ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-c8xf-m4ff-jcxj
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.
{'CVE-2016-1000339'}
2022-03-03T05:13:14.245841Z
2018-10-17T16:23:38Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-c8xf-m4ff-jcxj', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000339', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'}
null
Maven
GHSA-9f3j-pm6f-9fm5
Race condition in Apache Tomcat
The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
{'CVE-2022-23181'}
2022-04-22T15:47:12.949291Z
2022-02-01T00:45:44Z
HIGH
null
{'CWE-367'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23181', 'https://github.com/apache/tomcat', 'https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9', 'https://security.netapp.com/advisory/ntap-20220217-0010/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-g5wh-fw4m-2v28
CSRF vulnerability in Jenkins autonomiq plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials.
{'CVE-2022-25194'}
2022-05-04T20:57:40Z
2022-02-16T00:01:23Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25194', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545'}
null
Maven
GHSA-8h77-3xwr-hqhh
Cross-site scripting in Jenkins Kiuwan Plugin
Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability.
{'CVE-2021-21666'}
2021-06-16T20:03:17Z
2021-06-16T17:10:50Z
MODERATE
null
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2021/06/10/14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666', 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367'}
null
Maven
GHSA-cp67-8w3w-6h9c
Path Traversal
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
{'CVE-2020-14366'}
2022-03-03T05:13:36.404235Z
2022-02-09T00:58:03Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-14366', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14366'}
null
Maven
GHSA-rhg5-fqr3-hrf5
Injection in DeltaSpike
we got reports for 2 injection attacks against the DeltaSpike windowhandler.js. This is only active if a developer selected the ClientSideWindowStrategy which is not the default.
{'CVE-2019-12416'}
2022-03-03T05:13:35.690550Z
2022-02-10T20:54:31Z
MODERATE
null
{'CWE-74'}
{'https://lists.apache.org/thread.html/r848d7d4c0bf637da55f01103eb8ba0fce344c295fda53264cbaa1568@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r8f327712b2b07f867fde1e77cbafcf8cc6a3facaa693ffdd2c3285e3%40%3Cdev.deltaspike.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12416'}
null
Maven
GHSA-2mp8-qvqm-3xwq
Restlet Framework, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request
Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension.
{'CVE-2017-14868'}
2022-04-26T21:37:35Z
2018-10-17T00:04:31Z
HIGH
null
{'CWE-611'}
{'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://github.com/restlet/restlet-framework-java/issues/1286', 'https://lgtm.com/blog/restlet_CVE-2017-14868', 'https://github.com/advisories/GHSA-2mp8-qvqm-3xwq', 'https://github.com/restlet/restlet-framework-java', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14868'}
null
Maven
GHSA-vx85-mj8c-4qm6
Moderate severity vulnerability that affects org.apache.thrift:libthrift
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
{'CVE-2018-11798'}
2022-03-03T05:13:51.597398Z
2019-01-17T13:56:33Z
MODERATE
null
{'CWE-538'}
{'https://access.redhat.com/errata/RHSA-2019:1545', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6', 'http://www.securityfocus.com/bid/106501', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E'}
null
Maven
GHSA-f3j5-rmmp-3fc5
Improper Input Validation in jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
{'CVE-2019-17267'}
2022-03-03T05:13:48.664403Z
2020-06-15T18:44:48Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r9d727fc681fb3828794acbefcaee31393742b4d73a29461ccd9597a8@%3Cdev.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://github.com/FasterXML/jackson-databind', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.3...jackson-databind-2.9.10', 'https://github.com/FasterXML/jackson-databind/issues/2460', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17267'}
null
Maven
GHSA-59g9-7gfx-c72p
Infinite loop in Tomcat due to parsing error
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
{'CVE-2021-41079'}
2022-03-03T05:12:12.505852Z
2021-09-20T20:45:44Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41079', 'https://github.com/apache/tomcat', 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html', 'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0', 'https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211008-0005/', 'https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4986'}
null
Maven
GHSA-42j4-733x-5vcf
Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7
Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://vaadin.com/security/cve-2020-36320
{'CVE-2020-36320'}
2022-03-03T05:13:38.711805Z
2021-04-19T14:49:32Z
HIGH
null
{'CWE-400'}
{'https://github.com/vaadin/framework/issues/7757', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320', 'https://vaadin.com/security/cve-2020-36320', 'https://github.com/vaadin/framework/pull/12104', 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf'}
null
Maven
GHSA-p5pg-wm9q-8v6r
Improper Handling of Exceptional Conditions inn metadata-extractor
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
{'CVE-2022-24613'}
2022-03-07T20:47:57.809554Z
2022-02-25T00:01:05Z
MODERATE
null
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24613', 'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://github.com/drewnoakes/metadata-extractor'}
null
Maven
GHSA-cq9c-55r7-455x
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.
{'CVE-2018-11787'}
2022-03-03T05:13:47.579948Z
2019-01-07T19:14:51Z
HIGH
null
{'CWE-287'}
{'https://issues.apache.org/jira/browse/KARAF-4993', 'https://github.com/advisories/GHSA-cq9c-55r7-455x', 'http://karaf.apache.org/security/cve-2018-11787.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787', 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'}
null
Maven
GHSA-729f-wvj3-c4pj
Remote code execution in UReport
An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code.
{'CVE-2020-21125'}
2022-03-03T05:14:06.464215Z
2021-09-20T20:45:03Z
HIGH
null
{'CWE-22'}
{'https://github.com/youseries/ureport/issues/485', 'https://github.com/youseries/ureport', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21125'}
null
Maven
GHSA-g86w-v5vg-9gxf
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
{'CVE-2020-5405'}
2022-03-03T05:13:14.864992Z
2020-06-05T16:11:36Z
MODERATE
null
{'CWE-22', 'CWE-23'}
{'https://pivotal.io/security/cve-2020-5405', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5405', 'https://github.com/spring-cloud/spring-cloud-config/spring-cloud-config-server'}
null
Maven
GHSA-xwgq-pcqx-hpmv
URL Redirection to Untrusted Site (Open Redirect) in Ktor
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
{'CVE-2019-19703'}
2022-03-03T05:13:14.265291Z
2020-02-12T18:45:50Z
MODERATE
null
{'CWE-601'}
{'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703', 'https://github.com/ktorio/ktor/issues/1467'}
null
Maven
GHSA-8rx6-v5q4-xw3j
XML External Entity Reference in Jenkins Coverage/Complexity Scatter Plot Plugin
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2022-28154'}
2022-04-07T22:01:59.794941Z
2022-03-30T00:00:23Z
HIGH
null
{'CWE-611'}
{'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28154', 'https://github.com/jenkinsci/covcomplplot-plugin'}
null
Maven
GHSA-rcj2-vvjx-87pm
Missing Encryption of Sensitive Data in arrow-kt Arrow
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
{'CVE-2019-11404'}
2022-03-03T05:13:24.756571Z
2019-04-22T17:15:40Z
MODERATE
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11404', 'https://github.com/arrow-kt/ank/issues/35', 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8', 'https://github.com/arrow-kt/ank/pull/36', 'https://github.com/arrow-kt/arrow/issues/1310', 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0'}
null
Maven
GHSA-6hgm-866r-3cjv
Insecure Deserialization in Apache Commons Collection
Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object.
{'CVE-2015-6420'}
2022-03-03T05:12:29.230823Z
2020-06-15T20:36:20Z
HIGH
null
null
{'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization', 'https://www.tenable.com/security/research/tra-2017-23', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6420', 'https://www.tenable.com/security/research/tra-2017-14', 'https://www.kb.cert.org/vuls/id/581311', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.securityfocus.com/bid/78872'}
null
Maven
GHSA-wc4x-4gm2-74j8
Improper Certificate Validation in Apache Geode
When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack.
{'CVE-2019-10091'}
2022-03-03T05:12:18.561836Z
2022-02-10T20:51:04Z
MODERATE
null
{'CWE-295'}
{'https://lists.apache.org/thread.html/r3342077ac4798631300366be86e545d0c08753cca8fd2663867fe200%40%3Cdev.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10091'}
null
Maven
GHSA-32xf-jwmv-9hf3
Directory traversal attack in Spring Cloud Config
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
{'CVE-2020-5410'}
2022-03-03T05:14:09.697475Z
2020-06-05T16:13:20Z
MODERATE
null
{'CWE-23'}
{'https://tanzu.vmware.com/security/cve-2020-5410', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5410'}
null
Maven
GHSA-gggp-gh2p-996x
Path Traversal in LemMinX
A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files is possible due to directory traversal.
{'CVE-2022-0673'}
2022-03-02T21:56:44Z
2022-02-19T00:01:27Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0673', 'https://github.com/eclipse/lemminx', 'https://github.com/eclipse/lemminx/pull/1171', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022'}
null
Maven
GHSA-f94m-mqhr-mc29
Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits.
{'CVE-2018-18853'}
2022-03-03T05:14:04.824384Z
2018-11-09T17:42:26Z
HIGH
null
{'CWE-400'}
{'https://github.com/spray/spray-json/issues/278', 'https://github.com/spray/spray-json', 'https://github.com/advisories/GHSA-f94m-mqhr-mc29', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'}
null
Maven
GHSA-64x2-gq24-75pv
Cross-site scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.
{'CVE-2020-13954'}
2022-04-22T17:30:30.545101Z
2021-04-22T16:15:23Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210513-0010/', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-m72m-mhq2-9p6c
Uncaught Exception in jsoup
### Impact _What kind of vulnerability is it? Who is impacted?_ Those using jsoup to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Users should upgrade to jsoup 1.14.2 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Users may rate limit input parsing. Users should limit the size of inputs based on system resources. Users should implement thread watchdogs to cap and timeout parse runtimes.
{'CVE-2021-37714'}
2022-04-22T15:47:31.197354Z
2021-08-23T19:42:38Z
HIGH
null
{'CWE-835', 'CWE-248'}
{'https://lists.apache.org/thread.html/r3d71f18adb78e50f626dde689161ca63d3b7491bd9718fcddfaecba7@%3Cissues.maven.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37714', 'https://lists.apache.org/thread.html/r215009dbf7467a9f6506d0c0024cb36cad30071010e62c9352cfaaf0@%3Cissues.maven.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r50e9c9466c592ca9d707a5dea549524d19e3287da08d8392f643960e@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r685c5235235ad0c26e86d0ee987fb802c9675de6081dbf0516464e0b@%3Cnotifications.james.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0022/', 'https://lists.apache.org/thread.html/r377b93d79817ce649e9e68b3456e6f499747ef1643fa987b342e082e@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rc3354080fc67fb50b45b3c2d12dc4ca2a3c1c78dad3d3ba012c038aa@%3Cnotifications.james.apache.org%3E', 'https://github.com/jhy/jsoup', 'https://jsoup.org/news/release-1.14.1', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r97404676a5cf591988faedb887d64e278f522adcaa823d89ca69defe@%3Cnotifications.james.apache.org%3E', 'https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c', 'https://jsoup.org/news/release-1.14.2'}
null
Maven
GHSA-cfw5-v7cw-69cw
Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api
In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request).
{'CVE-2018-1337'}
2022-03-03T05:11:29.256013Z
2018-11-09T17:49:49Z
CRITICAL
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337', 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E', 'http://www.securityfocus.com/bid/104744'}
null
Maven
GHSA-vf77-8h7g-gghp
Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat
An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
{'CVE-2020-13934'}
2022-03-03T05:14:04.600393Z
2022-02-08T22:05:00Z
HIGH
null
{'CWE-119', 'CWE-476'}
{'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13934', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://security.netapp.com/advisory/ntap-20200724-0003/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://usn.ubuntu.com/4596-1/', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-52vv-3vf7-f7wh
Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX
A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file.
{'CVE-2022-0671'}
2022-03-02T21:57:09Z
2022-02-19T00:01:28Z
CRITICAL
null
{'CWE-918', 'CWE-400'}
{'https://github.com/eclipse/lemminx', 'https://github.com/redhat-developer/vscode-xml/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/eclipse/lemminx/issues/1169', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0671'}
null
Maven
GHSA-q4hg-rmq2-52q9
Improper Locking in Apache Tomcat
The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
{'CVE-2019-10072'}
2022-03-03T05:12:48.650139Z
2019-06-26T01:09:40Z
MODERATE
null
{'CWE-667'}
{'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K17321505', 'https://www.synology.com/security/advisory/Synology_SA_19_29', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190625-0002/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10072', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'http://www.securityfocus.com/bid/108874', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://www.debian.org/security/2020/dsa-4680', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://usn.ubuntu.com/4128-2/', 'https://usn.ubuntu.com/4128-1/', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-5679-7qrc-5m7j
IDOR can reveal execution data and logs to unauthorized user in Rundeck
### Impact Authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. > Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. ### Details An authenticated user could craft a request to: * View Executions and download execution logs without access to `read` or `view` the associated Job, or ad-hoc resource. * Get the list of running executions in a project, without Event `read` access, if they have `read` access to view the project. * View the Options definitions of a Job without access to view the Job. * View the definition of a workflow step of a Job without access to view the Job. * View the SCM diff of a modified Job definition if SCM is enabled, without Project `export` access level. * View the New User Profile Form for a different username, without User `admin` access. Note: they would not be allowed to create or modify a profile for a different user, or reveal any user profile information for a different user. Some authenticated API requests were not correctly checking appropriate authorization levels: * The list of running Executions would be sent without `read` access to Events. * The Plugin Input Parameters for a SCM plugin would be sent without authorization for project `import`,`scm_import`,`export`, or `scm_export` actions. * Job Retry action could retry an execution without `read` or `view` access to the Execution, which would reveal the Execution's option values. (`run` access to the Job was still required). ### Patches Upgrade to Rundeck version 3.2.6 ### Workarounds None ### References [3.2.6 Release Notes](https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html) ### Report If you have any questions or comments about this advisory: * Email us at [security@rundeck.com](mailto:security@rundeck.com) To report security issues to Rundeck please use the form at [http://rundeck.com/security](http://rundeck.com/security) Reporter: Justine Osborne of Apple Information Security
{'CVE-2020-11009'}
2022-03-03T05:12:55.832766Z
2020-04-29T16:31:12Z
MODERATE
null
{'CWE-200', 'CWE-639'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11009', 'https://github.com/rundeck/rundeck', 'https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j'}
null
Maven
GHSA-xwx6-vmj4-5rv8
Denial of service via deserialization attack in nifi
A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB.
{'CVE-2017-15703'}
2022-03-03T05:12:27.401653Z
2019-10-25T19:42:50Z
MODERATE
null
{'CWE-502'}
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
null
Maven
GHSA-7wq4-89xx-g62j
Password exposure in ShenYu
The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2022-23223'}
2022-03-03T05:13:49.818603Z
2022-01-28T22:13:57Z
HIGH
null
{'CWE-522'}
{'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/25/7', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23223', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s', 'http://www.openwall.com/lists/oss-security/2022/01/26/4'}
null
Maven
GHSA-2p6p-v69p-9mm9
XSS in login form
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
{'CVE-2019-13235'}
2022-03-03T05:13:44.173532Z
2019-11-12T22:58:16Z
MODERATE
null
{'CWE-79'}
{'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235', 'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
null
Maven
GHSA-9rgv-h7x4-qw8g
Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
{'CVE-2018-12536'}
2022-03-03T05:14:09.556302Z
2018-10-19T16:15:56Z
MODERATE
null
{'CWE-209'}
{'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535670', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-9rgv-h7x4-qw8g', 'http://www.securitytracker.com/id/1041194', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12536'}
null
Maven
GHSA-hwvv-438r-mhvj
Exposure of Sensitive Information to an Unauthorized Actor
A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.
{'CVE-2021-22134'}
2022-04-22T17:02:00.991519Z
2021-03-18T19:23:57Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22134', 'https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835', 'https://security.netapp.com/advisory/ntap-20210430-0006/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-ccjp-w723-2jf2
Moderate severity vulnerability that affects org.apache.tika:tika-core
Apache Tika server (aka tika-server) in Apache Tika 1.9 might allow remote attackers to read arbitrary files via the HTTP fileUrl header.
{'CVE-2015-3271'}
2022-03-03T05:13:43.683608Z
2018-10-17T15:44:10Z
MODERATE
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2015/08/13/5', 'https://github.com/advisories/GHSA-ccjp-w723-2jf2', 'http://www.securityfocus.com/bid/95020', 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8@1439485507@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3271'}
null
Maven
GHSA-v83p-xwm9-v4g8
Injection in Apache Archiva
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects.
{'CVE-2020-9495'}
2022-03-03T05:12:51.796941Z
2022-02-10T23:06:22Z
MODERATE
null
{'CWE-74'}
{'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9495', 'http://www.openwall.com/lists/oss-security/2020/06/19/1', 'https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3E', 'http://archiva.apache.org/security.html#CVE-2020-9495'}
null
Maven
GHSA-8gw6-w5rw-4g5c
Incorrect Default Permissions in Apache JSPWiki
Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
{'CVE-2021-44140'}
2022-03-03T05:13:52.665607Z
2021-11-29T17:59:24Z
CRITICAL
null
{'CWE-276'}
{'https://github.com/apache/jspwiki', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140', 'https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44140'}
null
Maven
GHSA-xpmx-h7xq-xffh
Potential access control security issue in apollo-adminservice
### Impact If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations. ### Patches Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1). ### Workarounds To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet. ### Credits [Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it. ### References [Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3) ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/ctripcorp/apollo/issues) * Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors)
{'CVE-2020-15170'}
2022-03-03T05:13:32.189742Z
2020-10-02T16:33:41Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh', 'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/ctripcorp/apollo'}
null
Maven
GHSA-fqgw-6qj5-8hmp
Infinite Loop in Apache James
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.
{'CVE-2021-40111'}
2022-03-03T05:13:12.664342Z
2022-01-08T00:40:37Z
MODERATE
null
{'CWE-835'}
{'http://www.openwall.com/lists/oss-security/2022/01/04/3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40111', 'https://www.openwall.com/lists/oss-security/2022/01/04/3'}
null
Maven
GHSA-mj8x-cpr8-x39h
Remote code execution in Apache Tapestry
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
{'CVE-2021-27850'}
2022-03-03T05:13:14.219254Z
2021-06-16T17:33:19Z
CRITICAL
null
{'CWE-502', 'CWE-922'}
{'https://issues.apache.org/jira/browse/TAP5-2663', 'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850', 'http://www.openwall.com/lists/oss-security/2021/04/15/1', 'https://security.netapp.com/advisory/ntap-20210528-0002/'}
null
Maven
GHSA-77hp-pfxw-4w63
Moderate severity vulnerability that affects org.codelibs.fess:fess
codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b.
{'CVE-2018-1000822'}
2022-03-03T05:13:53.095728Z
2018-12-20T22:02:09Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/codelibs/fess', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000822', 'https://0dd.zone/2018/10/27/fess-XXE/', 'https://github.com/advisories/GHSA-77hp-pfxw-4w63', 'https://github.com/codelibs/fess/issues/1851'}
null
Maven
GHSA-j84c-j8qm-g47r
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username.
{'CVE-2016-0733'}
2022-04-27T13:41:39Z
2018-10-17T17:21:11Z
CRITICAL
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-0733', 'https://issues.apache.org/jira/browse/RANGER-835', 'https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E', 'https://github.com/advisories/GHSA-j84c-j8qm-g47r', 'http://www.securityfocus.com/bid/82871', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}
null
Maven
GHSA-wph7-x527-w3h5
Missing Release of Resource after Effective Lifetime in Apache Tomcat
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
{'CVE-2021-42340'}
2022-04-22T15:47:45.749830Z
2021-10-15T18:51:34Z
HIGH
null
{'CWE-772'}
{'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/tomcat', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340', 'https://www.debian.org/security/2021/dsa-5009', 'https://security.netapp.com/advisory/ntap-20211104-0001/', 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E'}
null
Maven
GHSA-6w62-hx7r-mw68
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39154](https://x-stream.github.io/CVE-2021-39154.html). ### Credits ka1n4t found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39154'}
2022-04-22T15:47:21.283341Z
2021-08-25T14:46:38Z
HIGH
null
{'CWE-502', 'CWE-434'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream', 'https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39154', 'https://x-stream.github.io/CVE-2021-39154.html'}
null
Maven
GHSA-4jf5-jggp-g56j
Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty.
{'CVE-2020-28452'}
2022-03-03T05:13:48.743049Z
2022-01-06T20:23:05Z
HIGH
null
{'CWE-352'}
{'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://github.com/softwaremill/akka-http-session/pull/79', 'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675', 'https://github.com/softwaremill/akka-http-session/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452'}
null
Maven
GHSA-94qw-r73x-j7hg
Users with ROLE_COURSE_ADMIN can create new users in Opencast
### Impact Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example: ```bash # Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user. # We expect this to work. % curl -i -u admin:opencast 'https://example.opencast.org/user-utils/xy.json' -X PUT \ --data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D' HTTP/2 201 # Use the new user to create more new users. # We don't expüect a user with just role ROLE_COURSE_ADMIN to succeed. # But it does work % curl -i -u xy:f 'https://example.opencast.org/user-utils/ab.json' -X PUT \ --data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D' HTTP/2 201 ``` `ROLE_COURSE_ADMIN` is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation. ### Patches This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration. ### Workarounds You can fix this issue by removing all instances of `ROLE_COURSE_ADMIN` in your organization's security configuration (`etc/security/mh_default_org.xml` by default). ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5231'}
2022-03-03T05:14:18.353152Z
2020-01-30T21:21:37Z
MODERATE
null
{'CWE-285'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231'}
null
Maven
GHSA-pfj3-56hm-jwq5
Template injection in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. ### Patches The issue was patched and a new version released. Please upgrade to version 9.1.3. ### Workarounds There are no known workarounds up to this moment. ### References A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461) ### For more information If you have any questions or comments about this advisory: * Open an issue in [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)
{'CVE-2020-26238'}
2022-03-03T05:14:02.872232Z
2020-11-24T23:48:38Z
CRITICAL
null
{'CWE-74'}
{'https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238', 'https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/issues/461', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e', 'https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E'}
null
Maven
GHSA-rhcw-wjcm-9h6g
Denial of service in Undertow
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1.
{'CVE-2020-27782'}
2022-03-03T05:13:40.690161Z
2022-02-09T00:54:12Z
HIGH
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782', 'https://issues.redhat.com/browse/UNDERTOW-1813'}
null
Maven
GHSA-3c7p-vv5r-cmr5
Incorrect Authorization in Apache Solr
Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions.
{'CVE-2020-13957'}
2022-03-03T05:13:26.970601Z
2022-02-10T00:31:27Z
CRITICAL
null
{'CWE-863'}
{'https://lists.apache.org/thread.html/r3da9895cea476bcee2557531bebd4e8f6f367dc3ea900a65e2f51cd8@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r4ca8ba5980d9049cf3707798aa3116ee76c1582f171ff452ad2ca75e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r13a728994c60be5b5a7049282b5c926dac1fc6a9a0b2362f6adfa573@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2236fdf99ac3efbfc36c2df96d3a88f822baa6f45e13fec7ff558e34@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/rb1de6ba50a468e9baff32a249edaa08f6bcec7dd7cc208e25e6b48c8@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r1c783d3d81ba62f3381a17a4d6c826f7dead3a132ba42349c90df075@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r9d7356f209ee30d702b6a921c866564eb2e291b126640c7ab70feea7@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rb2f1c7fd3d3ea719dfac4706a80e6affddecae8663dda04e1335347f@%3Ccommits.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r7512ae552cd9d14ab8b1bc0a7e95f2ec52ae85364f068d4034398ede@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r226c1112bb41e7cd427862d875eff9877a20a40242c2542f4dd39e4a@%3Cissues.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201023-0002/', 'https://lists.apache.org/thread.html/r2f8d33a4de07db9459fb2a98a1cd39747066137636b53f84a13e5628@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2a6600fe9afd502c04d26fd112823ec3f3c3ad1b4a289d10567a78a0@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r999f828e6e37d9e825e207471cbfd2681c3befcd7f3abd59ed87c0d5@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r8b1782d42d0a4ce573495d5d9345ad328d652c68c411ccdb245c57e3@%3Cissues.lucene.apache.org%3E', 'https://mail-archives.us.apache.org/mod_mbox/www-announce/202010.mbox/%3CCAECwjAWCVLoVaZy%3DTNRQ6Wk9KWVxdPRiGS8NT%2BPHMJCxbbsEVg%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5557641fcf5cfd99260a7037cfbc8788fb546b72c98a900570edaa2e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r853fdc6d0b91d5e01a26c7bd5becb044ad775a231703d634ca5d55c9@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13957', 'https://lists.apache.org/thread.html/rf1a32f00017e83ff29a74be2de02e28e4302dddb5f14c624e297a8c0@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r622a043c2890327f8a4aea16b131e8a7137a282a004614369fceb224@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r3d1e24a73e6bffa1d6534e1f34c8f5cbd9999495e7d933640f4fa0ed@%3Cissues.lucene.apache.org%3E'}
null
Maven
GHSA-7hfm-57qf-j43q
Excessive Iteration in Compress
When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package.
{'CVE-2021-35515'}
2022-04-26T18:17:07.050693Z
2021-08-02T16:55:07Z
HIGH
null
{'CWE-835', 'CWE-834'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/1', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rbaea15ddc5a7c0c6b66660f1d6403b28595e2561bb283eade7d7cd69@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35515', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-3mcp-9wr4-cjqf
Remote Code Execution (RCE) vulnerability in dropwizard-validation
Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. ### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended. ### Impact This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**. ### Patches The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions. ### Workarounds If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html). Example: ```java @SelfValidation public void validateFullName(ViolationCollector col) { if (fullName.contains("_")) { // Sanitize fullName variable by escaping relevant characters such as "$" col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName)); } } ``` See also: https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98 ### References * https://github.com/dropwizard/dropwizard/pull/3157 * https://github.com/dropwizard/dropwizard/pull/3160 * https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm * https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions * https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation ### For more information If you have any questions or comments about this advisory: * Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new) * Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev) ### Security contact If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy): https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability
{'CVE-2020-5245'}
2022-04-25T23:17:01.669512Z
2020-02-24T17:27:27Z
HIGH
null
{'CWE-74'}
{'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245', 'https://github.com/dropwizard/dropwizard/pull/3157', 'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm', 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-54g4-5cf6-hjp3
Exposure of Sensitive Information to an Unauthorized Actor and Observable Timing Discrepancy in Apache Hive
Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
{'CVE-2020-1926'}
2022-03-03T05:13:48.065959Z
2022-02-09T00:48:54Z
MODERATE
null
{'CWE-200', 'CWE-208'}
{'https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1926', 'https://issues.apache.org/jira/browse/HIVE-22708'}
null
Maven
GHSA-5v34-g2px-j4fw
Improper Handling of Length Parameter Inconsistency in Apache Ant
When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected.
{'CVE-2021-36374'}
2022-04-22T16:02:00.445429Z
2021-08-02T16:56:31Z
MODERATE
null
{'CWE-130'}
{'https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210819-0007/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://ant.apache.org/security.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36374'}
null
Maven
GHSA-rvh4-g2rj-hr9c
Path Traversal in Jenkins Warnings Next Generation Plugin
Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
{'CVE-2022-23107'}
2022-01-20T14:51:23Z
2022-01-21T23:38:05Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23107', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2090', 'https://github.com/jenkinsci/warnings-ng-plugin', 'https://github.com/jenkinsci/warnings-ng-plugin/releases/tag/v9.10.3', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'}
null
Maven
GHSA-7qx4-pp76-vrqh
Remote code execution in Apache Commons Configuration
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
{'CVE-2020-1953'}
2022-03-03T05:13:45.634364Z
2020-05-21T19:08:08Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641', 'https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'}
null
Maven
GHSA-xmvg-w4f9-99r7
Moderate severity vulnerability that affects org.bedework.caleng:bw-calendar-engine
bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server.
{'CVE-2018-1000836'}
2022-03-03T05:13:56.200799Z
2018-12-20T22:02:51Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/Bedework/bw-calendar-engine/issues/3', 'https://github.com/advisories/GHSA-xmvg-w4f9-99r7', 'https://github.com/Bedework/bw-calendar-engine', 'https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000836'}
null
Maven
GHSA-3h68-wvv6-8r5h
Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak
The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.
{'CVE-2020-1940'}
2022-03-03T05:11:46.565373Z
2021-12-10T17:20:11Z
HIGH
null
{'CWE-200', 'CWE-212'}
{'http://www.openwall.com/lists/oss-security/2020/01/28/1', 'https://lists.apache.org/thread.html/rba884dbe733781cbaaffa28b77bc37a6a9f948b3a72a1bdad5e1587c@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r601637e38ee743e845856a4e24915cb8db26ae80ca782bef91989cbc@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r45b0e2fb6ac51c5a03952b08b5e0efde1249ecb809884cc87eb0bd99@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rc35a57ecdeae342d46f729d6bc9750ba860c101f450cc171798dba28@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ra6b3e78f5ed545c1d859d664f66c6d3fc5d731d9b1d842349654e4f0@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb3023cfd45441b570c1abaa347d0cac78df97b5d3f27d674d01b3d2a@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r3da8e2fd253ecd4d3a0de71ce255631148b54be8500225b5812f7737@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0%40%3Cusers.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rbef4701b5ce4d827182e70ad7b4d987a9157682ba3643e05a9ef5a7b@%3Ccommits.jackrabbit.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1940', 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0@%3Cannounce.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ra295f919586b19def7cc7713d9d78595507d5f703362fccb779eeeb9@%3Coak-commits.jackrabbit.apache.org%3E'}
null
Maven
GHSA-m738-3rc4-5xv3
A user without PR can reset user authentication failures information
### Impact The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have. Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks. ### Patches The problem has been patched in version 12.6.8, 12.10.4 and 13.0. ### Workarounds There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged. ### References https://jira.xwiki.org/browse/XWIKI-18276 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [the security mailing-list](mailto:security@xwiki.org)
{'CVE-2021-32729'}
2021-07-02T16:44:24Z
2021-07-02T19:19:31Z
LOW
null
{'CWE-693', 'CWE-287'}
{'https://jira.xwiki.org/browse/XWIKI-18276', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m738-3rc4-5xv3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32729'}
null
Maven
GHSA-gc37-9g7f-96fx
Exposure of sensitive information in Apache Ozone
In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.
{'CVE-2021-41532'}
2021-11-22T18:38:16Z
2021-11-23T18:17:50Z
MODERATE
null
{'CWE-668'}
{'http://www.openwall.com/lists/oss-security/2021/11/19/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41532', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3Ce0bc6598-9669-b897-fc28-de8a896e36aa%40apache.org%3E'}
null
Maven
GHSA-8grg-q944-cch5
SQL Injection in Hibernate ORM
A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks.
{'CVE-2019-14900'}
2022-05-03T02:28:28Z
2022-02-10T23:05:04Z
MODERATE
null
{'CWE-89'}
{'https://security.netapp.com/advisory/ntap-20220210-0020/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14900', 'https://bugzilla.redhat.com/show_bug.cgi?id=1666499', 'https://github.com/infinispan/infinispan', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E'}
null
Maven
GHSA-9gwx-9cwp-5c2m
Billion laughs attack (XML bomb)
### Impact Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. Consider an XML file (`createMediaPackage.xml`) like this: ```xml <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!DOCTYPE lolz [ <!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. "> <!ELEMENT title (#PCDATA)> <!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"> <!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;"> <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"> <!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;"> <!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;"> ]> <mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z"> <title>&lol5;</title> <media/> <metadata/> <attachments/> <publications/> </mediapackage> ``` Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory: ```sh curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \ -F 'mediapackage=<createMediaPackage.xml' \ -F sourceFlavors="" \ -F sourceTags="" \ -F deleteExternal="" \ -F tagsAndFlavor='' \ -o out.xml ``` Additional notes: - You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text. - Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system. - To exploit this, users need to have ingest privileges, limiting the group of potential attackers ### Patches The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch. ### Workarounds There is no known workaround for this issue. ### References - [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack) - For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________ ### For more information If you have any questions or comments about this advisory: - Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) - Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2021-32623'}
2022-03-03T05:13:31.179791Z
2021-06-17T20:11:35Z
HIGH
null
{'CWE-776'}
{'https://github.com/opencast/opencast', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m', 'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e'}
null
Maven
GHSA-2q8x-2p7f-574v
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html). ### Credits Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39153'}
2022-04-22T15:47:05.177863Z
2021-08-25T14:46:49Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39153', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v', 'https://x-stream.github.io/CVE-2021-39153.html'}
null
Maven
GHSA-jfvx-7wrx-43fh
XStream vulnerable to an Arbitrary File Deletion on the local host when unmarshalling
### Impact The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15. ### Workarounds The reported vulnerability does only exist with a JAX-WS runtime on the classpath. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use. Users of XStream 1.4.14 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString") || type == java.lang.Void.class || void.class || Proxy.isProxy(type)) || type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream")); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26259'}
2022-03-03T05:14:01.049904Z
2020-12-21T16:28:26Z
MODERATE
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26259', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-4828', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://x-stream.github.io/CVE-2020-26259.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh', 'https://github.com/x-stream/xstream'}
null
Maven
GHSA-hp5x-rqf7-43vf
Improper Handling of Exceptional Conditions and Improper Input Validation in Reactor Netty
Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response.
{'CVE-2020-5403'}
2021-04-22T20:27:06Z
2022-02-10T20:24:21Z
MODERATE
null
{'CWE-755', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5403', 'https://pivotal.io/security/cve-2020-5403'}
null
Maven
GHSA-59jw-jqf4-3wq3
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21344'}
2022-03-03T05:13:20.496632Z
2021-03-22T23:28:23Z
MODERATE
null
{'CWE-502', 'CWE-434'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/security.html#workaround', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-21344.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}
null
Maven
GHSA-2cfc-865j-gm4w
XML External Entity Reference in detekt
Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.
{'CVE-2022-0272'}
2022-04-26T13:15:13.219611Z
2022-04-22T00:00:36Z
HIGH
null
{'CWE-611'}
{'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395', 'https://github.com/detekt/detekt', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44'}
null
Maven
GHSA-7fm6-2qw4-g3x3
High severity vulnerability that affects ro.pippo:pippo-core
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
{'CVE-2018-18628'}
2022-03-03T05:12:58.852106Z
2018-10-24T19:46:20Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/advisories/GHSA-7fm6-2qw4-g3x3', 'https://github.com/pippo-java/pippo', 'https://github.com/pippo-java/pippo/issues/458', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18628'}
null
Maven
GHSA-63qc-p2x4-9fgf
Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library
In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.
{'CVE-2019-11777'}
2022-03-03T05:13:18.735733Z
2019-09-17T22:47:11Z
MODERATE
null
{'CWE-755', 'CWE-346'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11777', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934'}
null
Maven
GHSA-9h9c-f287-c6vp
High severity vulnerability that affects org.apache.syncope:syncope-core
A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed.
{'CVE-2018-17184'}
2022-03-03T05:14:05.074411Z
2018-11-06T23:16:18Z
MODERATE
null
{'CWE-799'}
{'https://github.com/advisories/GHSA-9h9c-f287-c6vp', 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184'}
null
Maven
GHSA-6jmm-mp6w-4rrg
OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser
### Impact NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0. ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/HtmlUnit/htmlunit-neko](https://github.com/HtmlUnit/htmlunit-neko) * Email us at [rbri at rbri.de]
{'CVE-2022-29546'}
2022-05-02T20:06:31.677428Z
2022-04-26T21:14:57Z
MODERATE
null
{'CWE-400'}
{'https://github.com/HtmlUnit/htmlunit-neko', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg', 'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546'}
null
Maven
GHSA-gprm-xqrc-c2j3
Command Injection in Kylin
Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
{'CVE-2020-1956'}
2022-03-03T05:13:34.310834Z
2020-07-27T22:51:44Z
HIGH
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E', 'https://github.com/apache/kylin', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956', 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706', 'https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/07/14/1', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E', 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}
null
Maven
GHSA-hx5g-8hq2-8x4w
SQL Injection in Kylin
Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0.
{'CVE-2020-13926'}
2022-03-03T05:13:43.750791Z
2020-07-27T22:51:40Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13926', 'https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584374', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}
null
Maven
GHSA-gf2v-9hp6-44qg
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through.
{'CVE-2016-3083'}
2022-03-03T05:12:19.255004Z
2019-03-14T15:40:32Z
HIGH
null
{'CWE-295'}
{'https://github.com/advisories/GHSA-gf2v-9hp6-44qg', 'http://www.securityfocus.com/bid/98669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3083', 'https://lists.apache.org/thread.html/0851bcf85635385f94cdaa008053802d92b4aab0a3075e30ed171192@%3Cdev.hive.apache.org%3E'}
null
Maven
GHSA-px4w-rcv2-6x8x
Arbitrary code execution in Apache ServiceComb java-chassis
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
{'CVE-2020-17532'}
2022-03-03T05:13:16.049601Z
2022-02-09T22:19:00Z
HIGH
null
{'CWE-502'}
{'https://seclists.org/oss-sec/2021/q1/60', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838', 'https://issues.apache.org/jira/browse/SCB-2145', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532', 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c'}
null
Maven
GHSA-px9h-x66r-8mpc
path traversal in Jooby
### Impact Access to sensitive information available from classpath. ### Patches Patched version: 1.6.7 and 2.8.2 Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009 Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References Latest 1.x version: 1.6.6 #### Arbitrary class path resource access 1 When sharing a *File System* directory as in: ``` java assets("/static/**", Paths.get("static")); ``` The class path is also searched for the file (`org.jooby.handlers.AssetHandler.loader`): [jooby/AssetHandler.java at 1.x · jooby-project/jooby · GitHub](https://github.com/jooby-project/jooby/blob/1.x/jooby/src/main/java/org/jooby/handlers/AssetHandler.java) ``` java private static Loader loader(final Path basedir, final ClassLoader classloader) { if (Files.exists(basedir)) { return name -> { Path path = basedir.resolve(name).normalize(); if (Files.exists(path) && path.startsWith(basedir)) { try { return path.toUri().toURL(); } catch (MalformedURLException x) { // shh } } return classloader.getResource(name); }; } return classloader::getResource; } ``` If we send `/static/WEB-INF/web.xml` it will fail to load it from the file system but will go into `classloader.getResource(name)` where name equals `/WEB-INF/web.xml` so will succeed and return the requested file. This way we can get any configuration file or even the application class files If assets are configured for a certain extension we can still bypass it. eg: ```java assets("/static/**/*.js", Paths.get("static")); ``` We can send: ``` http://localhost:8080/static/io/yiss/App.class.js ``` #### Arbitrary class path resource access 2 This vulnerability also affects assets configured to access resources from the root of the class path. eg: ```java assets("/static/**"); ``` In this case we can traverse `static` by sending: ``` http://localhost:8080/static/..%252fio/yiss/App.class ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [jooby](https://github.com/jooby-project/jooby/issues) * Email us at [support@jooby.io](mailto:support@jooby.io)
{'CVE-2020-7647'}
2022-03-03T05:13:34.682100Z
2020-05-13T16:29:26Z
MODERATE
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807,', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806', 'https://github.com/jooby-project/jooby', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806,', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc', 'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'}
null
Maven
GHSA-269m-695x-j34p
Moderate severity vulnerability that affects org.apache.qpid:qpid-broker
In Apache Qpid Broker-J 0.18 through 0.32, if the broker is configured with different authentication providers on different ports one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP port into using an authentication provider that was configured on a different port. The attacker still needs valid credentials with the authentication provider on the spoofed port. This becomes an issue when the spoofed port has weaker authentication protection (e.g., anonymous access, default accounts) and is normally protected by firewall rules or similar which can be circumvented by this vulnerability. AMQP ports are not affected. Versions 6.0.0 and newer are not affected.
{'CVE-2017-15702'}
2022-03-03T05:12:56.022517Z
2018-10-19T16:41:04Z
CRITICAL
null
null
{'https://qpid.apache.org/cves/CVE-2017-15702.html', 'https://lists.apache.org/thread.html/59d241e30db23b8b0af26bb273f789aa1f08515d3dc1a3868d3ba090@%3Cdev.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-269m-695x-j34p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15702', 'https://issues.apache.org/jira/browse/QPID-8039', 'http://www.securityfocus.com/bid/102040'}
null
Maven
GHSA-wqfh-9m4g-7x6x
Remote code execution in Apache ActiveMQ
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13
{'CVE-2020-11998'}
2021-06-15T19:11:50Z
2022-02-09T22:14:58Z
CRITICAL
null
{'CWE-94'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11998', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'}
null
Maven
GHSA-5phw-3jrp-3vj8
Server-Side Request Forgery in Apache Solr
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
{'CVE-2021-27905'}
2022-03-03T05:13:38.631977Z
2021-05-10T15:18:06Z
HIGH
null
{'CWE-918'}
{'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27905', 'https://lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430@%3Cnotifications.ofbiz.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0009/', 'https://lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}
null
Maven
GHSA-jp55-vvmf-63mv
URL Redirection to Untrusted Site ('Open Redirect')
### Impact There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections. ### Patches The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. ### Workarounds There's no known workaround for this issue. ### References https://jira.xwiki.org/browse/XWIKI-10309 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [Security ML](mailto:security@xwiki.org)
{'CVE-2022-23618'}
2022-02-09T21:42:47Z
2022-02-09T21:42:47Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23618', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv', 'https://jira.xwiki.org/browse/XWIKI-10309', 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'}
null
Maven
GHSA-mc6h-4qgp-37qh
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
{'CVE-2020-14195'}
2022-03-03T05:12:46.699406Z
2020-06-18T14:44:43Z
HIGH
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14195', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2765', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-p4q6-qxjx-8jgp
Directory Traversal in spring-boot-actuator-logview
### Impact The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). ### Patches The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. ### Workarounds There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [github repo](https://github.com/lukashinsch/spring-boot-actuator-logview)
{'CVE-2021-21234'}
2022-03-03T05:13:40.104264Z
2021-01-05T17:29:40Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21234', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/lukashinsch/spring-boot-actuator-logview/security/advisories/GHSA-p4q6-qxjx-8jgp', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://search.maven.org/artifact/eu.hinsch/spring-boot-actuator-logview'}
null
Maven
GHSA-mq8p-h798-xcrp
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications.
{'CVE-2017-15718'}
2022-03-03T05:11:45.099308Z
2018-12-21T17:50:20Z
CRITICAL
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-mq8p-h798-xcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15718', 'https://lists.apache.org/thread.html/773c93c2d8a6a52bbe97610c2b1c2ad205b970e1b8c04fb5b2fccad6@%3Cgeneral.hadoop.apache.org%3E'}
null
Maven
GHSA-gjmw-vf9h-g25v
Polymorphic typing issue
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload.
{'CVE-2019-17531'}
2022-03-03T05:12:54.138992Z
2019-11-13T00:32:38Z
CRITICAL
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://security.netapp.com/advisory/ntap-20191024-0005/', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17531', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4192', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://github.com/FasterXML/jackson-databind/issues/2498'}
null
Maven
GHSA-wmv4-5w76-vp9g
Authorization Bypass in Spring Security
When using Spring Security's CAS Proxy ticket authentication a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request. This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed. If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users. ## Mitigation Users of affected versions should apply the following mitigation: - Users of 3.2x should upgrade to 3.2.5 or later - Users of 3.1.x should upgrade to 3.1.7 or later ## Credit This issue was identified by David Ohsie and brought to our attention by the CAS Development team.
{'CVE-2014-3527'}
2022-03-03T05:14:07.635573Z
2020-09-15T20:16:22Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/spring-projects/spring-security/issues/2907', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3527', 'https://pivotal.io/security/cve-2014-3527', 'https://github.com/spring-projects/spring-security/'}
null
Maven
GHSA-r32r-3977-cgc3
Moderate severity vulnerability that affects org.keycloak:keycloak-core
JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
{'CVE-2014-3651'}
2022-03-03T05:14:10.638311Z
2018-10-18T16:50:20Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3651', 'https://bugzilla.redhat.com/show_bug.cgi?id=1144278', 'https://github.com/advisories/GHSA-r32r-3977-cgc3', 'https://issues.jboss.org/browse/KEYCLOAK-699'}
null
Maven
GHSA-9p5g-vg43-mj5r
Authenticated users can read data from other sources than intended
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
{'CVE-2021-36749'}
2022-03-03T05:14:17.608090Z
2021-09-27T20:13:25Z
MODERATE
null
{'CWE-863', 'CWE-668'}
{'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36749', 'https://github.com/advisories/GHSA-793h-6f7r-6qvm', 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E'}
null
Maven
GHSA-c8hm-7hpq-7jhg
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.
{'CVE-2018-19362'}
2022-03-03T05:12:53.415813Z
2019-01-04T19:07:03Z
HIGH
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-c8hm-7hpq-7jhg', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'}
null
Maven
GHSA-r28m-g6j9-r2h5
Information Exposure vulnerability in Eclipse Jetty
In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories.
{'CVE-2019-10246'}
2022-03-03T05:14:14.553753Z
2019-04-23T16:07:18Z
MODERATE
null
{'CWE-200', 'CWE-213'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546576', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10246', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-x5x7-3v85-wpc4
Apache Struts allows entering a custom URL in a form field if built-in URLValidator is used
In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672.
{'CVE-2017-9804'}
2022-04-26T19:15:45.732201Z
2018-10-16T19:37:33Z
HIGH
null
{'CWE-20'}
{'http://www.securityfocus.com/bid/100612', 'https://security.netapp.com/advisory/ntap-20180629-0001/', 'https://struts.apache.org/docs/s2-050.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9804', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'https://github.com/advisories/GHSA-x5x7-3v85-wpc4', 'http://www.securitytracker.com/id/1039261', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}
null
Maven
GHSA-838r-hvwh-24h8
XML Injection in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions < 2.5. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access.
{'CVE-2021-38555'}
2022-03-03T05:12:31.604414Z
2021-09-13T20:06:31Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/apache/any23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38555', 'https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E'}
null
Maven
GHSA-5r5r-6hpj-8gg9
Serialization gadget exploit in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
{'CVE-2020-35728'}
2022-02-08T21:39:40Z
2021-12-09T19:15:24Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35728', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20210129-0007/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2999'}
null
Maven
GHSA-j3f7-7rmc-6wqj
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.
{'CVE-2021-40831'}
2022-03-03T05:14:12.538986Z
2021-11-24T20:35:03Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40831', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2'}
null
Maven
GHSA-c32g-2mgr-cfq7
Out-of-bounds Write in iText
iText v7.1.17 was discovered to contain a stack-based buffer overflow via the component ByteBuffer.append, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
{'CVE-2022-24197'}
2022-04-17T17:16:55.474006Z
2022-02-02T00:01:45Z
MODERATE
null
{'CWE-787'}
{'https://github.com/itext/itext7/pull/78', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24197', 'https://github.com/itext/itext7', 'https://github.com/itext/itext7/pull/78#issuecomment-1089282165'}
null
Maven
GHSA-xv7x-x6wr-xx7g
Moderate severity vulnerability that affects org.apache.ranger:ranger
Apache Ranger before 0.6.3 policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true.
{'CVE-2016-8746'}
2022-03-03T05:14:20.606890Z
2018-10-17T17:22:05Z
MODERATE
null
{'CWE-426'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8746', 'https://github.com/advisories/GHSA-xv7x-x6wr-xx7g', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'http://www.securityfocus.com/bid/95998'}
null
Maven
GHSA-jxm5-5xcw-h57q
Moderate severity vulnerability that affects org.exist-db:exist-core
exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
{'CVE-2018-1000823'}
2022-03-03T05:14:12.313213Z
2018-12-20T22:02:17Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-jxm5-5xcw-h57q', 'https://github.com/eXist-db/exist/issues/2180', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823', 'https://0dd.zone/2018/10/27/exist-XXE/'}
null
Maven
GHSA-rcvx-rmvf-mxch
Cross-site Scripting in Eclipse Hawkbit
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
{'CVE-2020-27219'}
2022-03-03T05:13:16.547284Z
2022-02-09T22:19:44Z
MODERATE
null
{'CWE-79'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289', 'https://github.com/eclipse/hawkbit/issues/1067', 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27219'}
null
Maven
GHSA-w5rh-j4g3-jr29
Missing Authorization in Jenkins S3 publisher Plugin
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles.
{'CVE-2021-21651'}
2021-05-19T18:59:06Z
2021-06-16T17:29:17Z
MODERATE
null
{'CWE-862'}
{'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'}
null
Maven
GHSA-4v6p-cxf9-98rf
Allocation of Resources Without Limits or Throttling in metadata-extractor
When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.
{'CVE-2022-24614'}
2022-03-07T20:48:01.955707Z
2022-02-25T00:01:05Z
MODERATE
null
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24614', 'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://github.com/drewnoakes/metadata-extractor'}
null
Maven
GHSA-395w-qhqr-9fr6
Path Traversal in Apache Flink
A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master.
{'CVE-2020-17519'}
2022-03-03T05:14:12.693861Z
2021-01-06T20:01:34Z
MODERATE
null
{'CWE-22', 'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17519', 'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E', 'http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html', 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/05/2', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E'}
null