ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-c8xf-m4ff-jcxj | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate. | {'CVE-2016-1000339'} | 2022-03-03T05:13:14.245841Z | 2018-10-17T16:23:38Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-c8xf-m4ff-jcxj', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000339', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'} | null |
Maven | GHSA-9f3j-pm6f-9fm5 | Race condition in Apache Tomcat | The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. | {'CVE-2022-23181'} | 2022-04-22T15:47:12.949291Z | 2022-02-01T00:45:44Z | HIGH | null | {'CWE-367'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23181', 'https://github.com/apache/tomcat', 'https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9', 'https://security.netapp.com/advisory/ntap-20220217-0010/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-g5wh-fw4m-2v28 | CSRF vulnerability in Jenkins autonomiq plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials. | {'CVE-2022-25194'} | 2022-05-04T20:57:40Z | 2022-02-16T00:01:23Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25194', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545'} | null |
Maven | GHSA-8h77-3xwr-hqhh | Cross-site scripting in Jenkins Kiuwan Plugin | Jenkins Kiuwan Plugin 1.6.0 and earlier does not escape query parameters in an error message for a form validation endpoint, resulting in a reflected cross-site scripting (XSS) vulnerability. | {'CVE-2021-21666'} | 2021-06-16T20:03:17Z | 2021-06-16T17:10:50Z | MODERATE | null | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2021/06/10/14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21666', 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-2367'} | null |
Maven | GHSA-cp67-8w3w-6h9c | Path Traversal | A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw | {'CVE-2020-14366'} | 2022-03-03T05:13:36.404235Z | 2022-02-09T00:58:03Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-14366', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14366'} | null |
Maven | GHSA-rhg5-fqr3-hrf5 | Injection in DeltaSpike | we got reports for 2 injection attacks against the DeltaSpike windowhandler.js. This is only active if a developer selected the ClientSideWindowStrategy which is not the default. | {'CVE-2019-12416'} | 2022-03-03T05:13:35.690550Z | 2022-02-10T20:54:31Z | MODERATE | null | {'CWE-74'} | {'https://lists.apache.org/thread.html/r848d7d4c0bf637da55f01103eb8ba0fce344c295fda53264cbaa1568@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r8f327712b2b07f867fde1e77cbafcf8cc6a3facaa693ffdd2c3285e3%40%3Cdev.deltaspike.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12416'} | null |
Maven | GHSA-2mp8-qvqm-3xwq | Restlet Framework, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request | Restlet Framework before 2.3.11, when using SimpleXMLProvider, allows remote attackers to access arbitrary files via an XXE attack in a REST API HTTP request. This affects use of the Jax-rs extension. | {'CVE-2017-14868'} | 2022-04-26T21:37:35Z | 2018-10-17T00:04:31Z | HIGH | null | {'CWE-611'} | {'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://github.com/restlet/restlet-framework-java/issues/1286', 'https://lgtm.com/blog/restlet_CVE-2017-14868', 'https://github.com/advisories/GHSA-2mp8-qvqm-3xwq', 'https://github.com/restlet/restlet-framework-java', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14868'} | null |
Maven | GHSA-vx85-mj8c-4qm6 | Moderate severity vulnerability that affects org.apache.thrift:libthrift | The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path. | {'CVE-2018-11798'} | 2022-03-03T05:13:51.597398Z | 2019-01-17T13:56:33Z | MODERATE | null | {'CWE-538'} | {'https://access.redhat.com/errata/RHSA-2019:1545', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6', 'http://www.securityfocus.com/bid/106501', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E'} | null |
Maven | GHSA-f3j5-rmmp-3fc5 | Improper Input Validation in jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. | {'CVE-2019-17267'} | 2022-03-03T05:13:48.664403Z | 2020-06-15T18:44:48Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r9d727fc681fb3828794acbefcaee31393742b4d73a29461ccd9597a8@%3Cdev.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://github.com/FasterXML/jackson-databind', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.3...jackson-databind-2.9.10', 'https://github.com/FasterXML/jackson-databind/issues/2460', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17267'} | null |
Maven | GHSA-59g9-7gfx-c72p | Infinite loop in Tomcat due to parsing error | Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. | {'CVE-2021-41079'} | 2022-03-03T05:12:12.505852Z | 2021-09-20T20:45:44Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41079', 'https://github.com/apache/tomcat', 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html', 'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0', 'https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211008-0005/', 'https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4986'} | null |
Maven | GHSA-42j4-733x-5vcf | Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7 | Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2020-36320 | {'CVE-2020-36320'} | 2022-03-03T05:13:38.711805Z | 2021-04-19T14:49:32Z | HIGH | null | {'CWE-400'} | {'https://github.com/vaadin/framework/issues/7757', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320', 'https://vaadin.com/security/cve-2020-36320', 'https://github.com/vaadin/framework/pull/12104', 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf'} | null |
Maven | GHSA-p5pg-wm9q-8v6r | Improper Handling of Exceptional Conditions inn metadata-extractor | metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library. | {'CVE-2022-24613'} | 2022-03-07T20:47:57.809554Z | 2022-02-25T00:01:05Z | MODERATE | null | {'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24613', 'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://github.com/drewnoakes/metadata-extractor'} | null |
Maven | GHSA-cq9c-55r7-455x | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf | In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised. | {'CVE-2018-11787'} | 2022-03-03T05:13:47.579948Z | 2019-01-07T19:14:51Z | HIGH | null | {'CWE-287'} | {'https://issues.apache.org/jira/browse/KARAF-4993', 'https://github.com/advisories/GHSA-cq9c-55r7-455x', 'http://karaf.apache.org/security/cve-2018-11787.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787', 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'} | null |
Maven | GHSA-729f-wvj3-c4pj | Remote code execution in UReport | An arbitrary file creation vulnerability in UReport 2.2.9 allows attackers to execute arbitrary code. | {'CVE-2020-21125'} | 2022-03-03T05:14:06.464215Z | 2021-09-20T20:45:03Z | HIGH | null | {'CWE-22'} | {'https://github.com/youseries/ureport/issues/485', 'https://github.com/youseries/ureport', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21125'} | null |
Maven | GHSA-g86w-v5vg-9gxf | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. | {'CVE-2020-5405'} | 2022-03-03T05:13:14.864992Z | 2020-06-05T16:11:36Z | MODERATE | null | {'CWE-22', 'CWE-23'} | {'https://pivotal.io/security/cve-2020-5405', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5405', 'https://github.com/spring-cloud/spring-cloud-config/spring-cloud-config-server'} | null |
Maven | GHSA-xwgq-pcqx-hpmv | URL Redirection to Untrusted Site (Open Redirect) in Ktor | In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | {'CVE-2019-19703'} | 2022-03-03T05:13:14.265291Z | 2020-02-12T18:45:50Z | MODERATE | null | {'CWE-601'} | {'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703', 'https://github.com/ktorio/ktor/issues/1467'} | null |
Maven | GHSA-8rx6-v5q4-xw3j | XML External Entity Reference in Jenkins Coverage/Complexity Scatter Plot Plugin | Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2022-28154'} | 2022-04-07T22:01:59.794941Z | 2022-03-30T00:00:23Z | HIGH | null | {'CWE-611'} | {'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28154', 'https://github.com/jenkinsci/covcomplplot-plugin'} | null |
Maven | GHSA-rcj2-vvjx-87pm | Missing Encryption of Sensitive Data in arrow-kt Arrow | arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack. | {'CVE-2019-11404'} | 2022-03-03T05:13:24.756571Z | 2019-04-22T17:15:40Z | MODERATE | null | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-11404', 'https://github.com/arrow-kt/ank/issues/35', 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8', 'https://github.com/arrow-kt/ank/pull/36', 'https://github.com/arrow-kt/arrow/issues/1310', 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0'} | null |
Maven | GHSA-6hgm-866r-3cjv | Insecure Deserialization in Apache Commons Collection | Serialized-object interfaces in Java applications using the Apache Commons Collections (ACC) library may allow remote attackers to execute arbitrary commands via a crafted serialized Java object. | {'CVE-2015-6420'} | 2022-03-03T05:12:29.230823Z | 2020-06-15T20:36:20Z | HIGH | null | null | {'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-java-deserialization', 'https://www.tenable.com/security/research/tra-2017-23', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6420', 'https://www.tenable.com/security/research/tra-2017-14', 'https://www.kb.cert.org/vuls/id/581311', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.securityfocus.com/bid/78872'} | null |
Maven | GHSA-wc4x-4gm2-74j8 | Improper Certificate Validation in Apache Geode | When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack. | {'CVE-2019-10091'} | 2022-03-03T05:12:18.561836Z | 2022-02-10T20:51:04Z | MODERATE | null | {'CWE-295'} | {'https://lists.apache.org/thread.html/r3342077ac4798631300366be86e545d0c08753cca8fd2663867fe200%40%3Cdev.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10091'} | null |
Maven | GHSA-32xf-jwmv-9hf3 | Directory traversal attack in Spring Cloud Config | Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. | {'CVE-2020-5410'} | 2022-03-03T05:14:09.697475Z | 2020-06-05T16:13:20Z | MODERATE | null | {'CWE-23'} | {'https://tanzu.vmware.com/security/cve-2020-5410', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5410'} | null |
Maven | GHSA-gggp-gh2p-996x | Path Traversal in LemMinX | A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files is possible due to directory traversal. | {'CVE-2022-0673'} | 2022-03-02T21:56:44Z | 2022-02-19T00:01:27Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0673', 'https://github.com/eclipse/lemminx', 'https://github.com/eclipse/lemminx/pull/1171', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022'} | null |
Maven | GHSA-f94m-mqhr-mc29 | Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12 | Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of a field composed of many decimal digits. | {'CVE-2018-18853'} | 2022-03-03T05:14:04.824384Z | 2018-11-09T17:42:26Z | HIGH | null | {'CWE-400'} | {'https://github.com/spray/spray-json/issues/278', 'https://github.com/spray/spray-json', 'https://github.com/advisories/GHSA-f94m-mqhr-mc29', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18853'} | null |
Maven | GHSA-64x2-gq24-75pv | Cross-site scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573. | {'CVE-2020-13954'} | 2022-04-22T17:30:30.545101Z | 2021-04-22T16:15:23Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210513-0010/', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
Maven | GHSA-m72m-mhq2-9p6c | Uncaught Exception in jsoup | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Those using jsoup to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Users should upgrade to jsoup 1.14.2
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Users may rate limit input parsing. Users should limit the size of inputs based on system resources. Users should implement thread watchdogs to cap and timeout parse runtimes.
| {'CVE-2021-37714'} | 2022-04-22T15:47:31.197354Z | 2021-08-23T19:42:38Z | HIGH | null | {'CWE-835', 'CWE-248'} | {'https://lists.apache.org/thread.html/r3d71f18adb78e50f626dde689161ca63d3b7491bd9718fcddfaecba7@%3Cissues.maven.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37714', 'https://lists.apache.org/thread.html/r215009dbf7467a9f6506d0c0024cb36cad30071010e62c9352cfaaf0@%3Cissues.maven.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r50e9c9466c592ca9d707a5dea549524d19e3287da08d8392f643960e@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r685c5235235ad0c26e86d0ee987fb802c9675de6081dbf0516464e0b@%3Cnotifications.james.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0022/', 'https://lists.apache.org/thread.html/r377b93d79817ce649e9e68b3456e6f499747ef1643fa987b342e082e@%3Cissues.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rc3354080fc67fb50b45b3c2d12dc4ca2a3c1c78dad3d3ba012c038aa@%3Cnotifications.james.apache.org%3E', 'https://github.com/jhy/jsoup', 'https://jsoup.org/news/release-1.14.1', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r97404676a5cf591988faedb887d64e278f522adcaa823d89ca69defe@%3Cnotifications.james.apache.org%3E', 'https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c', 'https://jsoup.org/news/release-1.14.2'} | null |
Maven | GHSA-cfw5-v7cw-69cw | Critical severity vulnerability that affects org.apache.directory.api:apache-ldap-api | In Apache LDAP API before 1.0.2, a bug in the way the SSL Filter was setup made it possible for another thread to use the connection before the TLS layer has been established, if the connection has already been used and put back in a pool of connections, leading to leaking any information contained in this request (including the credentials when sending a BIND request). | {'CVE-2018-1337'} | 2022-03-03T05:11:29.256013Z | 2018-11-09T17:49:49Z | CRITICAL | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/d66081195e9a02ee7cc20fb243b60467d1419586eed28297d820768f@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r56b304fb9960c869995efbb31da3b9b7c6d53ee31f7f7048eb80434b@%3Cdev.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-cfw5-v7cw-69cw', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1337', 'https://lists.apache.org/thread.html/r4da40aa50cfdb2158898f2bc6df81feec1d42c6a06db6537d5cc0496@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r55e74532e7f9e84ecfa56b4e0a50a5fe0ba6f7a76880520e4400b0d7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1a258430d820a90ff9d4558319296cc517ff2252327d7b3546d16749@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1815fb5b0c345f571c740e7a1b48d7477647edd4ffcf9d5321e69446@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0e645b3f6ca977dc60b7cec231215c59a9471736c2402c1fef5a0616@%3Cjira.kafka.apache.org%3E', 'http://www.securityfocus.com/bid/104744'} | null |
Maven | GHSA-vf77-8h7g-gghp | Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat | An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. | {'CVE-2020-13934'} | 2022-03-03T05:14:04.600393Z | 2022-02-08T22:05:00Z | HIGH | null | {'CWE-119', 'CWE-476'} | {'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13934', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://security.netapp.com/advisory/ntap-20200724-0003/', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://usn.ubuntu.com/4596-1/', 'https://www.debian.org/security/2020/dsa-4727', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-52vv-3vf7-f7wh | Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX | A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file. | {'CVE-2022-0671'} | 2022-03-02T21:57:09Z | 2022-02-19T00:01:28Z | CRITICAL | null | {'CWE-918', 'CWE-400'} | {'https://github.com/eclipse/lemminx', 'https://github.com/redhat-developer/vscode-xml/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2022', 'https://github.com/eclipse/lemminx/issues/1169', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0671'} | null |
Maven | GHSA-q4hg-rmq2-52q9 | Improper Locking in Apache Tomcat | The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. | {'CVE-2019-10072'} | 2022-03-03T05:12:48.650139Z | 2019-06-26T01:09:40Z | MODERATE | null | {'CWE-667'} | {'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K17321505', 'https://www.synology.com/security/advisory/Synology_SA_19_29', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190625-0002/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10072', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'http://www.securityfocus.com/bid/108874', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://www.debian.org/security/2020/dsa-4680', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://usn.ubuntu.com/4128-2/', 'https://usn.ubuntu.com/4128-1/', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-5679-7qrc-5m7j | IDOR can reveal execution data and logs to unauthorized user in Rundeck | ### Impact
Authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see.
> Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher.
### Details
An authenticated user could craft a request to:
* View Executions and download execution logs without access to `read` or `view` the associated Job, or ad-hoc resource.
* Get the list of running executions in a project, without Event `read` access, if they have `read` access to view the project.
* View the Options definitions of a Job without access to view the Job.
* View the definition of a workflow step of a Job without access to view the Job.
* View the SCM diff of a modified Job definition if SCM is enabled, without Project `export` access level.
* View the New User Profile Form for a different username, without User `admin` access. Note: they would not be allowed to create or modify a profile for a different user, or reveal any user profile information for a different user.
Some authenticated API requests were not correctly checking appropriate authorization levels:
* The list of running Executions would be sent without `read` access to Events.
* The Plugin Input Parameters for a SCM plugin would be sent without authorization for project `import`,`scm_import`,`export`, or `scm_export` actions.
* Job Retry action could retry an execution without `read` or `view` access to the Execution, which would reveal the Execution's option values. (`run` access to the Job was still required).
### Patches
Upgrade to Rundeck version 3.2.6
### Workarounds
None
### References
[3.2.6 Release Notes](https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html)
### Report
If you have any questions or comments about this advisory:
* Email us at [security@rundeck.com](mailto:security@rundeck.com)
To report security issues to Rundeck please use the form at [http://rundeck.com/security](http://rundeck.com/security)
Reporter: Justine Osborne of Apple Information Security | {'CVE-2020-11009'} | 2022-03-03T05:12:55.832766Z | 2020-04-29T16:31:12Z | MODERATE | null | {'CWE-200', 'CWE-639'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11009', 'https://github.com/rundeck/rundeck', 'https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j'} | null |
Maven | GHSA-xwx6-vmj4-5rv8 | Denial of service via deserialization attack in nifi | A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB. | {'CVE-2017-15703'} | 2022-03-03T05:12:27.401653Z | 2019-10-25T19:42:50Z | MODERATE | null | {'CWE-502'} | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} | null |
Maven | GHSA-7wq4-89xx-g62j | Password exposure in ShenYu | The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | {'CVE-2022-23223'} | 2022-03-03T05:13:49.818603Z | 2022-01-28T22:13:57Z | HIGH | null | {'CWE-522'} | {'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/25/7', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23223', 'https://lists.apache.org/thread/q2gg6ny6lpkph7nkrvjzqdvqpm805v8s', 'http://www.openwall.com/lists/oss-security/2022/01/26/4'} | null |
Maven | GHSA-2p6p-v69p-9mm9 | XSS in login form | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form. | {'CVE-2019-13235'} | 2022-03-03T05:13:44.173532Z | 2019-11-12T22:58:16Z | MODERATE | null | {'CWE-79'} | {'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235', 'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} | null |
Maven | GHSA-9rgv-h7x4-qw8g | Moderate severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system. | {'CVE-2018-12536'} | 2022-03-03T05:14:09.556302Z | 2018-10-19T16:15:56Z | MODERATE | null | {'CWE-209'} | {'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535670', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-9rgv-h7x4-qw8g', 'http://www.securitytracker.com/id/1041194', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12536'} | null |
Maven | GHSA-hwvv-438r-mhvj | Exposure of Sensitive Information to an Unauthorized Actor | A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view. | {'CVE-2021-22134'} | 2022-04-22T17:02:00.991519Z | 2021-03-18T19:23:57Z | MODERATE | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22134', 'https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835', 'https://security.netapp.com/advisory/ntap-20210430-0006/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-ccjp-w723-2jf2 | Moderate severity vulnerability that affects org.apache.tika:tika-core | Apache Tika server (aka tika-server) in Apache Tika 1.9 might allow remote attackers to read arbitrary files via the HTTP fileUrl header. | {'CVE-2015-3271'} | 2022-03-03T05:13:43.683608Z | 2018-10-17T15:44:10Z | MODERATE | null | {'CWE-200'} | {'http://www.openwall.com/lists/oss-security/2015/08/13/5', 'https://github.com/advisories/GHSA-ccjp-w723-2jf2', 'http://www.securityfocus.com/bid/95020', 'https://lists.apache.org/thread.html/d2b3e7afb0251fac95fdee9817423cbc91e3d99a848c25a51d91c1e8@1439485507@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3271'} | null |
Maven | GHSA-v83p-xwm9-v4g8 | Injection in Apache Archiva | Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the response time for the login request, arbitrary attribute data can be retrieved from LDAP user objects. | {'CVE-2020-9495'} | 2022-03-03T05:12:51.796941Z | 2022-02-10T23:06:22Z | MODERATE | null | {'CWE-74'} | {'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cdev.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9495', 'http://www.openwall.com/lists/oss-security/2020/06/19/1', 'https://lists.apache.org/thread.html/r7ae580f700ade57b00641a70a5c639a3ba576893bbf7f9fd93bc491d@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cusers.archiva.apache.org%3E', 'http://archiva.apache.org/security.html#CVE-2020-9495'} | null |
Maven | GHSA-8gw6-w5rw-4g5c | Incorrect Default Permissions in Apache JSPWiki | Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later. | {'CVE-2021-44140'} | 2022-03-03T05:13:52.665607Z | 2021-11-29T17:59:24Z | CRITICAL | null | {'CWE-276'} | {'https://github.com/apache/jspwiki', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140', 'https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44140'} | null |
Maven | GHSA-xpmx-h7xq-xffh | Potential access control security issue in apollo-adminservice | ### Impact
If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations.
### Patches
Access control for admin service was added in #3233 and was released in [v1.7.1](https://github.com/ctripcorp/apollo/releases/tag/v1.7.1).
### Workarounds
To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet.
### Credits
[Lexu](https://github.com/lllllx) reported the issue and provided the required information to reproduce it.
### References
[Apollo Security Guidence](https://github.com/ctripcorp/apollo/wiki/Apollo%E4%BD%BF%E7%94%A8%E6%8C%87%E5%8D%97#71-%E5%AE%89%E5%85%A8%E7%9B%B8%E5%85%B3)
### For more information
If you have any questions or comments about this advisory:
* Open an [issue](https://github.com/ctripcorp/apollo/issues)
* Email to one of the active [project maintainers](https://github.com/ctripcorp/apollo/graphs/contributors) | {'CVE-2020-15170'} | 2022-03-03T05:13:32.189742Z | 2020-10-02T16:33:41Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh', 'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/ctripcorp/apollo'} | null |
Maven | GHSA-fqgw-6qj5-8hmp | Infinite Loop in Apache James | In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. | {'CVE-2021-40111'} | 2022-03-03T05:13:12.664342Z | 2022-01-08T00:40:37Z | MODERATE | null | {'CWE-835'} | {'http://www.openwall.com/lists/oss-security/2022/01/04/3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40111', 'https://www.openwall.com/lists/oss-security/2022/01/04/3'} | null |
Maven | GHSA-mj8x-cpr8-x39h | Remote code execution in Apache Tapestry | A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.2, upgrade to 5.6.3 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later. | {'CVE-2021-27850'} | 2022-03-03T05:13:14.219254Z | 2021-06-16T17:33:19Z | CRITICAL | null | {'CWE-502', 'CWE-922'} | {'https://issues.apache.org/jira/browse/TAP5-2663', 'https://lists.apache.org/thread.html/r237ff7f286bda31682c254550c1ebf92b0ec61329b32fbeb2d1c8751%40%3Cusers.tapestry.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27850', 'http://www.openwall.com/lists/oss-security/2021/04/15/1', 'https://security.netapp.com/advisory/ntap-20210528-0002/'} | null |
Maven | GHSA-77hp-pfxw-4w63 | Moderate severity vulnerability that affects org.codelibs.fess:fess | codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b. | {'CVE-2018-1000822'} | 2022-03-03T05:13:53.095728Z | 2018-12-20T22:02:09Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/codelibs/fess', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000822', 'https://0dd.zone/2018/10/27/fess-XXE/', 'https://github.com/advisories/GHSA-77hp-pfxw-4w63', 'https://github.com/codelibs/fess/issues/1851'} | null |
Maven | GHSA-j84c-j8qm-g47r | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password | The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that lack a password, which allows remote attackers to bypass authentication by leveraging knowledge of a valid username. | {'CVE-2016-0733'} | 2022-04-27T13:41:39Z | 2018-10-17T17:21:11Z | CRITICAL | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-0733', 'https://issues.apache.org/jira/browse/RANGER-835', 'https://mail-archives.apache.org/mod_mbox/ranger-dev/201602.mbox/%3CD2D9A4C5.114ECA%25vel@apache.org%3E', 'https://github.com/advisories/GHSA-j84c-j8qm-g47r', 'http://www.securityfocus.com/bid/82871', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'} | null |
Maven | GHSA-wph7-x527-w3h5 | Missing Release of Resource after Effective Lifetime in Apache Tomcat | The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. | {'CVE-2021-42340'} | 2022-04-22T15:47:45.749830Z | 2021-10-15T18:51:34Z | HIGH | null | {'CWE-772'} | {'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/tomcat', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340', 'https://www.debian.org/security/2021/dsa-5009', 'https://security.netapp.com/advisory/ntap-20211104-0001/', 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E'} | null |
Maven | GHSA-6w62-hx7r-mw68 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39154](https://x-stream.github.io/CVE-2021-39154.html).
### Credits
ka1n4t found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39154'} | 2022-04-22T15:47:21.283341Z | 2021-08-25T14:46:38Z | HIGH | null | {'CWE-502', 'CWE-434'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream', 'https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39154', 'https://x-stream.github.io/CVE-2021-39154.html'} | null |
Maven | GHSA-4jf5-jggp-g56j | Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12 | This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty. | {'CVE-2020-28452'} | 2022-03-03T05:13:48.743049Z | 2022-01-06T20:23:05Z | HIGH | null | {'CWE-352'} | {'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://github.com/softwaremill/akka-http-session/pull/79', 'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675', 'https://github.com/softwaremill/akka-http-session/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452'} | null |
Maven | GHSA-94qw-r73x-j7hg | Users with ROLE_COURSE_ADMIN can create new users in Opencast | ### Impact
Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example:
```bash
# Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user.
# We expect this to work.
% curl -i -u admin:opencast 'https://example.opencast.org/user-utils/xy.json' -X PUT \
--data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D'
HTTP/2 201
# Use the new user to create more new users.
# We don't expüect a user with just role ROLE_COURSE_ADMIN to succeed.
# But it does work
% curl -i -u xy:f 'https://example.opencast.org/user-utils/ab.json' -X PUT \
--data 'password=f&roles=%5B%22ROLE_COURSE_ADMIN%22%5D'
HTTP/2 201
```
`ROLE_COURSE_ADMIN` is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation.
### Patches
This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration.
### Workarounds
You can fix this issue by removing all instances of `ROLE_COURSE_ADMIN` in your organization's security configuration (`etc/security/mh_default_org.xml` by default).
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues)
- For security-relevant information, email us at security@opencast.org | {'CVE-2020-5231'} | 2022-03-03T05:14:18.353152Z | 2020-01-30T21:21:37Z | MODERATE | null | {'CWE-285'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231'} | null |
Maven | GHSA-pfj3-56hm-jwq5 | Template injection in cron-utils | ### Impact
A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected.
### Patches
The issue was patched and a new version released. Please upgrade to version 9.1.3.
### Workarounds
There are no known workarounds up to this moment.
### References
A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cron-utils Github repository](https://github.com/jmrozanec/cron-utils) | {'CVE-2020-26238'} | 2022-03-03T05:14:02.872232Z | 2020-11-24T23:48:38Z | CRITICAL | null | {'CWE-74'} | {'https://lists.apache.org/thread.html/r855aead591697dc2e85faf66c99036e49f492431940b78d4e6d895b5@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r71083c759dc627f198571b3d48b6745fe798b1d53c34f7ef8de9e7dd@%3Cissues.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-pfj3-56hm-jwq5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26238', 'https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/issues/461', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d390ee0a02e45e5a5b4f931180b9a93@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r96937fc9c82f3201b59311c067e97bce71123944f93102169a95bf5c@%3Cissues.hive.apache.org%3E', 'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e', 'https://lists.apache.org/thread.html/r50e1b5544c37e408ed7e9a958b28237b1cb9660ba2b3dba46f343e23@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9ae9a9fb1c8e2bf95c676e7e4cd06aa04f0a3a8a9ec1a6b787afb00f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E'} | null |
Maven | GHSA-rhcw-wjcm-9h6g | Denial of service in Undertow | A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1, 2.0.33.SP2, and 2.2.3.SP1. | {'CVE-2020-27782'} | 2022-03-03T05:13:40.690161Z | 2022-02-09T00:54:12Z | HIGH | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782', 'https://issues.redhat.com/browse/UNDERTOW-1813'} | null |
Maven | GHSA-3c7p-vv5r-cmr5 | Incorrect Authorization in Apache Solr | Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions. | {'CVE-2020-13957'} | 2022-03-03T05:13:26.970601Z | 2022-02-10T00:31:27Z | CRITICAL | null | {'CWE-863'} | {'https://lists.apache.org/thread.html/r3da9895cea476bcee2557531bebd4e8f6f367dc3ea900a65e2f51cd8@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r4ca8ba5980d9049cf3707798aa3116ee76c1582f171ff452ad2ca75e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r13a728994c60be5b5a7049282b5c926dac1fc6a9a0b2362f6adfa573@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2236fdf99ac3efbfc36c2df96d3a88f822baa6f45e13fec7ff558e34@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/rb1de6ba50a468e9baff32a249edaa08f6bcec7dd7cc208e25e6b48c8@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r1c783d3d81ba62f3381a17a4d6c826f7dead3a132ba42349c90df075@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r9d7356f209ee30d702b6a921c866564eb2e291b126640c7ab70feea7@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rb2f1c7fd3d3ea719dfac4706a80e6affddecae8663dda04e1335347f@%3Ccommits.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r7512ae552cd9d14ab8b1bc0a7e95f2ec52ae85364f068d4034398ede@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r226c1112bb41e7cd427862d875eff9877a20a40242c2542f4dd39e4a@%3Cissues.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201023-0002/', 'https://lists.apache.org/thread.html/r2f8d33a4de07db9459fb2a98a1cd39747066137636b53f84a13e5628@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r2a6600fe9afd502c04d26fd112823ec3f3c3ad1b4a289d10567a78a0@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r999f828e6e37d9e825e207471cbfd2681c3befcd7f3abd59ed87c0d5@%3Cissues.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r8b1782d42d0a4ce573495d5d9345ad328d652c68c411ccdb245c57e3@%3Cissues.lucene.apache.org%3E', 'https://mail-archives.us.apache.org/mod_mbox/www-announce/202010.mbox/%3CCAECwjAWCVLoVaZy%3DTNRQ6Wk9KWVxdPRiGS8NT%2BPHMJCxbbsEVg%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5557641fcf5cfd99260a7037cfbc8788fb546b72c98a900570edaa2e@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r853fdc6d0b91d5e01a26c7bd5becb044ad775a231703d634ca5d55c9@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13957', 'https://lists.apache.org/thread.html/rf1a32f00017e83ff29a74be2de02e28e4302dddb5f14c624e297a8c0@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r622a043c2890327f8a4aea16b131e8a7137a282a004614369fceb224@%3Cdev.bigtop.apache.org%3E', 'https://lists.apache.org/thread.html/r3d1e24a73e6bffa1d6534e1f34c8f5cbd9999495e7d933640f4fa0ed@%3Cissues.lucene.apache.org%3E'} | null |
Maven | GHSA-7hfm-57qf-j43q | Excessive Iteration in Compress | When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This could be used to mount a denial of service attack against services that use Compress' sevenz package. | {'CVE-2021-35515'} | 2022-04-26T18:17:07.050693Z | 2021-08-02T16:55:07Z | HIGH | null | {'CWE-835', 'CWE-834'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/1', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rbaea15ddc5a7c0c6b66660f1d6403b28595e2561bb283eade7d7cd69@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35515', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-3mcp-9wr4-cjqf | Remote Code Execution (RCE) vulnerability in dropwizard-validation | Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature.
### Summary
A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.19 or 2.0.2 is strongly recommended.
### Impact
This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
### Patches
The issue has been fixed in **dropwizard-validation** **1.3.19** and **2.0.2**. We strongly recommend upgrading to one of these versions.
### Workarounds
If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidation.html).
Example:
```java
@SelfValidation
public void validateFullName(ViolationCollector col) {
if (fullName.contains("_")) {
// Sanitize fullName variable by escaping relevant characters such as "$"
col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName));
}
}
```
See also:
https://github.com/dropwizard/dropwizard/blob/v2.0.2/dropwizard-validation/src/main/java/io/dropwizard/validation/selfvalidating/ViolationCollector.java#L84-L98
### References
* https://github.com/dropwizard/dropwizard/pull/3157
* https://github.com/dropwizard/dropwizard/pull/3160
* https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm
* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions
* https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
### Security contact
If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability | {'CVE-2020-5245'} | 2022-04-25T23:17:01.669512Z | 2020-02-24T17:27:27Z | HIGH | null | {'CWE-74'} | {'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5245', 'https://github.com/dropwizard/dropwizard/pull/3157', 'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://docs.oracle.com/javaee/7/tutorial/jsf-el.htm', 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-54g4-5cf6-hjp3 | Exposure of Sensitive Information to an Unauthorized Actor and Observable Timing Discrepancy in Apache Hive | Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8 | {'CVE-2020-1926'} | 2022-03-03T05:13:48.065959Z | 2022-02-09T00:48:54Z | MODERATE | null | {'CWE-200', 'CWE-208'} | {'https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1926', 'https://issues.apache.org/jira/browse/HIVE-22708'} | null |
Maven | GHSA-5v34-g2px-j4fw | Improper Handling of Length Parameter Inconsistency in Apache Ant | When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected. | {'CVE-2021-36374'} | 2022-04-22T16:02:00.445429Z | 2021-08-02T16:56:31Z | MODERATE | null | {'CWE-130'} | {'https://lists.apache.org/thread.html/rad36f470647c5a7c02dd78c9973356d2840766d132b597b6444e373a@%3Cnotifications.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38%40%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rf4bb79751a02889623195715925e4fd8932dd3c97e0ade91395a96c6@%3Cdev.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r544c9e8487431768465b8b2d13982c75123109bd816acf839d46010d@%3Ccommits.groovy.apache.org%3E', 'https://lists.apache.org/thread.html/r27919fd4db07c487239c1d9771f480d89ce5ee2750aa9447309b709a@%3Ccommits.groovy.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210819-0007/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://ant.apache.org/security.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36374'} | null |
Maven | GHSA-rvh4-g2rj-hr9c | Path Traversal in Jenkins Warnings Next Generation Plugin | Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system. | {'CVE-2022-23107'} | 2022-01-20T14:51:23Z | 2022-01-21T23:38:05Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23107', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2090', 'https://github.com/jenkinsci/warnings-ng-plugin', 'https://github.com/jenkinsci/warnings-ng-plugin/releases/tag/v9.10.3', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'} | null |
Maven | GHSA-7qx4-pp76-vrqh | Remote code execution in Apache Commons Configuration | Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application. | {'CVE-2020-1953'} | 2022-03-03T05:13:45.634364Z | 2020-05-21T19:08:08Z | CRITICAL | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641', 'https://lists.apache.org/thread.html/r16a2e949e35780c8974cf66104e812410f3904f752df6b66bf292269@%3Ccommits.servicecomb.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'} | null |
Maven | GHSA-xmvg-w4f9-99r7 | Moderate severity vulnerability that affects org.bedework.caleng:bw-calendar-engine | bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server. | {'CVE-2018-1000836'} | 2022-03-03T05:13:56.200799Z | 2018-12-20T22:02:51Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/Bedework/bw-calendar-engine/issues/3', 'https://github.com/advisories/GHSA-xmvg-w4f9-99r7', 'https://github.com/Bedework/bw-calendar-engine', 'https://0dd.zone/2018/10/28/bw-calendar-engine-XXE-MitM/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000836'} | null |
Maven | GHSA-3h68-wvv6-8r5h | Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak | The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed. | {'CVE-2020-1940'} | 2022-03-03T05:11:46.565373Z | 2021-12-10T17:20:11Z | HIGH | null | {'CWE-200', 'CWE-212'} | {'http://www.openwall.com/lists/oss-security/2020/01/28/1', 'https://lists.apache.org/thread.html/rba884dbe733781cbaaffa28b77bc37a6a9f948b3a72a1bdad5e1587c@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r601637e38ee743e845856a4e24915cb8db26ae80ca782bef91989cbc@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r45b0e2fb6ac51c5a03952b08b5e0efde1249ecb809884cc87eb0bd99@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rc35a57ecdeae342d46f729d6bc9750ba860c101f450cc171798dba28@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ra6b3e78f5ed545c1d859d664f66c6d3fc5d731d9b1d842349654e4f0@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rb3023cfd45441b570c1abaa347d0cac78df97b5d3f27d674d01b3d2a@%3Ccommits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r3da8e2fd253ecd4d3a0de71ce255631148b54be8500225b5812f7737@%3Coak-commits.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0%40%3Cusers.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/rbef4701b5ce4d827182e70ad7b4d987a9157682ba3643e05a9ef5a7b@%3Ccommits.jackrabbit.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1940', 'https://lists.apache.org/thread.html/rccc0ed467faa35734ea16b8f5de5603e708936c41a4eddd90fddeaf0@%3Cannounce.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/ra295f919586b19def7cc7713d9d78595507d5f703362fccb779eeeb9@%3Coak-commits.jackrabbit.apache.org%3E'} | null |
Maven | GHSA-m738-3rc4-5xv3 | A user without PR can reset user authentication failures information | ### Impact
The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have.
Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks.
### Patches
The problem has been patched in version 12.6.8, 12.10.4 and 13.0.
### Workarounds
There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged.
### References
https://jira.xwiki.org/browse/XWIKI-18276
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [the security mailing-list](mailto:security@xwiki.org)
| {'CVE-2021-32729'} | 2021-07-02T16:44:24Z | 2021-07-02T19:19:31Z | LOW | null | {'CWE-693', 'CWE-287'} | {'https://jira.xwiki.org/browse/XWIKI-18276', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m738-3rc4-5xv3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32729'} | null |
Maven | GHSA-gc37-9g7f-96fx | Exposure of sensitive information in Apache Ozone | In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints. | {'CVE-2021-41532'} | 2021-11-22T18:38:16Z | 2021-11-23T18:17:50Z | MODERATE | null | {'CWE-668'} | {'http://www.openwall.com/lists/oss-security/2021/11/19/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41532', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3Ce0bc6598-9669-b897-fc28-de8a896e36aa%40apache.org%3E'} | null |
Maven | GHSA-8grg-q944-cch5 | SQL Injection in Hibernate ORM | A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. | {'CVE-2019-14900'} | 2022-05-03T02:28:28Z | 2022-02-10T23:05:04Z | MODERATE | null | {'CWE-89'} | {'https://security.netapp.com/advisory/ntap-20220210-0020/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14900', 'https://bugzilla.redhat.com/show_bug.cgi?id=1666499', 'https://github.com/infinispan/infinispan', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E'} | null |
Maven | GHSA-9gwx-9cwp-5c2m | Billion laughs attack (XML bomb) | ### Impact
Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request.
Consider an XML file (`createMediaPackage.xml`) like this:
```xml
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE lolz [
<!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. ">
<!ELEMENT title (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
<!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;">
<!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;">
]>
<mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z">
<title>&lol5;</title>
<media/>
<metadata/>
<attachments/>
<publications/>
</mediapackage>
```
Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory:
```sh
curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \
-F 'mediapackage=<createMediaPackage.xml' \
-F sourceFlavors="" \
-F sourceTags="" \
-F deleteExternal="" \
-F tagsAndFlavor='' \
-o out.xml
```
Additional notes:
- You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text.
- Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system.
- To exploit this, users need to have ingest privileges, limiting the group of potential attackers
### Patches
The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch.
### Workarounds
There is no known workaround for this issue.
### References
- [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack)
- For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
- Email us at [security@opencast.org](mailto:security@opencast.org) | {'CVE-2021-32623'} | 2022-03-03T05:13:31.179791Z | 2021-06-17T20:11:35Z | HIGH | null | {'CWE-776'} | {'https://github.com/opencast/opencast', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m', 'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e'} | null |
Maven | GHSA-2q8x-2p7f-574v | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39153'} | 2022-04-22T15:47:05.177863Z | 2021-08-25T14:46:49Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39153', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://github.com/x-stream/xstream', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v', 'https://x-stream.github.io/CVE-2021-39153.html'} | null |
Maven | GHSA-jfvx-7wrx-43fh | XStream vulnerable to an Arbitrary File Deletion on the local host when unmarshalling | ### Impact
The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.
### Workarounds
The reported vulnerability does only exist with a JAX-WS runtime on the classpath.
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.
Users of XStream 1.4.14 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class
|| type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString")
|| type == java.lang.Void.class || void.class || Proxy.isProxy(type))
|| type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream"));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2020-26259'} | 2022-03-03T05:14:01.049904Z | 2020-12-21T16:28:26Z | MODERATE | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26259', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-4828', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://x-stream.github.io/CVE-2020-26259.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-hp5x-rqf7-43vf | Improper Handling of Exceptional Conditions and Improper Input Validation in Reactor Netty | Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response. | {'CVE-2020-5403'} | 2021-04-22T20:27:06Z | 2022-02-10T20:24:21Z | MODERATE | null | {'CWE-755', 'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5403', 'https://pivotal.io/security/cve-2020-5403'} | null |
Maven | GHSA-59jw-jqf4-3wq3 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html).
### Credits
钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21344'} | 2022-03-03T05:13:20.496632Z | 2021-03-22T23:28:23Z | MODERATE | null | {'CWE-502', 'CWE-434'} | {'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/security.html#workaround', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-21344.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'} | null |
Maven | GHSA-2cfc-865j-gm4w | XML External Entity Reference in detekt | Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0. | {'CVE-2022-0272'} | 2022-04-26T13:15:13.219611Z | 2022-04-22T00:00:36Z | HIGH | null | {'CWE-611'} | {'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395', 'https://github.com/detekt/detekt', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44'} | null |
Maven | GHSA-7fm6-2qw4-g3x3 | High severity vulnerability that affects ro.pippo:pippo-core | An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution. | {'CVE-2018-18628'} | 2022-03-03T05:12:58.852106Z | 2018-10-24T19:46:20Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/advisories/GHSA-7fm6-2qw4-g3x3', 'https://github.com/pippo-java/pippo', 'https://github.com/pippo-java/pippo/issues/458', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18628'} | null |
Maven | GHSA-63qc-p2x4-9fgf | Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library | In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information. | {'CVE-2019-11777'} | 2022-03-03T05:13:18.735733Z | 2019-09-17T22:47:11Z | MODERATE | null | {'CWE-755', 'CWE-346'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-11777', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934'} | null |
Maven | GHSA-9h9c-f287-c6vp | High severity vulnerability that affects org.apache.syncope:syncope-core | A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed. | {'CVE-2018-17184'} | 2022-03-03T05:14:05.074411Z | 2018-11-06T23:16:18Z | MODERATE | null | {'CWE-799'} | {'https://github.com/advisories/GHSA-9h9c-f287-c6vp', 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184'} | null |
Maven | GHSA-6jmm-mp6w-4rrg | OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser | ### Impact
NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/HtmlUnit/htmlunit-neko](https://github.com/HtmlUnit/htmlunit-neko)
* Email us at [rbri at rbri.de]
| {'CVE-2022-29546'} | 2022-05-02T20:06:31.677428Z | 2022-04-26T21:14:57Z | MODERATE | null | {'CWE-400'} | {'https://github.com/HtmlUnit/htmlunit-neko', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg', 'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546'} | null |
Maven | GHSA-gprm-xqrc-c2j3 | Command Injection in Kylin | Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. | {'CVE-2020-1956'} | 2022-03-03T05:13:34.310834Z | 2020-07-27T22:51:44Z | HIGH | null | {'CWE-78'} | {'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E', 'https://github.com/apache/kylin', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956', 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706', 'https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/07/14/1', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E', 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'} | null |
Maven | GHSA-hx5g-8hq2-8x4w | SQL Injection in Kylin | Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0. | {'CVE-2020-13926'} | 2022-03-03T05:13:43.750791Z | 2020-07-27T22:51:40Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13926', 'https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584374', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'} | null |
Maven | GHSA-gf2v-9hp6-44qg | Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through. | {'CVE-2016-3083'} | 2022-03-03T05:12:19.255004Z | 2019-03-14T15:40:32Z | HIGH | null | {'CWE-295'} | {'https://github.com/advisories/GHSA-gf2v-9hp6-44qg', 'http://www.securityfocus.com/bid/98669', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3083', 'https://lists.apache.org/thread.html/0851bcf85635385f94cdaa008053802d92b4aab0a3075e30ed171192@%3Cdev.hive.apache.org%3E'} | null |
Maven | GHSA-px4w-rcv2-6x8x | Arbitrary code execution in Apache ServiceComb java-chassis | When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution.
The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5 | {'CVE-2020-17532'} | 2022-03-03T05:13:16.049601Z | 2022-02-09T22:19:00Z | HIGH | null | {'CWE-502'} | {'https://seclists.org/oss-sec/2021/q1/60', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838', 'https://issues.apache.org/jira/browse/SCB-2145', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532', 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c'} | null |
Maven | GHSA-px9h-x66r-8mpc | path traversal in Jooby | ### Impact
Access to sensitive information available from classpath.
### Patches
Patched version: 1.6.7 and 2.8.2
Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009
Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
Latest 1.x version: 1.6.6
#### Arbitrary class path resource access 1
When sharing a *File System* directory as in:
``` java
assets("/static/**", Paths.get("static"));
```
The class path is also searched for the file (`org.jooby.handlers.AssetHandler.loader`):
[jooby/AssetHandler.java at 1.x · jooby-project/jooby · GitHub](https://github.com/jooby-project/jooby/blob/1.x/jooby/src/main/java/org/jooby/handlers/AssetHandler.java)
``` java
private static Loader loader(final Path basedir, final ClassLoader classloader) {
if (Files.exists(basedir)) {
return name -> {
Path path = basedir.resolve(name).normalize();
if (Files.exists(path) && path.startsWith(basedir)) {
try {
return path.toUri().toURL();
} catch (MalformedURLException x) {
// shh
}
}
return classloader.getResource(name);
};
}
return classloader::getResource;
}
```
If we send `/static/WEB-INF/web.xml` it will fail to load it from the file system but will go into `classloader.getResource(name)` where name equals `/WEB-INF/web.xml` so will succeed and return the requested file. This way we can get any configuration file or even the application class files
If assets are configured for a certain extension we can still bypass it. eg:
```java
assets("/static/**/*.js", Paths.get("static"));
```
We can send:
```
http://localhost:8080/static/io/yiss/App.class.js
```
#### Arbitrary class path resource access 2
This vulnerability also affects assets configured to access resources from the root of the class path. eg:
```java
assets("/static/**");
```
In this case we can traverse `static` by sending:
```
http://localhost:8080/static/..%252fio/yiss/App.class
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [jooby](https://github.com/jooby-project/jooby/issues)
* Email us at [support@jooby.io](mailto:support@jooby.io) | {'CVE-2020-7647'} | 2022-03-03T05:13:34.682100Z | 2020-05-13T16:29:26Z | MODERATE | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807,', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806', 'https://github.com/jooby-project/jooby', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806,', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc', 'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'} | null |
Maven | GHSA-269m-695x-j34p | Moderate severity vulnerability that affects org.apache.qpid:qpid-broker | In Apache Qpid Broker-J 0.18 through 0.32, if the broker is configured with different authentication providers on different ports one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP port into using an authentication provider that was configured on a different port. The attacker still needs valid credentials with the authentication provider on the spoofed port. This becomes an issue when the spoofed port has weaker authentication protection (e.g., anonymous access, default accounts) and is normally protected by firewall rules or similar which can be circumvented by this vulnerability. AMQP ports are not affected. Versions 6.0.0 and newer are not affected. | {'CVE-2017-15702'} | 2022-03-03T05:12:56.022517Z | 2018-10-19T16:41:04Z | CRITICAL | null | null | {'https://qpid.apache.org/cves/CVE-2017-15702.html', 'https://lists.apache.org/thread.html/59d241e30db23b8b0af26bb273f789aa1f08515d3dc1a3868d3ba090@%3Cdev.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-269m-695x-j34p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15702', 'https://issues.apache.org/jira/browse/QPID-8039', 'http://www.securityfocus.com/bid/102040'} | null |
Maven | GHSA-wqfh-9m4g-7x6x | Remote code execution in Apache ActiveMQ | A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code. Mitigation - Upgrade to Apache ActiveMQ 5.15.13 | {'CVE-2020-11998'} | 2021-06-15T19:11:50Z | 2022-02-09T22:14:58Z | CRITICAL | null | {'CWE-94'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11998', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E'} | null |
Maven | GHSA-5phw-3jrp-3vj8 | Server-Side Request Forgery in Apache Solr | The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. | {'CVE-2021-27905'} | 2022-03-03T05:13:38.631977Z | 2021-05-10T15:18:06Z | HIGH | null | {'CWE-918'} | {'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27905', 'https://lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430@%3Cnotifications.ofbiz.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0009/', 'https://lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'} | null |
Maven | GHSA-jp55-vvmf-63mv | URL Redirection to Untrusted Site ('Open Redirect') | ### Impact
There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections.
### Patches
The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1.
### Workarounds
There's no known workaround for this issue.
### References
https://jira.xwiki.org/browse/XWIKI-10309
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [Security ML](mailto:security@xwiki.org)
| {'CVE-2022-23618'} | 2022-02-09T21:42:47Z | 2022-02-09T21:42:47Z | MODERATE | null | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23618', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv', 'https://jira.xwiki.org/browse/XWIKI-10309', 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'} | null |
Maven | GHSA-mc6h-4qgp-37qh | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). | {'CVE-2020-14195'} | 2022-03-03T05:12:46.699406Z | 2020-06-18T14:44:43Z | HIGH | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14195', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2765', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-p4q6-qxjx-8jgp | Directory Traversal in spring-boot-actuator-logview | ### Impact
The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory).
### Patches
The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release.
### Workarounds
There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [github repo](https://github.com/lukashinsch/spring-boot-actuator-logview) | {'CVE-2021-21234'} | 2022-03-03T05:13:40.104264Z | 2021-01-05T17:29:40Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21234', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/1c76e1ec3588c9f39e1a94bf27b5ff56eb8b17d6', 'https://github.com/lukashinsch/spring-boot-actuator-logview/security/advisories/GHSA-p4q6-qxjx-8jgp', 'https://github.com/lukashinsch/spring-boot-actuator-logview/commit/760acbb939a8d1f7d1a7dfcd51ca848eea04e772', 'https://search.maven.org/artifact/eu.hinsch/spring-boot-actuator-logview'} | null |
Maven | GHSA-mq8p-h798-xcrp | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | The YARN NodeManager in Apache Hadoop 2.7.3 and 2.7.4 can leak the password for credential store provider used by the NodeManager to YARN Applications. | {'CVE-2017-15718'} | 2022-03-03T05:11:45.099308Z | 2018-12-21T17:50:20Z | CRITICAL | null | {'CWE-200'} | {'https://github.com/advisories/GHSA-mq8p-h798-xcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15718', 'https://lists.apache.org/thread.html/773c93c2d8a6a52bbe97610c2b1c2ad205b970e1b8c04fb5b2fccad6@%3Cgeneral.hadoop.apache.org%3E'} | null |
Maven | GHSA-gjmw-vf9h-g25v | Polymorphic typing issue | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. | {'CVE-2019-17531'} | 2022-03-03T05:12:54.138992Z | 2019-11-13T00:32:38Z | CRITICAL | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://security.netapp.com/advisory/ntap-20191024-0005/', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17531', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4192', 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://github.com/FasterXML/jackson-databind/issues/2498'} | null |
Maven | GHSA-wmv4-5w76-vp9g | Authorization Bypass in Spring Security | When using Spring Security's CAS Proxy ticket authentication a malicious CAS Service could trick another CAS Service into authenticating a proxy ticket that was not associated. This is due to the fact that the proxy ticket authentication uses the information from the HttpServletRequest which is populated based upon untrusted information within the HTTP request.
This means if there are access control restrictions on which CAS services can authenticate to one another, those restrictions can be bypassed.
If users are not using CAS Proxy tickets and not basing access control decisions based upon the CAS Service, then there is no impact to users.
## Mitigation
Users of affected versions should apply the following mitigation:
- Users of 3.2x should upgrade to 3.2.5 or later
- Users of 3.1.x should upgrade to 3.1.7 or later
## Credit
This issue was identified by David Ohsie and brought to our attention by the CAS Development team. | {'CVE-2014-3527'} | 2022-03-03T05:14:07.635573Z | 2020-09-15T20:16:22Z | CRITICAL | null | {'CWE-287'} | {'https://github.com/spring-projects/spring-security/issues/2907', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3527', 'https://pivotal.io/security/cve-2014-3527', 'https://github.com/spring-projects/spring-security/'} | null |
Maven | GHSA-r32r-3977-cgc3 | Moderate severity vulnerability that affects org.keycloak:keycloak-core | JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation. | {'CVE-2014-3651'} | 2022-03-03T05:14:10.638311Z | 2018-10-18T16:50:20Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-3651', 'https://bugzilla.redhat.com/show_bug.cgi?id=1144278', 'https://github.com/advisories/GHSA-r32r-3977-cgc3', 'https://issues.jboss.org/browse/KEYCLOAK-699'} | null |
Maven | GHSA-9p5g-vg43-mj5r | Authenticated users can read data from other sources than intended | In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1. | {'CVE-2021-36749'} | 2022-03-03T05:14:17.608090Z | 2021-09-27T20:13:25Z | MODERATE | null | {'CWE-863', 'CWE-668'} | {'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36749', 'https://github.com/advisories/GHSA-793h-6f7r-6qvm', 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d%40%3Cdev.druid.apache.org%3E'} | null |
Maven | GHSA-c8hm-7hpq-7jhg | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization. | {'CVE-2018-19362'} | 2022-03-03T05:12:53.415813Z | 2019-01-04T19:07:03Z | HIGH | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-c8hm-7hpq-7jhg', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Maven | GHSA-r28m-g6j9-r2h5 | Information Exposure vulnerability in Eclipse Jetty | In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories. | {'CVE-2019-10246'} | 2022-03-03T05:14:14.553753Z | 2019-04-23T16:07:18Z | MODERATE | null | {'CWE-200', 'CWE-213'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546576', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10246', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-x5x7-3v85-wpc4 | Apache Struts allows entering a custom URL in a form field if built-in URLValidator is used | In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672. | {'CVE-2017-9804'} | 2022-04-26T19:15:45.732201Z | 2018-10-16T19:37:33Z | HIGH | null | {'CWE-20'} | {'http://www.securityfocus.com/bid/100612', 'https://security.netapp.com/advisory/ntap-20180629-0001/', 'https://struts.apache.org/docs/s2-050.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9804', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-003.txt', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'https://github.com/advisories/GHSA-x5x7-3v85-wpc4', 'http://www.securitytracker.com/id/1039261', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'} | null |
Maven | GHSA-838r-hvwh-24h8 | XML Injection in Any23 | An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions < 2.5. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. | {'CVE-2021-38555'} | 2022-03-03T05:12:31.604414Z | 2021-09-13T20:06:31Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/apache/any23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38555', 'https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-5r5r-6hpj-8gg9 | Serialization gadget exploit in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl). | {'CVE-2020-35728'} | 2022-02-08T21:39:40Z | 2021-12-09T19:15:24Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35728', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20210129-0007/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2999'} | null |
Maven | GHSA-j3f7-7rmc-6wqj | Improper certificate management in AWS IoT Device SDK v2 | The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS. | {'CVE-2021-40831'} | 2022-03-03T05:14:12.538986Z | 2021-11-24T20:35:03Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40831', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2'} | null |
Maven | GHSA-c32g-2mgr-cfq7 | Out-of-bounds Write in iText | iText v7.1.17 was discovered to contain a stack-based buffer overflow via the component ByteBuffer.append, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. | {'CVE-2022-24197'} | 2022-04-17T17:16:55.474006Z | 2022-02-02T00:01:45Z | MODERATE | null | {'CWE-787'} | {'https://github.com/itext/itext7/pull/78', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24197', 'https://github.com/itext/itext7', 'https://github.com/itext/itext7/pull/78#issuecomment-1089282165'} | null |
Maven | GHSA-xv7x-x6wr-xx7g | Moderate severity vulnerability that affects org.apache.ranger:ranger | Apache Ranger before 0.6.3 policy engine incorrectly matches paths in certain conditions when policy does not contain wildcards and has recursion flag set to true. | {'CVE-2016-8746'} | 2022-03-03T05:14:20.606890Z | 2018-10-17T17:22:05Z | MODERATE | null | {'CWE-426'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-8746', 'https://github.com/advisories/GHSA-xv7x-x6wr-xx7g', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'http://www.securityfocus.com/bid/95998'} | null |
Maven | GHSA-jxm5-5xcw-h57q | Moderate severity vulnerability that affects org.exist-db:exist-core | exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. | {'CVE-2018-1000823'} | 2022-03-03T05:14:12.313213Z | 2018-12-20T22:02:17Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-jxm5-5xcw-h57q', 'https://github.com/eXist-db/exist/issues/2180', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000823', 'https://0dd.zone/2018/10/27/exist-XXE/'} | null |
Maven | GHSA-rcvx-rmvf-mxch | Cross-site Scripting in Eclipse Hawkbit | In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client. | {'CVE-2020-27219'} | 2022-03-03T05:13:16.547284Z | 2022-02-09T22:19:44Z | MODERATE | null | {'CWE-79'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=570289', 'https://github.com/eclipse/hawkbit/issues/1067', 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27219'} | null |
Maven | GHSA-w5rh-j4g3-jr29 | Missing Authorization in Jenkins S3 publisher Plugin | Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles. | {'CVE-2021-21651'} | 2021-05-19T18:59:06Z | 2021-06-16T17:29:17Z | MODERATE | null | {'CWE-862'} | {'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2201', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21651'} | null |
Maven | GHSA-4v6p-cxf9-98rf | Allocation of Resources Without Limits or Throttling in metadata-extractor | When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library. | {'CVE-2022-24614'} | 2022-03-07T20:48:01.955707Z | 2022-02-25T00:01:05Z | MODERATE | null | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24614', 'https://github.com/drewnoakes/metadata-extractor/issues/561', 'https://github.com/drewnoakes/metadata-extractor'} | null |
Maven | GHSA-395w-qhqr-9fr6 | Path Traversal in Apache Flink | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master. | {'CVE-2020-17519'} | 2022-03-03T05:14:12.693861Z | 2021-01-06T20:01:34Z | MODERATE | null | {'CWE-22', 'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-17519', 'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r0a433be10676f4fe97ca423d08f914e0ead341c901216f292d2bbe83@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r2fc60b30557e4a537c2a6293023049bd1c49fd92b518309aa85a0398@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r229167538863518738e02f4c1c5a8bb34c1d45dadcc97adf6676b0c1@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cuser.flink.apache.org%3E', 'http://packetstormsecurity.com/files/160849/Apache-Flink-1.11.0-Arbitrary-File-Read-Directory-Traversal.html', 'https://lists.apache.org/thread.html/ra8c96bf3ccb4e491f9ce87ba35f134b4449beb2a38d1ce28fd89001f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/05/2', 'https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d@%3Cdev.flink.apache.org%3E'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.