-08-13T15:21:59Z
HIGH
null
{'CWE-611'}
{'https://github.com/reportportal/reportportal/blob/master/SECURITY_ADVISORIES.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'}
null
Maven
GHSA-m8p2-495h-ccmh
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
{'CVE-2019-10219'}
2022-03-03T05:13:17.197092Z
2020-01-08T17:01:52Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r4f8b4e2541be4234946e40d55859273a7eec0f4901e8080ce2406fe6@%3Cnotifications.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://lists.apache.org/thread.html/r87b7e2d22982b4ca9f88f5f4f22a19b394d2662415b233582ed22ebf@%3Cnotifications.accumulo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10219', 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E', 'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0024/', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee', 'https://access.redhat.com/errata/RHSA-2020:0164'}
null
Maven
GHSA-85f9-w9cx-h363
Cross site request forgery in Jenkins Job and Node ownership Plugin
Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
{'CVE-2022-28150'}
2022-04-07T15:46:51.610917Z
2022-03-30T00:00:23Z
HIGH
null
{'CWE-352'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)', 'https://github.com/jenkinsci/ownership-plugin', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28150'}
null
Maven
GHSA-gw55-jm4h-x339
Improper Validation of Certificate with Host Mismatch in Java-WebSocket
The Java-WebSocket Client does not perform hostname verification. - This means that SSL certificates of other hosts are accepted as long as they are trusted. To exploit this vulnerability an attacker has to perform a man-in-the-middle (MITM) attack between a Java application using the Java-WebSocket Client and an WebSocket server it's connecting to. - TLS normally protects users and systems against MITM attacks, it cannot if certificates from other trusted hosts are accepted by the client. For more information see: CWE-297: Improper Validation of Certificate with Host Mismatch - https://cwe.mitre.org/data/definitions/297.html ## Important note The OWASP Dependency-Check (https://jeremylong.github.io/DependencyCheck/index.html) may report that a dependency of your project is affected by this security vulnerability, but you don't use this lib. This is caused by the fuzzy search in the OWASP implementation. Check out this issue (https://github.com/TooTallNate/Java-WebSocket/issues/1019#issuecomment-628507934) for more information and a way to suppress the warning.
{'CVE-2020-11050'}
2022-03-03T05:13:12.698034Z
2020-05-08T18:54:39Z
HIGH
null
{'CWE-295', 'CWE-297'}
{'https://github.com/TooTallNate/Java-WebSocket', 'https://github.com/TooTallNate/Java-WebSocket/security/advisories/GHSA-gw55-jm4h-x339', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11050'}
null
Maven
GHSA-fh63-4r66-jc7v
Cross-site scripting (XSS) in Apache Velocity Tools
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
{'CVE-2020-13959'}
2022-04-25T23:46:55.517447Z
2021-03-12T20:24:22Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/rf9868c564cff7adfd5283563f2309b93b3e496354a211a57503b2f72@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13959', 'https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3@%3Cuser.velocity.apache.org%3E', 'https://security.gentoo.org/glsa/202107-52', 'https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/10/2', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00021.html', 'https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E', 'https://lists.apache.org/thread.html/r97edad0655770342d2d36620fb1de50b142fcd6c4f5c53dd72ca41d7@%3Cuser.velocity.apache.org%3E'}
null
Maven
GHSA-m6x4-97wx-4q27
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
{'CVE-2020-36184'}
2022-04-22T18:30:48.330683Z
2021-12-09T19:16:26Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2998', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36184', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-4vww-mc66-62m6
HTTP Request Smuggling in Apache Tomcat
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
{'CVE-2021-33037'}
2022-04-26T21:15:06.536991Z
2021-08-13T15:21:14Z
MODERATE
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97@%3Ccommits.tomee.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366', 'https://www.debian.org/security/2021/dsa-4952', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33037', 'https://lists.apache.org/thread/kovg1bft77xo34ksrcskh5nl50p69962', 'https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b@%3Ccommits.tomee.apache.org%3E'}
null
Maven
GHSA-2cc5-23r7-vc4v
Default client side session signing key is highly predictable
### Impact The client side session module uses the application startup time as the signing key by default. This means that if an attacker can determine this time, and if encryption is not also used (which is recommended, but is not on by default), the session data could be tampered with by someone with the ability to write cookies. The default configuration is unsuitable for production use as an application restart renders all sessions invalid and is not multi-host compatible, but its use is not actively prevented. ### Vulnerability Location https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29 ### Patches As of Ratpack 1.9.0 the default value is a securely randomly generated value, generated at application startup time. ### Workarounds Supply an alternative signing key, as per the documentation's recommendation.
{'CVE-2021-29480'}
2022-03-03T05:13:40.816171Z
2021-07-01T17:02:26Z
MODERATE
null
{'CWE-330', 'CWE-340'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29480', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-2cc5-23r7-vc4v', 'https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29'}
null
Maven
GHSA-36p3-wjmg-h94x
Remote Code Execution in Spring Framework
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).
{'CVE-2022-22965'}
2022-04-01T16:30:56.651036Z
2022-03-31T18:30:50Z
CRITICAL
null
{'CWE-74'}
{'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6', 'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18', 'https://github.com/spring-projects/spring-framework', 'https://tanzu.vmware.com/security/cve-2022-22965', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22965', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12', 'https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement'}
null
Maven
GHSA-hw3m-8h25-8frw
Command Injection in Apache Kylin
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
{'CVE-2021-45456'}
2022-03-03T05:13:32.561750Z
2022-01-08T00:42:59Z
MODERATE
null
{'CWE-77'}
{'https://github.com/apache/kylin', 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845', 'https://github.com/apache/kylin/pull/1781', 'https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf', 'http://www.openwall.com/lists/oss-security/2022/01/06/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45456'}
null
Maven
GHSA-r8rm-4hfj-2x87
Data Amplification in Play Framework
In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.
{'CVE-2020-26882'}
2021-04-22T16:58:02Z
2022-02-10T20:23:28Z
HIGH
null
{'CWE-674'}
{'https://github.com/playframework/playframework/pull/10495', 'https://www.playframework.com/security/vulnerability/CVE-2020-26882-JsonParseDataAmplification', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26882'}
null
Maven
GHSA-52rg-hpwq-qp56
Allocation of Resources Without Limits or Throttling in Keycloak
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
{'CVE-2020-10758'}
2022-03-03T05:12:31.791056Z
2022-02-09T00:56:51Z
HIGH
null
{'CWE-770'}
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251', 'https://bugzilla.redhat.com/show_bug.cgi?id=1843849', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758'}
null
Maven
GHSA-2qrg-x229-3v8q
Deserialization of Untrusted Data in Log4j
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. Users are advised to migrate to `org.apache.logging.log4j:log4j-core`
{'CVE-2019-17571'}
2022-04-22T17:30:36.834289Z
2020-01-06T18:43:49Z
CRITICAL
null
{'CWE-502'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html', 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://usn.ubuntu.com/4495-1/', 'https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc@%3Ccommits.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e@%3Cuser.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4686', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17571', 'https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200110-0001/', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870@%3Cjira.kafka.apache.org%3E'}
null
Maven
GHSA-8vfw-v2jv-9hwc
Reflected cross-site scripting in development mode handler in Vaadin
URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. - https://vaadin.com/security/cve-2021-33604
null
2022-03-03T05:13:36.230957Z
2021-06-28T16:52:45Z
LOW
null
{'CWE-172'}
{'https://vaadin.com/security/cve-2021-33604', 'https://github.com/vaadin/flow/security/advisories/GHSA-8vfw-v2jv-9hwc'}
null
Maven
GHSA-wmfg-55f9-j8hq
Server-Side Template Injection
### Impact A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282. ### Patches Effective Immediately, all users should upgrade to version 2.1.2 or higher. ### Workarounds None. ### References https://securitylab.github.com/research/bean-validation-RCE ### For more information If you have any questions or comments about this advisory: * Open an issue in [the BrowserUp Proxy repo](http://github.com/browserup/browserup-proxy) * Contact us via the [BrowserUp website](https://browserup.com) or email us at [support@browserup.com](mailto:support@browserup.com)
{'CVE-2020-26282'}
2022-03-03T05:14:06.141126Z
2020-12-24T20:49:34Z
HIGH
null
{'CWE-74'}
{'https://securitylab.github.com/research/bean-validation-RCE', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26282', 'https://github.com/browserup/browserup-proxy/security/advisories/GHSA-wmfg-55f9-j8hq', 'https://github.com/browserup/browserup-proxy/releases/tag/v2.1.2', 'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
null
Maven
GHSA-92wj-x78c-m4fx
Moderate severity vulnerability that affects org.apache.karaf:karaf
Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases.
{'CVE-2018-11788'}
2022-03-03T05:13:08.143129Z
2019-01-07T19:14:49Z
CRITICAL
null
{'CWE-611'}
{'http://www.securityfocus.com/bid/106479', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788', 'https://github.com/advisories/GHSA-92wj-x78c-m4fx', 'http://karaf.apache.org/security/cve-2018-11788.txt'}
null
Maven
GHSA-v7mf-qgxf-qmvf
Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users login and access policies
Apache Ranger before 0.6.is vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies.
{'CVE-2016-8751'}
2022-04-27T14:00:11.902259Z
2018-10-17T17:21:54Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/99067', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8751', 'https://github.com/advisories/GHSA-v7mf-qgxf-qmvf'}
null
Maven
GHSA-74qp-233x-p5j8
Cross-site scripting (XSS) in Apache Livy
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
{'CVE-2021-26544'}
2022-03-03T05:13:09.945335Z
2021-05-13T22:30:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/02/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26544'}
null
Maven
GHSA-vpfp-5gwq-g533
Improper Authentication in Apache ShenYu Admin
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
{'CVE-2021-37580'}
2022-03-03T05:13:44.383618Z
2021-11-17T23:15:30Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/apache/incubator-shenyu', 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'http://www.openwall.com/lists/oss-security/2021/11/16/1', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1'}
null
Maven
GHSA-8vcr-vxm8-293m
Denial of Service in SheetsJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).
{'CVE-2021-32013'}
2022-03-03T05:13:18.637397Z
2021-07-22T19:48:13Z
MODERATE
null
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32013', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://sheetjs.com/pro'}
null
Maven
GHSA-ppc3-fpvh-7396
Improper synchronization in Apache Netbeans HTML/Java API
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file.
{'CVE-2020-17534'}
2022-05-03T19:52:12.075427Z
2022-02-09T22:25:18Z
HIGH
null
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17534', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E', 'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
null
Maven
GHSA-4xr4-4c65-hj7f
Apache Tika does not properly initialize the XML parser or choose handlers
Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175.
{'CVE-2016-4434'}
2022-04-26T22:00:08.288501Z
2018-10-17T15:44:22Z
HIGH
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-4xr4-4c65-hj7f', 'http://rhn.redhat.com/errata/RHSA-2017-0272.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4434', 'http://rhn.redhat.com/errata/RHSA-2017-0248.html', 'http://www.securityfocus.com/archive/1/538500/100/0/threaded', 'https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E', 'http://rhn.redhat.com/errata/RHSA-2017-0249.html'}
null
Maven
GHSA-c8cw-2c5j-xff3
Incorrect Authorization in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.
{'CVE-2021-39234'}
2021-11-22T19:05:51Z
2021-11-23T17:56:30Z
MODERATE
null
{'CWE-863'}
{'http://www.openwall.com/lists/oss-security/2021/11/19/5', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39234'}
null
Maven
GHSA-ff84-84q5-fq4f
Incorrect Authorization in Apache Ozone
In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.
{'CVE-2021-39232'}
2021-11-22T19:05:02Z
2021-11-23T17:56:54Z
HIGH
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39232', 'http://www.openwall.com/lists/oss-security/2021/11/19/3', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E'}
null
Maven
GHSA-rvwf-54qp-4r6v
XML Entity Expansion in SnakeYAML
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
{'CVE-2017-18640'}
2022-04-19T19:15:11.134129Z
2021-06-04T21:37:45Z
HIGH
null
{'CWE-776'}
{'https://lists.apache.org/thread.html/rc3211c71f7e0973a1825d1988a3921288c06cd9d793eae97ecd34948@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2a7037366c58bac6aec6ce3df843a11ef97ae4eb049f05f410eaa5@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd582c64f66c354240290072f340505f5d026ca944ec417226bb0272e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r72a3588d62b2de1361dc9648f5d355385735e47f7ba49d089b0e680d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r28c9009a48d52cf448f8b02cd823da0f8601d2dff4d66f387a35f1e0@%3Cdev.atlas.apache.org%3E', 'https://mvnrepository.com/artifact/org.yaml/snakeyaml/1.25/usages', 'https://bitbucket.org/asomov/snakeyaml', 'https://lists.apache.org/thread.html/r6d54c2da792c74cc14b9b7665ea89e144c9e238ed478d37fd56292e6@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r4d7f37da1bc2df90a5a0f56eb7629b5ea131bfe11eeeb4b4c193f64a@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r55d807f31e64a080c54455897c20b1667ec792e5915132c7b7750533@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r8464b6ec951aace8c807bac9ea526d4f9e3116aa16d38be06f7c6524@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rcb4b61dbe2ed1c7a88781a9aff5a9e7342cc7ed026aec0418ee67596@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r900e020760c89f082df1c6e0d46320eba721e4e47bb9eb521e68cd95@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKN7VGIKTYBCAKYBRG55QHXAY5UDZ7HA/', 'https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c', 'https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r2b05744c0c2867daa5d1a96832965b7d6220328b0ead06c22a6e7854@%3Ccommits.pulsar.apache.org%3E', 'https://bitbucket.org/asomov/snakeyaml/wiki/Changes', 'https://lists.apache.org/thread.html/r5510f0125ba409fc1cabd098ab8b457741e5fa314cbd0e61e4339422@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r643ba53f002ae59068f9352fe1d82e1b6f375387ffb776f13efe8fda@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r436988d2cfe8a770ae361c82b181c5b2bf48a249bad84d8a55a3b46e@%3Cdev.phoenix.apache.org%3E', 'https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/re851bbfbedd47c690b6e01942acb98ee08bd00df1a94910b905bc8cd@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r2a5b84fdf59042dc398497e914b5bb1aed77328320b1438144ae1953@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rce5c93bba6e815fb62ad38e28ca1943b3019af1eddeb06507ad4e11a@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r4c682fb8cf69dd14162439656a6ebdf42ea6ad0e4edba95907ea3f14@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r6c91e52b3cc9f4e64afe0f34f20507143fd1f756d12681a56a9b38da@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r666f29a7d0e1f98fa1425ca01efcfa86e6e3856e01d300828aa7c6ea@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c33d0069c927fae16084f0605895b98d231d7c48527bcb822ac48c@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/recfe569f4f260328b0036f1c82b2956e864d519ab941a5e75d0d832d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rf95bebee6dfcc55067cebe8482bd31e6f481d9f74ba8e03f860c3ec7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18640', 'https://lists.apache.org/thread.html/rbaa1f513d903c89a08267c91d86811fa5bcc82e0596b6142c5cea7ea@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb7b28ac741e32dd5edb2c22485d635275bead7290b056ee56baf8ce0@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r22ac2aa053b7d9c6b75a49db78125c9316499668d0f4a044f3402e2f@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTVJC54XGX26UJVVYCXZ7D25X3R5T2G6/', 'https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack', 'https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/reb1751562ee5146d3aca654a2df76a2c13d8036645ce69946f9c219e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E', 'https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion', 'https://lists.apache.org/thread.html/r56805265475919252ba7fc10123f15b91097f3009bae86476624ca25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r2db207a2431a5e9e95e899858ab1f5eabd9bcc790a6ca7193ae07e94@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/re791a854001ec1f79cd4f47328b270e7a1d9d7056debb8f16d962722@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/raebd2019b3da8c2f90f31e8b203b45353f78770ca93bfe5376f5532e@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb34d8d3269ad47a1400f5a1a2d8310e13a80b6576ebd7f512144198d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rb0e033d5ec8233360203431ad96580cf2ec56f47d9a425d894e279c2@%3Cpr.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r8b57c57cffa01e418868a3c7535b987635ff1fb5ab534203bfa2d64a@%3Ccommits.pulsar.apache.org%3E'}
null
Maven
GHSA-52mh-p2m2-w625
Cross-site Scripting in HAPI FHIR
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)
{'CVE-2019-12741'}
2022-03-03T05:13:27.411183Z
2019-06-07T20:56:59Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741'}
null
Maven
GHSA-5949-rw7g-wx7w
Deserialization of untrusted data in jackson-databind
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20190'}
2022-03-03T05:13:41.686303Z
2021-01-20T21:20:15Z
HIGH
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a', 'https://security.netapp.com/advisory/ntap-20210219-0008/'}
null
Maven
GHSA-74mg-6xqx-2vrq
Deserialization exploitation in Apache Dubbo
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
{'CVE-2020-11995'}
2022-03-03T05:13:50.092682Z
2022-02-09T22:27:01Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E'}
null
Maven
GHSA-xqj7-j8j5-f2xr
Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
{'CVE-2018-1000180'}
2022-04-26T19:00:14.440858Z
2018-10-16T17:44:39Z
HIGH
null
{'CWE-327'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000180', 'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://security.netapp.com/advisory/ntap-20190204-0003/', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-xqj7-j8j5-f2xr', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180', 'http://www.securityfocus.com/bid/106567', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://www.debian.org/security/2018/dsa-4233', 'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test'}
null
Maven
GHSA-j8wc-gxx9-82hx
Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
{'CVE-2021-40690'}
2022-04-22T15:47:31.654196Z
2021-09-20T23:18:41Z
HIGH
null
{'CWE-200'}
{'https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html', 'https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40690', 'https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E', 'https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5010', 'https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-5mc7-m686-p6jg
Deserialization of Untrusted Data in Apache Dubbo
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument.
{'CVE-2021-30179'}
2022-03-21T22:00:16.252860Z
2022-03-18T17:57:32Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67@%3Cdev.dubbo.apache.org%3E', 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30179'}
null
Maven
GHSA-9vfj-5g7h-4p24
Server side template injection in Apache Camel
Server-Side Template Injection and arbitrary file disclosure on Camel templating components
{'CVE-2020-11994'}
2022-03-03T05:13:25.975240Z
2020-07-29T18:08:48Z
HIGH
null
{'CWE-74'}
{'https://lists.apache.org/thread.html/r0a406dc5a158fe6fab6ee85f6e082a8473c0c346b37db8cc7a4619e6%40%3Cdev.camel.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECAMEL-575542', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11994', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'}
null
Maven
GHSA-8c9h-4q7g-fp7h
Out-of-bounds Read in iText
iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
{'CVE-2022-24198'}
2022-03-03T05:12:46.055723Z
2022-02-02T00:01:45Z
MODERATE
null
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24198', 'https://github.com/itext/itext7/pull/78', 'https://github.com/itext/itext7'}
null
Maven
GHSA-jg6j-jrxv-2hh9
Cross-site Scripting in Apache Pluto
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
{'CVE-2021-36738'}
2022-03-03T05:13:32.669097Z
2022-01-08T00:46:17Z
MODERATE
null
{'CWE-79'}
{'https://github.com/apache/portals-pluto', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36738', 'https://lists.apache.org/thread/11j19v1gjsk7o6o8nch1xrydow9b8lll'}
null
Maven
GHSA-xfqh-7356-vqjj
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.
{'CVE-2019-14820'}
2022-03-03T05:13:22.933119Z
2020-04-15T21:08:21Z
MODERATE
null
{'CWE-200'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14820', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14820'}
null
Maven
GHSA-9mxf-g3x6-wv74
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
{'CVE-2018-14721'}
2022-03-03T05:13:02.517930Z
2019-01-04T19:07:06Z
CRITICAL
null
{'CWE-918'}
{'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1106', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://seclists.org/bugtraq/2019/May/68', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.debian.org/security/2019/dsa-4452'}
null
Maven
GHSA-g5m7-57ph-j6p8
OS Command Injection in Nexus Yum Repository Plugin
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
{'CVE-2019-5475'}
2022-03-03T05:14:17.831814Z
2019-09-11T23:04:57Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5475', 'https://hackerone.com/reports/654888'}
null
Maven
GHSA-fj2w-wfgv-mwq6
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was privately reported to me. ### Patches This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the README for [this library's repository](https://github.com/peteroupc/CBOR-Java) to see the latest version's version number.) ### Workarounds Again, users should use the latest version of this library. In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if— - it begins with a byte other than 0x80 through 0xDF, or - it does not contain a byte in the range 0xa0 through 0xBF. Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR-Java).
null
2022-03-03T05:13:32.646957Z
2022-01-21T23:21:48Z
HIGH
null
{'CWE-407'}
{'https://github.com/peteroupc/CBOR-Java', 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6'}
null
Maven
GHSA-xmc8-26q4-qjhx
Denial of Service (DoS) in Jackson Dataformat CBOR
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
{'CVE-2020-28491'}
2022-03-03T05:12:59.919693Z
2021-12-09T19:17:21Z
HIGH
null
{'CWE-770'}
{'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://github.com/FasterXML/jackson-dataformats-binary', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
null
Maven
GHSA-867q-77cc-98mv
Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin
### Impact Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does not impact Windows or modern versions of MacOS. OpenAPI Generator Maven plug-in creates insecure temporary files during the code generation process. It creates insecure temporary files to store the OpenAPI specification files provided by the users and these temporary files can be read by any users in the system. The impact of this vulnerability is information disclosure of the contents of the specification file to other local users. ### Patches The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version. ### For more information If you have any questions or comments about this advisory: * Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) * Email us at [security@openapitools.org](mailto:security@openapitools.org)
{'CVE-2021-21429'}
2022-03-03T05:14:10.556564Z
2021-04-29T21:51:37Z
MODERATE
null
{'CWE-377', 'CWE-379', 'CWE-552', 'CWE-378'}
{'https://github.com/OpenAPITools/openapi-generator/blob/06ad7a51eff04393203cfa715e54e1fb59d984fe/modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java#L782-L799', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv', 'https://github.com/OpenAPITools/openapi-generator/pull/8795', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}
null
Maven
GHSA-5c6c-w4c4-vgvx
Cross-site scripting in Jenkins Scriptler Plugin
Jenkins Scriptler Plugin 3.1 and earlier does not escape script content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
{'CVE-2021-21668'}
2021-06-23T18:06:14Z
2022-01-06T18:45:09Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21668', 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2390', 'http://www.openwall.com/lists/oss-security/2021/06/16/3'}
null
Maven
GHSA-477x-w7m6-c6ph
Improper input validation in Apache Olingo
The AsyncResponseWrapperImpl class in Apache Olingo versions 4.0.0 to 4.6.0 reads the Retry-After header and passes it to the Thread.sleep() method without any check. If a malicious server returns a huge value in the header, then it can help to implement a DoS attack.
{'CVE-2019-17555'}
2022-03-03T05:13:43.607419Z
2020-02-04T22:37:15Z
HIGH
null
{'CWE-20'}
{'https://issues.apache.org/jira/browse/OLINGO-1411', 'https://github.com/apache/olingo-odata4/pull/61', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d65UmudJ_MQkFXEv9YY_wwZbRA3sgtNDzMoLM51Qh%3DRCA%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17555'}
null
Maven
GHSA-24r8-fm9r-cpj2
Low severity vulnerability that affects com.linecorp.armeria:armeria
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function ### Impact String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implementation of `equals` method from `java.lang.String`. While this attack is not practically possible, an attacker still has a potential to attack if the victim's server validates user by using `equals` method. We would like to thank @chrsow for pointing out the issue. ## Potentially vulnerable codes https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/OAuth2Token.java#L54 https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/BasicToken.java#L64 ### Patches There are two options to patch this issue. 1. Remove `equals` method; it has been exclusively used for test cases and was never used in any OSS projects that are using Armeria. (But it is worth noting that there are possibilities of closed projects authenticating users by utilizing `equals` method) 2. Use `MessageDigest.isEqual` to compare the credential instead. ### Workarounds 1. Update to the latest version (TBD) 2-1. Users can prevent these vulnerabilities by modifying and implementing timing attack preventions by themselves. 2-2. Precisely speaking, it is possible to compare credentials by securely comparing them after calling methods to directly return the input (namely `Object. accessToken()`, `Object.username()` and `Object.password()`). ### References - https://cwe.mitre.org/data/definitions/208.html - https://security.stackexchange.com/questions/111040/should-i-worry-about-remote-timing-attacks-on-string-comparison ### Side Note Since it is a theoretical attack, there is no PoC available from neither the vendor nor the security team.
{'CVE-2019-16771'}
2022-03-03T05:12:59.259982Z
2019-12-05T18:40:51Z
LOW
null
{'CWE-113'}
{'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771'}
null
Maven
GHSA-p2j7-6g9h-32xh
Cross site scripting in Shopizer
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
{'CVE-2022-23059'}
2022-04-07T22:16:52.919294Z
2022-03-30T00:00:27Z
MODERATE
null
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'}
null
Maven
GHSA-6768-mcjc-8223
Command injection leading to Remote Code Execution in Apache Storm
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
{'CVE-2021-38294'}
2022-03-03T05:14:13.845856Z
2021-10-27T18:51:22Z
CRITICAL
null
{'CWE-74', 'CWE-77'}
{'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html', 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E', 'https://seclists.org/oss-sec/2021/q4/44', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}
null
Maven
GHSA-hpm9-fx8v-w45v
Plaintext storage in Jenkins instant-messaging Plugin
Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
{'CVE-2022-28135'}
2022-04-07T22:16:52.407980Z
2022-03-30T00:00:25Z
MODERATE
null
{'CWE-256'}
{'https://github.com/jenkinsci/instant-messaging-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28135', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2161'}
null
Maven
GHSA-4284-x26r-4hhc
Cross Site Request Forgery in Apache JSPWiki
Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
{'CVE-2022-24947'}
2022-03-07T20:47:56.381132Z
2022-02-26T00:00:44Z
HIGH
null
{'CWE-352'}
{'https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c', 'http://www.openwall.com/lists/oss-security/2022/02/25/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24947'}
null
Maven
GHSA-p826-8vhq-h439
Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19
Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. - https://vaadin.com/security/cve-2021-31411
{'CVE-2021-31411'}
2022-03-03T05:13:41.919034Z
2021-05-06T15:27:12Z
HIGH
null
{'CWE-379'}
{'https://vaadin.com/security/cve-2021-31411', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31411', 'https://github.com/vaadin/platform/security/advisories/GHSA-p826-8vhq-h439', 'https://github.com/vaadin/flow/pull/10640'}
null
Maven
GHSA-2mxr-89gf-rc4v
Read permissions not enforced for client provided filter expressions in Elide.
### Impact It is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field. For example, a User model has two fields: _name_ and _role_. The adversary has read permissions to see the _name_ field of the User collection but not the _role_. By constructing a filter like the one below, the adversary can determine which users have admin role by presence or absence in the returned collection: `filter=role=="Admin"` ### Patches Resolved in Elide 4.5.14 and greater. ### Workarounds The adversary can only access the fields if a model includes fields with different read permission levels (some less secure and some more secure). Model security can be adjusted by restricting read permissions on existing models. ### References Fixed in https://github.com/yahoo/elide/pull/1236 ### For more information If you have any questions or comments about this advisory: * Open an issue in [elide](https://github.com/yahoo/elide) * Contact us at [spectrum](https://spectrum.chat/elide?tab=posts)
{'CVE-2020-5289'}
2022-03-03T05:13:01.891877Z
2020-03-30T20:09:58Z
HIGH
null
{'CWE-285'}
{'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc', 'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v', 'https://github.com/yahoo/elide/pull/1236', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289'}
null
Maven
GHSA-hf44-3mx6-vhhw
Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service.
### Impact The regex injection that may lead to Denial of Service. ### Patches Will be patched in 2.4 and 3.0 ### Workarounds Versions lower than 2.x are only affected if the navigation module is added ### References See this pull request for the fix: https://github.com/graphhopper/graphhopper/pull/2304 If you have any questions or comments about this advisory please [send us an Email](https://www.graphhopper.com/contact-form/) or create a topic [here](https://discuss.graphhopper.com/).
{'CVE-2021-29506'}
2022-03-03T05:13:45.979595Z
2021-05-19T23:02:57Z
MODERATE
null
{'CWE-400'}
{'https://github.com/graphhopper/graphhopper/pull/2304', 'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29506', 'https://github.com/graphhopper/graphhopper/security/advisories/GHSA-hf44-3mx6-vhhw'}
null
Maven
GHSA-gpch-h32j-gx6x
Insufficiently Protected Credentials in Reactor Netty
The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.
{'CVE-2020-5404'}
2021-07-08T14:31:41Z
2022-02-10T20:24:17Z
MODERATE
null
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5404', 'https://pivotal.io/security/cve-2020-5404'}
null
Maven
GHSA-m6cp-vxjx-65j6
SessionListener can prevent a session from being invalidated breaking logout
### Impact If an exception is thrown from the `SessionListener#sessionDestroyed()` method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in. There is no known path for an attacker to induce such an exception to be thrown, thus they must rely on an application to throw such an exception. The OP has also identified that during the call to `sessionDestroyed`, the `getLastAccessedTime()` throws an `IllegalStateException`, which potentially contrary to the servlet spec, so applications calling this method may always throw and fail to log out. If such an application was only tested on a non clustered test environment, then it may be deployed on a clustered environment with multiple contexts and fail to log out. ### Workarounds The application should catch all Throwables within their `SessionListener#sessionDestroyed()` implementations.
{'CVE-2021-34428'}
2022-04-22T16:01:57.103521Z
2021-06-23T20:23:04Z
LOW
null
{'CWE-613'}
{'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34428', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m6cp-vxjx-65j6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210813-0003/', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}
null
Maven
GHSA-p8xr-4v2c-rvgp
High severity vulnerability that affects org.apache.hbase:hbase
Apache HBase 0.98 before 0.98.12.1, 1.0 before 1.0.1.1, and 1.1 before 1.1.0.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, uses incorrect ACLs for ZooKeeper coordination state, which allows remote attackers to cause a denial of service (daemon outage), obtain sensitive information, or modify data via unspecified client traffic.
{'CVE-2015-1836'}
2022-03-03T05:13:02.001445Z
2018-10-18T18:04:50Z
HIGH
null
{'CWE-284'}
{'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1836', 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546', 'https://github.com/advisories/GHSA-p8xr-4v2c-rvgp', 'http://www.securitytracker.com/id/1034365', 'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCA+RK=_CFiTfQ2d0V+kuJx_y5izmYccaKjXaJ3V72KK7tbOhbkg@mail.gmail.com%3E'}
null
Maven
GHSA-2mh8-gx2m-mr75
Out-of-Memory Error in Bouncy Castle Crypto
The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.
{'CVE-2019-17359'}
2020-05-22T19:28:22Z
2019-10-17T18:15:16Z
MODERATE
null
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17359', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20191024-0006/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r79b6a6aa0dd1aeb57bd253d94794bc96f1ec005953c4bd5414cc0db0@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r91b07985b1307390a58c5b9707f0b28ef8e9c9e1c86670459f20d601@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r02f887807a49cfd1f1ad53f7a61f3f8e12f60ba2c930bec163031209@%3Ccommits.tomee.apache.org%3E', 'https://www.bouncycastle.org/latest_releases.html', 'https://www.bouncycastle.org/releasenotes.html', 'https://lists.apache.org/thread.html/r16c3a90cb35ae8a9c74fd5c813c16d6ac255709c9f9d71cd409e007d@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re60f980c092ada4bfe236dcfef8b6ca3e8f3b150fc0f51b8cc13d59d@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r4d475dcaf4f57115fa57d8e06c3823ca398b35468429e7946ebaefdc@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r8ecb5b76347f84b6e3c693f980dbbead88c25f77b815053c4e6f2c30@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/r467ade3fef3493f1fff1a68a256d087874e1f858ad1de7a49fe05d27@%3Ccommits.tomee.apache.org%3E'}
null
Maven
GHSA-836g-5fr5-fgcr
Missing Authentication for Critical Function in Apache TomEE
If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.
{'CVE-2020-11969'}
2022-03-03T05:13:58.061099Z
2022-02-10T23:07:37Z
HIGH
null
{'CWE-306'}
{'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11969', 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/16/2'}
null
Maven
GHSA-fg3j-q579-v8x4
Uncontrolled memory consumption
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
{'CVE-2021-31811'}
2022-04-22T16:02:00.233032Z
2021-06-15T15:54:32Z
MODERATE
null
{'CWE-770', 'CWE-789'}
{'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31811', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rf937c2236e6c79cdb99f76a70690dd345e53dbe0707cb506a202e43e@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e%40%3Cusers.pdfbox.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/12/2'}
null
Maven
GHSA-5993-wwpg-m92c
Improper Authentication in Apache Ozone
In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.
{'CVE-2021-39236'}
2021-11-22T19:05:30Z
2021-11-23T17:56:45Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39236', 'http://www.openwall.com/lists/oss-security/2021/11/19/7', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C0fd74baa-88a0-39a2-8f3a-b982acb25d5a%40apache.org%3E'}
null
Maven
GHSA-q656-g2x3-8cgh
Kylin can receive user input and load any class through Class.forName(...).
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
{'CVE-2021-31522'}
2022-03-03T05:13:38.321306Z
2022-01-08T00:43:01Z
MODERATE
null
{'CWE-470'}
{'https://github.com/apache/kylin', 'http://www.openwall.com/lists/oss-security/2022/01/06/4', 'https://lists.apache.org/thread/hh5crx3yr701zd8wtpqo1mww2rlkvznw', 'https://github.com/apache/kylin/pull/1695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31522', 'https://github.com/apache/kylin/pull/1763'}
null
Maven
GHSA-744r-vv2g-2x6g
Apache NiFi information disclosure by XXE
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
{'CVE-2019-10080'}
2022-03-03T05:12:39.801120Z
2019-12-02T18:17:36Z
MODERATE
null
{'CWE-611'}
{'https://github.com/apache/nifi/pull/3507', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080', 'https://nifi.apache.org/security.html#CVE-2019-10080', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
Maven
GHSA-c9jj-3wvg-q65h
Vulnerability that affects org.apache.pdfbox:pdfbox
Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF.
{'CVE-2019-0228'}
2022-05-04T20:48:05.951722Z
2019-07-05T21:12:54Z
CRITICAL
null
{'CWE-611'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0228', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.apache.org/thread.html/r32b8102392a174b17fd19509a9e76047f74852b77b7bf46af95e45a2@%3Cserver-dev.james.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/bc8db1bf459f1ad909da47350ed554ee745abe9f25f2b50cad4e06dd@%3Cserver-dev.james.apache.org%3E', 'https://lists.apache.org/thread.html/8a19bd6d43e359913341043c2a114f91f9e4ae170059539ad1f5673c@%3Ccommits.tika.apache.org%3E', 'https://github.com/advisories/GHSA-c9jj-3wvg-q65h', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/be86fcd7cd423a3fe6b73a3cb9d7cac0b619d0deb99e6b5d172c98f4@%3Ccommits.tika.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/', 'https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E'}
null
Maven
GHSA-r97x-3g8f-gx3m
The Bouncy Castle JCE Provider carry a propagation bug
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
{'CVE-2016-1000340'}
2022-04-27T13:30:08.936923Z
2018-10-17T16:23:50Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000340', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31', 'https://github.com/advisories/GHSA-r97x-3g8f-gx3m'}
null
Maven
GHSA-2j2x-hx4g-2gf4
In Bouncy Castle JCE Provider the DHIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000344'}
2022-04-27T13:45:16.751309Z
2018-10-18T17:43:55Z
HIGH
null
{'CWE-1310'}
{'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://github.com/advisories/GHSA-2j2x-hx4g-2gf4', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000344', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-54mg-vgrp-mwx9
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
{'CVE-2019-11808'}
2022-03-03T05:13:00.025711Z
2019-05-14T04:01:37Z
LOW
null
{'CWE-338'}
{'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d', 'https://github.com/ratpack/ratpack/releases/tag/v1.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808', 'https://github.com/ratpack/ratpack/issues/1448'}
null
Maven
GHSA-288c-cq4h-88gq
XML External Entity (XXE) Injection in Jackson Databind
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
{'CVE-2020-25649'}
2022-04-22T17:30:52.405021Z
2021-02-18T20:51:54Z
HIGH
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r8764bb835bcb8e311c882ff91dd3949c9824e905e880930be56f6ba3@%3Cuser.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r98bfe3b90ea9408f12c4b447edcb5638703d80bc782430aa0c210a54@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r6cbd599b80e787f02ff7a1391d9278a03f37d6a6f4f943f0f01a62fb@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6a6df5647583541e3cb71c75141008802f7025cee1c430d4ed78f4cc@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r024b7bda9c43c5560d81238748775c5ecfe01b57280f90df1f773949@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/ra1157e57a01d25e36b0dc17959ace758fc21ba36746de29ba1d8b130@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r63c87aab97155f3f3cbe11d030c4a184ea0de440ee714977db02e956@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r45e7350dfc92bb192f3f88e9971c11ab2be0953cc375be3dda5170bd@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc959cdb57c4fe198316130ff4a5ecbf9d680e356032ff2e9f4f05d54@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdca8711bb7aa5d47a44682606cd0ea3497e2e922f22b7ee83e81e6c1@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8a1608d758936bd6bbc5eed980777437b611537bf6fff40663fc71@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/raf13235de6df1d47a717199e1ecd700dff3236632f5c9a1488d9845b@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rc82ff47853289e9cd17f5cfbb053c04cafc75ee32e3d7223963f83bb@%3Cdev.knox.apache.org%3E', 'https://github.com/FasterXML/jackson-databind', 'https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r73bef1bb601a9f093f915f8075eb49fcca51efade57b817afd5def07@%3Ccommits.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re16f81d3ad49a93dd2f0cba9f8fc88e5fb89f30bf9a2ad7b6f3e69c1@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rd6f6bf848c2d47fa4a85c27d011d948778b8f7e58ba495968435a0b3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6e3d4f7991542119a4ca6330271d7fbf7b9fb3abab24ada82ddf1ee4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3e6ae311842de4e64c5d560a475b7f9cc7e0a9a8649363c6cf7537eb@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re96dc7a13e13e56190a5d80f9e5440a0d0c83aeec6467b562fbf2dca@%3Cjira.kafka.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6X2UT4X6M7DLQYBOOHMXBWGYJ65RL2CT/', 'https://lists.apache.org/thread.html/r765283e145049df9b8998f14dcd444345555aae02b1610cfb3188bf8@%3Cnotifications.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/ra409f798a1e5a6652b7097429b388650ccd65fd958cee0b6f69bba00@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf1809a1374041a969d77afab21fc38925de066bc97e86157d3ac3402@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd317f15a675d114dbf5b488d27eeb2467b4424356b16116eb18a652d@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r91722ecfba688b0c565675f8bf380269fde8ec62b54d6161db544c22@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r94c7e86e546120f157264ba5ba61fd29b3a8d530ed325a9b4fa334d7@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rd57c7582adc90e233f23f3727db3df9115b27a823b92374f11453f34@%3Cissues.hive.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1887664', 'https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r900d4408c4189b376d1ec580ea7740ea6f8710dc2f0b7e9c9eeb5ae0@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r90d1e97b0a743cf697d89a792a9b669909cc5a1692d1e0083a22e66c@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210108-0007/', 'https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25649', 'https://lists.apache.org/thread.html/r95a297eb5fd1f2d3a2281f15340e2413f952e9d5503296c3adc7201a@%3Ccommits.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2589', 'https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra95faf968f3463acb3f31a6fbec31453fc5045325f99f396961886d3@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rc15e90bbef196a5c6c01659e015249d6c9a73581ca9afb8aeecf00d2@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc88f2fa2b7bd6443921727aeee7704a1fb02433e722e2abf677e0d3d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8ae961c80930e2717c75025414ce48a432cea1137c02f648b1fb9524@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdf9a34726482222c90d50ae1b9847881de67dde8cfde4999633d2cdc@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r5b130fe668503c4b7e2caf1b16f86b7f2070fd1b7ef8f26195a2ffbd@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r68d029ee74ab0f3b0569d0c05f5688cb45dd3abe96a6534735252805@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rb674520b9f6c808c1bf263b1369e14048ec3243615f35cfd24e33604@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E'}
null
Maven
GHSA-5wm5-8q42-rhxg
File system access via H2 in Apache Ignite
Apache Ignite uses H2 database to build SQL distributed execution engine. H2 provides SQL functions which could be used by attacker to access to a filesystem.
{'CVE-2020-1963'}
2022-03-03T05:13:01.244770Z
2020-06-05T16:11:02Z
CRITICAL
null
{'CWE-862'}
{'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cdev.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cuser.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1963', 'https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r119024ef71c8d39f952df0950a275d09714715179aff544aea0129a3@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/06/03/2'}
null
Maven
GHSA-3qpg-33wr-533j
Improper Restriction of XML External Entity Reference in Magnolia CMS
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file.
{'CVE-2021-46365'}
2022-04-20T19:13:59Z
2022-02-12T00:00:37Z
HIGH
null
{'CWE-611'}
{'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46365'}
null
Maven
GHSA-w736-hf9p-qqh3
Key Caching behavior in the DynamoDB Encryption Client.
### Impact This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. ### Patches Fixed as of 1.15.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. ### Workarounds Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
null
2022-03-03T05:13:22.445994Z
2021-02-08T17:43:36Z
LOW
null
{'CWE-862'}
{'https://github.com/aws/aws-dynamodb-encryption-java/blob/master/CHANGELOG.md#1150----2021-02-04', 'https://github.com/aws/aws-dynamodb-encryption-java/security/advisories/GHSA-w736-hf9p-qqh3', 'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'}
null
Maven
GHSA-jmv4-73v2-pvgc
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.
{'CVE-2021-25929'}
2021-05-28T22:27:11Z
2021-05-25T18:46:58Z
MODERATE
null
{'CWE-79'}
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25929', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2'}
null
Maven
GHSA-gx2c-fvhc-ph4j
Path traversal in Hadoop
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
{'CVE-2022-26612'}
2022-04-19T15:16:57.848342Z
2022-04-08T00:00:21Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/apache/hadoop', 'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612'}
null
Maven
GHSA-3qpm-h9ch-px3c
Remote code injection, Improper Input Validation and Uncontrolled Recursion in Log4j library
### Summary The version used of Log4j, the library used for logging by PowerNukkit, is subject to a remote code execution vulnerability via the ldap JNDI parser. It's well detailed at [CVE-2021-44228](https://github.com/advisories/GHSA-jfh8-c2jp-5v3q) and CVE-2021-45105(https://github.com/advisories/GHSA-p6xc-xr62-6r2g). ### Impact Malicious client code could be used to send messages and cause remote code execution on the server. ### Patches PowerNukkit `1.5.2.1` is a patch-release that only updates the Log4j version to `2.17.0` and should be used instead of `1.5.2.0`. All versions prior to `1.5.2.1` are affected and are not patched. ### Workarounds If you can't upgrade, you can use the `-Dlog4j2.formatMsgNoLookups=true` startup argument as remediation, as this prevents the vulnerability from happening. ### References https://github.com/advisories/GHSA-jfh8-c2jp-5v3q https://github.com/advisories/GHSA-p6xc-xr62-6r2g ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PowerNukkit repository](https://github.com/PowerNukkit/PowerNukkit/issues)
null
2022-03-03T05:12:38.612409Z
2022-01-06T18:31:23Z
CRITICAL
null
{'CWE-502', 'CWE-20', 'CWE-400'}
{'https://github.com/PowerNukkit/PowerNukkit', 'https://github.com/PowerNukkit/PowerNukkit/security/advisories/GHSA-3qpm-h9ch-px3c'}
null
Maven
GHSA-38cg-gg9j-q9j9
Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.
{'CVE-2019-3875'}
2022-03-03T05:13:50.992163Z
2019-06-27T17:25:57Z
MODERATE
null
{'CWE-345', 'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3875', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875'}
null
Maven
GHSA-fcr6-6cph-vmcm
Stored XSS vulnerability in Jenkins Git Parameter Plugin
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29040'}
2022-04-29T04:45:31.263113Z
2022-04-13T00:00:17Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jenkinsci/git-parameter-plugin', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29040'}
null