ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-q485-j897-qc27
Moderate severity vulnerability that affects com.mchange:c3p0
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
{'CVE-2018-20433'}
2022-03-03T05:13:58.482425Z
2019-01-07T19:14:34Z
CRITICAL
null
{'CWE-611'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://github.com/zhutougg/c3p0', 'https://github.com/advisories/GHSA-q485-j897-qc27', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/', 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b', 'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'}
null
Maven
GHSA-v4qh-6367-4cx2
Server-Side Request Forgery (SSRF) in Apache Olingo
Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker.
{'CVE-2020-1925'}
2022-03-03T05:13:40.845210Z
2020-02-04T22:38:38Z
HIGH
null
{'CWE-918'}
{'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1925'}
null
Maven
GHSA-6v39-p2xq-g5c3
Missing authentication in ShenYu
User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
{'CVE-2022-23944'}
2022-03-03T05:12:57.845436Z
2022-01-28T22:13:44Z
CRITICAL
null
{'CWE-306', 'CWE-862'}
{'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/25/15', 'http://www.openwall.com/lists/oss-security/2022/01/25/5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23944', 'https://lists.apache.org/thread/dbrjnnlrf80dr0f92k5r2ysfvf1kr67y', 'http://www.openwall.com/lists/oss-security/2022/01/26/2'}
null
Maven
GHSA-w3hj-wr2q-x83g
Discovery uses the same AES/GCM Nonce throughout the session
Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer. From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache): > The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator.
null
2021-03-30T17:04:34Z
2021-04-06T17:22:17Z
LOW
null
{'CWE-323'}
{'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g'}
null
Maven
GHSA-pffw-p2q5-w6vh
Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-builder and org.apache.jspwiki:jspwiki-war
A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details.
{'CVE-2019-0225'}
2022-03-03T05:13:50.301938Z
2019-04-08T16:23:36Z
HIGH
null
{'CWE-22'}
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/03/26/2', 'http://www.securityfocus.com/bid/107627', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E', 'https://github.com/advisories/GHSA-pffw-p2q5-w6vh', 'https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0225'}
null
Maven
GHSA-gc58-v8h3-x2gr
Incorrect Default Permissions in Apache Tomcat
A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
{'CVE-2020-8022'}
2022-03-03T05:13:47.452917Z
2022-02-09T23:01:49Z
HIGH
null
{'CWE-276'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8022', 'https://bugzilla.suse.com/show_bug.cgi?id=1172405', 'https://lists.apache.org/thread.html/ra87ec20a0f4b226c81c7eed27e5d7433ccdc41e61a8da408a45f0fa1@%3Cusers.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html', 'https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/rf50d02409e5732c4ee37f19a193af171251a25a652599ce3c2bc69e7@%3Cusers.tomcat.apache.org%3E'}
null
Maven
GHSA-jrg3-qq99-35g7
Deserialization of Untrusted Data in Jodd
Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.
{'CVE-2018-21234'}
2022-04-26T18:01:55.893226Z
2022-02-10T23:03:26Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/oblac/jodd/issues/628', 'https://lists.apache.org/thread.html/r729bc1e0f367fe8a857ac8a14641dba284ac4cf5131edf483022cf59@%3Cissues.hive.apache.org%3E', 'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16', 'https://lists.apache.org/thread.html/rc23200043872384e0fc48a4a4502f4c6b4b5ddc79ba4076414150d59@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0bacc701ab7105500a0ab2769270d18f332cb379e6a62ec7553f3327@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21234', 'https://lists.apache.org/thread.html/r157d01c96a2c10e7ceb3e005f42c52cfe87b11dd018935e1c4277433@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc85b650b4ad2c77d7c39c69824488e40dce6d0ebbb4204777d094375@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r965503b27d67a2d934e34fc1d088c9547d51d927c43b8b9bd9b7e695@%3Cissues.hive.apache.org%3E', 'https://github.com/oblac/jodd/compare/v5.0.3...v5.0.4', 'https://lists.apache.org/thread.html/rd575d9877424a2d8776f5c2ff33bf3dc3382cd83f031d483f29c11ab@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf458683390d6650b26a2c8ba8ad396e038e520ad1cc3f3f1e20514d9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r317aec95c436848233047af7ecb3ce04ce446eb6031f981aef50df0d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rdbb99b43334b59d3d3478d360c87e3235ba22edb1de7d39019194347@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdce006b282e56c5cc73cdf452c51c5097154d0503396d62f48abbeae@%3Cgitbox.hive.apache.org%3E', 'https://github.com/oblac/jodd'}
null
Maven
GHSA-gx96-vgf7-hwfg
In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation
In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree.
{'CVE-2018-11797'}
2022-04-27T14:30:10.991683Z
2018-10-17T18:22:29Z
MODERATE
null
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-gx96-vgf7-hwfg', 'https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/'}
null
Maven
GHSA-7grw-6pjh-jpc9
Infinite Loop in Apache PDFBox
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
{'CVE-2021-31812'}
2022-04-26T18:17:11.151997Z
2021-06-15T15:54:29Z
MODERATE
null
{'CWE-835', 'CWE-834'}
{'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'http://www.openwall.com/lists/oss-security/2021/06/12/1', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31812', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E'}
null
Maven
GHSA-fvm3-cfvj-gxqq
High severity vulnerability that affects commons-fileupload:commons-fileupload
The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
{'CVE-2016-3092'}
2022-03-03T05:12:55.690217Z
2018-12-21T17:47:47Z
HIGH
null
{'CWE-20'}
{'http://svn.apache.org/viewvc?view=revision&revision=1743722', 'http://tomcat.apache.org/security-9.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E', 'http://www.securitytracker.com/id/1036900', 'http://rhn.redhat.com/errata/RHSA-2016-2807.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://security.gentoo.org/glsa/201705-09', 'http://rhn.redhat.com/errata/RHSA-2016-2070.html', 'http://jvn.jp/en/jp/JVN89379547/index.html', 'http://rhn.redhat.com/errata/RHSA-2016-2069.html', 'http://svn.apache.org/viewvc?view=revision&revision=1743480', 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2017:0456', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2072.html', 'http://tomcat.apache.org/security-8.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759', 'http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'http://svn.apache.org/viewvc?view=revision&revision=1743742', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'http://www.ubuntu.com/usn/USN-3024-1', 'http://www.debian.org/security/2016/dsa-3614', 'http://www.securitytracker.com/id/1036427', 'http://rhn.redhat.com/errata/RHSA-2016-2599.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://rhn.redhat.com/errata/RHSA-2016-2808.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092', 'http://svn.apache.org/viewvc?view=revision&revision=1743738', 'http://rhn.redhat.com/errata/RHSA-2017-0457.html', 'http://www.debian.org/security/2016/dsa-3611', 'http://www.securityfocus.com/bid/91453', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840', 'http://rhn.redhat.com/errata/RHSA-2016-2071.html', 'https://security.netapp.com/advisory/ntap-20190212-0001/', 'http://rhn.redhat.com/errata/RHSA-2016-2068.html', 'http://www.securitytracker.com/id/1037029', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121', 'https://github.com/advisories/GHSA-fvm3-cfvj-gxqq', 'http://www.securitytracker.com/id/1039606', 'http://tomcat.apache.org/security-7.html', 'http://www.debian.org/security/2016/dsa-3609', 'https://access.redhat.com/errata/RHSA-2017:0455', 'http://www.ubuntu.com/usn/USN-3027-1'}
null
Maven
GHSA-wfj5-2mqr-7jvv
Expression Language Injection in Netflix Conductor
Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code.
{'CVE-2020-9296'}
2022-03-03T05:13:28.495855Z
2022-02-10T23:06:57Z
CRITICAL
null
{'CWE-917'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9296', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-001.md', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md'}
null
Maven
GHSA-grc3-8q8m-4j7c
Improper privilege handling in Apache Accumulo
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
{'CVE-2020-17533'}
2022-03-03T05:14:10.252302Z
2022-02-09T22:37:59Z
HIGH
null
{'CWE-732', 'CWE-280'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17533', 'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4', 'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E'}
null
Maven
GHSA-45hx-wfhj-473x
Arbitrary code execution in H2 Console
H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.
{'CVE-2022-23221'}
2022-04-22T15:47:09.601059Z
2022-01-21T23:07:39Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23221', 'https://github.com/h2database/h2database/security/advisories', 'http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html', 'https://twitter.com/d0nkey_man/status/1483824727936450564', 'http://seclists.org/fulldisclosure/2022/Jan/39', 'https://github.com/h2database/h2database/releases/tag/version-2.1.210', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2022/dsa-5076', 'https://github.com/h2database/h2database'}
null
Maven
GHSA-83x4-9cwr-5487
Improper Authorization in Keycloak
A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled.
{'CVE-2021-4133'}
2022-04-22T15:47:07.416744Z
2022-01-06T18:32:58Z
HIGH
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4133', 'https://github.com/keycloak/keycloak/issues/9247', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487', 'https://github.com/keycloak/keycloak', 'https://bugzilla.redhat.com/show_bug.cgi?id=2033602', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-qvm7-23cj-437v
Remote Code Execution in Apache Dubbo
Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13
{'CVE-2021-36161'}
2022-03-03T05:13:32.627719Z
2021-09-10T17:54:37Z
CRITICAL
null
{'CWE-134'}
{'https://github.com/apache/dubbo', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36161', 'https://lists.apache.org/thread.html/r40212261fd5d638074b65f22ac73eebe93ace310c79d4cfcca4863da%40%3Cdev.dubbo.apache.org%3E'}
null
Maven
GHSA-qcj7-g2j5-g7r3
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification
In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
{'CVE-2016-1000342'}
2022-04-27T13:30:06.880260Z
2018-10-17T16:24:12Z
HIGH
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/advisories/GHSA-qcj7-g2j5-g7r3'}
null
Maven
GHSA-6vqp-h455-42mr
Uncontrolled Memory Allocation in Apache PDFBox
A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27906'}
2022-04-22T18:30:22.909055Z
2021-05-13T22:30:13Z
MODERATE
null
{'CWE-789'}
{'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://github.com/apache/pdfbox', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/10', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27906', 'https://lists.apache.org/thread.html/rdf78aef4793362e778e21e34328b0456e302bde4b7e74f229df0ee04@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-72m5-fvvv-55m6
Observable Differences in Behavior to Error Inputs in Bouncy Castle
In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.
{'CVE-2020-26939'}
2022-03-03T05:12:45.225730Z
2021-04-22T16:16:49Z
MODERATE
null
{'CWE-203'}
{'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-26939', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26939'}
null
Maven
GHSA-3rj3-qp2j-4fj2
Cross-Site Request Forgery in Jenkins P4 Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
{'CVE-2021-21655'}
2022-03-18T18:03:13.723640Z
2022-03-18T17:53:10Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21655', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}
null
Maven
GHSA-4m9r-5gqp-7j82
High severity vulnerability that affects org.dspace:dspace-xmlui
The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI.
{'CVE-2016-10726'}
2022-03-03T05:12:42.348876Z
2018-10-19T16:52:06Z
HIGH
null
{'CWE-22'}
{'https://wiki.duraspace.org/display/DSDOC5x/Release+Notes', 'https://jira.duraspace.org/browse/DS-3094', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10726', 'https://github.com/DSpace/DSpace/releases/tag/dspace-5.5', 'https://github.com/advisories/GHSA-4m9r-5gqp-7j82'}
null
Maven
GHSA-wx5j-54mm-rqqq
HTTP request smuggling in io.netty:netty-codec-http
### Impact Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling. Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.
{'CVE-2021-43797'}
2022-04-22T15:47:44.975474Z
2021-12-09T19:09:17Z
MODERATE
null
{'CWE-444'}
{'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://github.com/netty/netty/pull/11891'}
null
Maven
GHSA-r8h9-hq9c-2p5c
High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core
Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261.
{'CVE-2019-1010260'}
2022-03-03T05:13:09.189464Z
2019-04-08T15:18:54Z
HIGH
null
{'CWE-319'}
{'https://github.com/shyiko/ktlint', 'https://github.com/shyiko/ktlint/pull/332', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010260', 'https://github.com/advisories/GHSA-r8h9-hq9c-2p5c'}
null
Maven
GHSA-5pv7-hx9m-8jh3
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
{'CVE-2022-29051'}
2022-05-05T16:18:16.198799Z
2022-04-13T00:00:16Z
MODERATE
null
{'CWE-862'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'}
null
Maven
GHSA-4hrm-m67v-5cxr
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21346](https://x-stream.github.io/CVE-2021-21346.html). ### Credits wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21346'}
2022-03-03T05:14:00.440111Z
2021-03-22T23:28:49Z
MODERATE
null
{'CWE-502', 'CWE-434'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21346', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-21346.html', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}
null
Maven
GHSA-vgvf-9jh3-fg75
Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser
A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification.
{'CVE-2017-1000207'}
2022-03-03T05:13:31.333536Z
2018-10-19T16:46:30Z
HIGH
null
{'CWE-502'}
{'https://github.com/advisories/GHSA-vgvf-9jh3-fg75', 'https://github.com/swagger-api/swagger-parser/pull/481', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000207', 'https://github.com/swagger-api/swagger-parser'}
null
Maven
GHSA-8cw6-5qvp-q3wj
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.
{'CVE-2018-8024'}
2022-03-03T05:12:50.969477Z
2019-03-14T15:40:57Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8024', 'https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E', 'https://spark.apache.org/security.html#CVE-2018-8024', 'https://github.com/advisories/GHSA-8cw6-5qvp-q3wj'}
null
Maven
GHSA-vjw7-6gfq-6wf5
Path Traversal in Eclipse Vert
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.
{'CVE-2019-17640'}
2022-03-03T05:13:34.325224Z
2022-02-10T20:28:57Z
CRITICAL
null
{'CWE-22', 'CWE-23'}
{'https://mvnrepository.com/artifact/io.vertx/vertx-web', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17640', 'https://lists.apache.org/thread.html/r8d863b148efe778ce5f8f961d0cafeda399e681d3f0656233b4c5511@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rfd0ebf8387cfd0b959d1e218797e709793cce51a5ea2f84d0976f47d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E'}
null
Maven
GHSA-9378-f4v7-jgm4
Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.
{'CVE-2021-41616'}
2022-03-03T05:12:36.929575Z
2021-10-04T20:12:30Z
CRITICAL
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41616', 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E', 'https://github.com/apache/ddlutils'}
null
Maven
GHSA-5429-pjww-7675
SQL Injection in Apache Kylin
Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions.
{'CVE-2021-36774'}
2022-03-03T05:13:01.384718Z
2022-01-08T00:43:04Z
MODERATE
null
{'CWE-668', 'CWE-89'}
{'https://github.com/apache/kylin', 'http://www.openwall.com/lists/oss-security/2022/01/06/5', 'https://github.com/apache/kylin/pull/1646', 'https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36774'}
null
Maven
GHSA-m9w8-v359-9ffr
Moderate severity vulnerability that affects org.apache.activemq:activemq-client
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
{'CVE-2018-11775'}
2022-03-03T05:14:17.511662Z
2018-10-19T16:42:27Z
HIGH
null
{'CWE-295'}
{'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'http://www.securityfocus.com/bid/105335', 'https://github.com/advisories/GHSA-m9w8-v359-9ffr', 'http://www.securitytracker.com/id/1041618', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11775', 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'}
null
Maven
GHSA-f92j-qf46-p6vm
Reflected Cross-site Scripting in ACS Commons
### Impact ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. ### Patches This issue has been resolved in v4.10.0 ### Workarounds No workaround exist. ### References N/A ### For more information If you have any questions or comments about this advisory open an issue in acs-aem-commons. ### Credit This issue was discovered and reported by Christopher Whipp (Christopher.Whipp@servicesaustralia.gov.au).
{'CVE-2021-21028'}
2022-03-03T05:12:54.085750Z
2021-02-02T15:46:52Z
HIGH
null
{'CWE-79', 'CWE-416'}
{'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21028'}
null
Maven
GHSA-mp28-rq7g-qx62
Remote code execution in Apache TomEE
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case.
{'CVE-2020-13931'}
2022-03-03T05:13:32.982473Z
2022-02-09T22:44:38Z
CRITICAL
null
{'CWE-306'}
{'https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13931', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E'}
null
Maven
GHSA-qcjv-wfcg-mmpr
Critical severity vulnerability that affects org.apache.ignite:ignite-core
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint.
{'CVE-2018-8018'}
2022-03-03T05:12:54.977820Z
2018-10-16T20:53:54Z
CRITICAL
null
{'CWE-502'}
{'http://www.securityfocus.com/bid/104911', 'https://github.com/advisories/GHSA-qcjv-wfcg-mmpr', 'https://lists.apache.org/thread.html/e0fdf53114a321142ecfa5cfa17658090f0b4e1677de431e329b37ab@%3Cdev.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8018', 'https://access.redhat.com/errata/RHSA-2018:3768'}
null
Maven
GHSA-8mr5-h28g-36qx
Spring AOP functionality (Struts) vulnerable to DoS attack
When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.
{'CVE-2017-9787'}
2022-04-26T19:15:41.315196Z
2018-10-16T19:37:07Z
HIGH
null
null
{'http://struts.apache.org/docs/s2-049.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9787', 'https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065@%3Cannouncements.struts.apache.org%3E', 'https://github.com/advisories/GHSA-8mr5-h28g-36qx', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'http://www.securitytracker.com/id/1039115', 'http://www.securityfocus.com/bid/99562', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'}
null
Maven
GHSA-p8ww-vv84-c2rm
Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio
The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request.
{'CVE-2015-2912'}
2021-09-16T16:14:54Z
2018-10-18T17:41:13Z
HIGH
null
{'CWE-352'}
{'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/orientechnologies/orientdb', 'https://github.com/orientechnologies/orientdb/issues/4824', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2912', 'https://github.com/advisories/GHSA-p8ww-vv84-c2rm'}
null
Maven
GHSA-4mq5-mj59-qq9c
Allocation of Resources Without Limits or Throttling in Apache Tika
In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later.
{'CVE-2019-10093'}
2022-03-03T05:12:51.622292Z
2019-08-06T01:43:38Z
MODERATE
null
{'CWE-770'}
{'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20190828-0004/', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html'}
null
Maven
GHSA-7qw5-pqhc-xm4g
Users with SCRIPT right can execute arbitrary code in XWiki
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. ### Patches It has been patched in both version XWiki 12.2.1 and XWiki 11.10.5. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17266 It's been reported by the GitHub Security Lab under #GHSL-2020-046. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2020-15171'}
2021-11-19T15:29:44Z
2020-09-10T19:19:27Z
LOW
null
{'CWE-74', 'CWE-94'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15171', 'https://github.com/xwiki/xwiki-platform'}
null
Maven
GHSA-qwh6-xwj4-9cjg
Remote code execution in net.mingsoft:ms-mcms
net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
{'CVE-2021-46384'}
2022-03-14T23:02:01.245091Z
2022-03-05T00:00:41Z
CRITICAL
null
{'CWE-287'}
{'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384'}
null
Maven
GHSA-rcjj-h6gh-jf3r
Information Disclosure in Apache Groovy
Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.
{'CVE-2020-17521'}
2022-04-22T18:30:45.285392Z
2020-12-09T19:03:03Z
MODERATE
null
{'CWE-379'}
{'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://github.com/apache/groovy', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17521', 'https://groovy-lang.org/security.html#CVE-2020-17521', 'https://github.com/apache/groovy/pull/1425', 'https://security.netapp.com/advisory/ntap-20201218-0006/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'}
null
Maven
GHSA-p8jx-x2vw-wm33
High severity vulnerability that affects org.apache.storm:storm-core
In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user.
{'CVE-2018-1331'}
2022-03-03T05:11:47.704491Z
2018-10-17T19:48:06Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1331', 'https://github.com/advisories/GHSA-p8jx-x2vw-wm33', 'http://storm.apache.org/2018/06/04/storm122-released.html', 'http://www.openwall.com/lists/oss-security/2018/07/10/4', 'http://www.securityfocus.com/bid/104732', 'http://www.securitytracker.com/id/1041273', 'http://storm.apache.org/2018/06/04/storm113-released.html'}
null
Maven
GHSA-9f52-hpvw-v96w
Improper Validation of Specified Quantity in Input in Eclipse Hono
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception.
{'CVE-2020-27217'}
2022-03-03T05:12:58.108965Z
2022-02-10T20:22:06Z
HIGH
null
{'CWE-1284'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27217'}
null
Maven
GHSA-q8xj-8xg3-w432
Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12
Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code).
{'CVE-2018-18854'}
2022-03-03T05:13:15.672988Z
2018-11-09T17:41:35Z
HIGH
null
{'CWE-400'}
{'https://github.com/spray/spray-json/issues/277', 'https://github.com/spray/spray-jso', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18854', 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'}
null
Maven
GHSA-rjww-2x8v-m9v9
Potential sensitive data exposure in applications using Vaadin 15
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` - https://vaadin.com/security/cve-2020-36319
{'CVE-2020-36319'}
2022-03-03T05:12:58.940843Z
2021-04-19T14:52:14Z
LOW
null
{'CWE-200'}
{'https://github.com/vaadin/flow/pull/8051', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319', 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9', 'https://github.com/vaadin/flow/pull/8016', 'https://vaadin.com/security/cve-2020-36319'}
null
Maven
GHSA-3h29-52vh-pqgr
Uncontrolled Resource Consumption in Apache Tika
A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23.
{'CVE-2020-1950'}
2022-03-03T05:13:58.897227Z
2021-05-07T15:53:48Z
MODERATE
null
{'CWE-400'}
{'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://usn.ubuntu.com/4564-1/', 'https://lists.apache.org/thread.html/r463b1a67817ae55fe022536edd6db34e8f9636971188430cbcf8a8dd%40%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1950', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-rmr5-cpv2-vgjf
Denial of Service by injecting highly recursive collections or maps in XStream
### Impact The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. ### Patches XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. ### Workarounds The attack uses the hash code implementation for collections and maps to force an exponential calculation time due to highly recursive structures with in the collection or map. Following types of the Java runtime are affected in Java versions available in December 2021: - java.util.HashMap - java.util.HashSet - java.util.Hashtable - java.util.LinkedHashMap - java.util.LinkedHashSet - java.util.Stack (older Java revisions only) - java.util.Vector (older Java revisions only) - Other third party collection implementations that use their element's hash code may also be affected If your object graph does not use referenced elements at all, you may simply set the NO_REFERENCE mode: ```Java XStream xstream = new XStream(); xstream.setMode(XStream.NO_REFERENCES); ``` If your object graph contains neither a Hashtable, HashMap nor a HashSet (or one of the linked variants of it) then you can use the security framework to deny the usage of these types: ```Java XStream xstream = new XStream(); xstream.denyTypes(new Class[]{ java.util.HashMap.class, java.util.HashSet.class, java.util.Hashtable.class, java.util.LinkedHashMap.class, java.util.LinkedHashSet.class }); ``` Unfortunately these types are very common. If you only use HashMap or HashSet and your XML refers these only as default map or set, you may additionally change the default implementation of java.util.Map and java.util.Set at unmarshalling time:: ```Java xstream.addDefaultImplementation(java.util.TreeMap.class, java.util.Map.class); xstream.addDefaultImplementation(java.util.TreeSet.class, java.util.Set.class); ``` However, this implies that your application does not care about the implementation of the map and all elements are comparable. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html). ### Credits The vulnerability was discovered and reported by r00t4dm at Cloud-Penetrating Arrow Lab. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-43859'}
2022-04-22T15:47:34.675024Z
2022-02-01T00:48:15Z
HIGH
null
{'CWE-502', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43859', 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846', 'https://x-stream.github.io/CVE-2021-43859.html', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00018.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XODFRE2ZL64FICBJDOPWOLPTSSAI4U7X/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VACQYG356OHUTD5WQGAQ4L2TTFTAV3SJ/', 'https://github.com/x-stream/xstream/', 'http://www.openwall.com/lists/oss-security/2022/02/09/1'}
null
Maven
GHSA-645p-88qh-w398
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
{'CVE-2018-14718'}
2022-03-03T05:12:37.404567Z
2019-01-04T19:06:55Z
CRITICAL
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/advisories/GHSA-645p-88qh-w398', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/106601', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4452'}
null
Maven
GHSA-3x7h-5hfr-hvjm
Moderate severity vulnerability that affects io.undertow:undertow-core
It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
{'CVE-2017-2670'}
2022-03-03T05:14:17.716139Z
2018-10-19T16:54:56Z
MODERATE
null
{'CWE-835'}
{'https://github.com/advisories/GHSA-3x7h-5hfr-hvjm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2670'}
null
Maven
GHSA-fmqw-vqh5-cwq9
Apache NiFi user log out issue
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.
{'CVE-2019-12421'}
2022-03-03T05:14:10.558352Z
2019-12-02T18:19:39Z
HIGH
null
{'CWE-613'}
{'https://nifi.apache.org/security.html#CVE-2019-12421', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/apache/nifi/pull/3362'}
null
Maven
GHSA-f9pg-g9xw-r5g2
SQL Injection in Jeecg-boot
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.
{'CVE-2022-22881'}
2022-03-03T05:12:53.635388Z
2022-02-17T00:00:25Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22881', 'https://github.com/jeecgboot/jeecg-boot/issues/3348'}
null
Maven
GHSA-h8q5-g2cj-qr5h
Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack
In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.
{'CVE-2018-11796'}
2022-04-26T22:00:11.236469Z
2018-10-17T15:43:25Z
HIGH
null
{'CWE-611'}
{'http://www.securityfocus.com/bid/105585', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11796', 'https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190903-0002/', 'https://github.com/apache/tika', 'https://github.com/advisories/GHSA-h8q5-g2cj-qr5h'}
null
Maven
GHSA-3w6p-8f82-gw8r
Using JMSAppender in log4j configuration may lead to deserialization of untrusted data
### Impact ClickHouse JDBC Bridge uses [slf4j-log4j12 1.7.32](https://repo1.maven.org/maven2/org/slf4j/slf4j-log4j12/1.7.32/), which depends on [log4j 1.2.17](https://repo1.maven.org/maven2/log4j/log4j/1.2.17/). It allows a remote attacker to execute code on the server, if you changed default log4j configuration by adding JMSAppender and an insecure JMS broker. ### Patches The patch version `2.0.7` removed log4j dependency by replacing `slf4j-log4j12` to `slf4j-jdk14`. Logging configuration is also changed from `log4j.properties` to `logging.properties`. ### Workarounds 1. Do NOT change log4j configuration to use JMSAppender along with insecure JMS broker 2. Alternatively, you can issue below command to remove `JMSAppender.class`: ```(bash) # install zip command if you don't have apt-get update && apt-get install -y zip # remove the class zip -d clickhouse-jdbc-bridge*.jar ru/yandex/clickhouse/jdbcbridge/internal/log4j/net/JMSAppender.class ``` ### References Please refer to [CVE-2021-4104](https://access.redhat.com/security/cve/CVE-2021-4104) to read more. ### For more information If you have any questions or comments about this advisory, please feel free to open an issue in the repository.
null
2022-03-03T05:13:47.954772Z
2021-12-17T20:42:38Z
HIGH
null
{'CWE-502'}
{'https://access.redhat.com/security/cve/CVE-2021-4104', 'https://github.com/ClickHouse/clickhouse-jdbc-bridge/security/advisories/GHSA-3w6p-8f82-gw8r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104', 'https://github.com/ClickHouse/clickhouse-jdbc-bridge'}
null
Maven
GHSA-24ww-mc5x-xc43
Man-in-the-middle attack in Apache Cassandra
In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely.
{'CVE-2020-13946'}
2022-03-03T05:13:19.119160Z
2021-05-07T15:54:46Z
MODERATE
null
{'CWE-668'}
{'https://lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce@%3Cuser.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cuser.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13946', 'https://security.netapp.com/advisory/ntap-20210521-0005/', 'https://lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7@%3Cuser.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc@%3Cuser.cassandra.apache.org%3E'}
null
Maven
GHSA-767j-jfh2-jvrc
Potential HTTP request smuggling in Apache Tomcat
The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
{'CVE-2019-17569'}
2022-03-03T05:13:14.475639Z
2020-02-28T01:10:58Z
MODERATE
null
{'CWE-444'}
{'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'https://security.netapp.com/advisory/ntap-20200327-0005/', 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17569', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-v9j2-q4q5-cxh4
No CSRF protection on the password change form
### Impact It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki. ### Patches The problem has been patched in XWiki 12.10.5, 13.2RC1. ### Workarounds It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257. ### References https://jira.xwiki.org/browse/XWIKI-18315 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
{'CVE-2021-32730'}
2021-07-02T16:41:31Z
2021-07-02T19:19:13Z
MODERATE
null
{'CWE-352'}
{'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4', 'https://jira.xwiki.org/browse/XWIKI-18315', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730'}
null
Maven
GHSA-6jv7-28mv-qp9c
Missing permission check in Jenkins autonomiq Plugin
A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
{'CVE-2022-25195'}
2022-05-04T20:59:04Z
2022-02-16T00:01:23Z
MODERATE
null
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25195', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545'}
null
Maven
GHSA-2pwh-52h7-7j84
JavaScript execution via malicious molfiles (XSS)
### Impact The viewer plugin implementation of `<mol:molecule>` renders molfile data directly inside a `<script>` tag without any escaping. Arbitrary JavaScript code can thus be executed in the client browser via crafted molfiles. ### Patches Patched in v0.3.0: Molfile data is now rendered as value of a hidden `<input>` tag and escaped via JSF's mechanisms. ### Workarounds No workaround available.
null
2022-03-03T05:13:10.415702Z
2021-04-16T19:52:49Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ipb-halle/MolecularFaces/security/advisories/GHSA-2pwh-52h7-7j84'}
null
Maven
GHSA-whw7-h25v-9qvx
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, and org.apache.cxf.fediz:fediz-spring2
Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4.
{'CVE-2017-7661'}
2022-03-03T05:12:46.188219Z
2018-10-18T16:56:38Z
MODERATE
null
{'CWE-352'}
{'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://www.securitytracker.com/id/1038497', 'http://cxf.apache.org/security-advisories.data/CVE-2017-7661.txt.asc', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-whw7-h25v-9qvx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7661', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-2xpp-75vr-22vq
Low severity vulnerability that affects org.apache.nifi:nifi
The X-Frame-Options headers were applied inconsistently on some HTTP responses, resulting in duplicate or missing security headers. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. Mitigation: The fix to consistently apply the security headers was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
{'CVE-2018-17192'}
2022-03-03T05:13:51.907236Z
2018-12-20T22:02:24Z
MODERATE
null
{'CWE-1021'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17192', 'https://nifi.apache.org/security.html#CVE-2018-17192', 'https://github.com/advisories/GHSA-2xpp-75vr-22vq'}
null
Maven
GHSA-q39c-5vh5-vw2p
Improper Authentication in Apereo CAS
Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication.
{'CVE-2020-27178'}
2022-03-03T05:11:21.845366Z
2021-08-02T16:47:10Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27178', 'https://apereo.github.io/2020/10/14/gauthvuln/'}
null
Maven
GHSA-h6qv-f5gf-8gcf
Missing Authorization in Jenkins P4 plugin
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.
{'CVE-2021-21654'}
2021-05-19T18:33:13Z
2021-06-16T17:29:35Z
MODERATE
null
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21654', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}
null
Maven
GHSA-3rhm-67j6-42jq
Moderate severity vulnerability that affects com.jason-goodwin:authentikat-jwt_2.12
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.
{'CVE-2017-18239'}
2022-03-03T05:13:53.187473Z
2018-11-09T17:50:40Z
CRITICAL
null
null
{'https://github.com/advisories/GHSA-3rhm-67j6-42jq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239', 'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0', 'https://github.com/jasongoodwin/authentikat-jwt', 'https://github.com/jasongoodwin/authentikat-jwt/issues/12', 'https://github.com/jasongoodwin/authentikat-jwt/pull/36'}
null
Maven
GHSA-m59c-jpc8-m2x4
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder
An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.
{'CVE-2018-1336'}
2022-04-27T13:45:11.459717Z
2018-10-17T16:32:18Z
HIGH
null
{'CWE-835'}
{'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2701', 'https://access.redhat.com/errata/RHSA-2018:2921', 'https://support.f5.com/csp/article/K73008537?utm_source=f5support&amp;utm_medium=RSS', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html', 'https://usn.ubuntu.com/3723-1/', 'http://www.securityfocus.com/bid/104898', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2945', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041375', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2018:2700', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHEA-2018:2189', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1336', 'https://www.debian.org/security/2018/dsa-4281', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2930', 'https://github.com/advisories/GHSA-m59c-jpc8-m2x4', 'https://access.redhat.com/errata/RHEA-2018:2188'}
null
Maven
GHSA-jcq3-cprp-m333
Privilege escalation in mysql-connector-jav
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
{'CVE-2019-2692'}
2022-03-03T05:14:11.644457Z
2020-07-01T17:12:20Z
MODERATE
null
{'CWE-843'}
{'http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.securityfocus.com/bid/107925', 'https://security.netapp.com/advisory/ntap-20190423-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692', 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574'}
null
Maven
GHSA-f68h-hfqp-8rmv
Path Traversal in Crafter CMS Crafter Studio
Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system.
{'CVE-2017-15684'}
2022-03-03T05:09:47.421296Z
2022-02-09T23:08:03Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15684', 'http://crafter.com', 'https://docs.craftercms.org/en/3.0/security/advisory.html'}
null
Maven
GHSA-3hrc-f439-727g
Moderate severity vulnerability that affects org.apache.camel:camel-core
XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource.
{'CVE-2015-0263'}
2022-03-03T05:14:16.535754Z
2018-10-16T23:08:43Z
MODERATE
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-3hrc-f439-727g', 'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0263', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'http://www.securitytracker.com/id/1032442', 'https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36'}
null
Maven
GHSA-g99m-3m46-4gm9
Infinite Loop in Apache Sanselan
Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
{'CVE-2018-17202'}
2022-03-03T05:13:15.458457Z
2019-05-14T04:00:47Z
HIGH
null
{'CWE-835'}
{'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202'}
null
Maven
GHSA-3gx9-37ww-9qw6
Code injection in Spring Cloud Gateway
In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host.
{'CVE-2022-22947'}
2022-04-26T21:00:24.753629Z
2022-03-04T00:00:15Z
CRITICAL
null
{'CWE-94'}
{'http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22947', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://tanzu.vmware.com/security/cve-2022-22947'}
null
Maven
GHSA-5mf7-26mw-3rqr
Moderate severity vulnerability that affects org.apache.tika:tika-core
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.
{'CVE-2018-1338'}
2022-03-03T05:13:16.144258Z
2018-10-17T15:50:45Z
MODERATE
null
{'CWE-835'}
{'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-5mf7-26mw-3rqr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1338', 'https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E'}
null
Maven
GHSA-xrr9-rh8p-433v
Request smuggling is possible when both chunked TE and content length specified
### Impact Request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle alone \n as a headers separator. ### Patches https://github.com/ktorio/ktor/pull/1547 ### Workarounds None except migrating to a better proxy. ### References https://portswigger.net/web-security/request-smuggling https://tools.ietf.org/html/rfc7230#section-9.5
{'CVE-2020-5207'}
2022-03-03T05:13:17.260116Z
2020-01-27T19:28:40Z
LOW
null
{'CWE-444'}
{'https://github.com/ktorio/ktor/pull/1547', 'https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5207'}
null
Maven
GHSA-338v-3958-8v8r
Information disclosure in JBoss Weld
Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state.
{'CVE-2014-8122'}
2022-03-03T05:12:41.722214Z
2020-06-10T20:54:15Z
MODERATE
null
{'CWE-362'}
{'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086', 'http://rhn.redhat.com/errata/RHSA-2015-0217.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8122', 'http://rhn.redhat.com/errata/RHSA-2015-0218.html', 'http://rhn.redhat.com/errata/RHSA-2015-0215.html', 'http://www.securityfocus.com/bid/74252', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://www.securitytracker.com/id/1031741', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100892', 'http://rhn.redhat.com/errata/RHSA-2015-0216.html', 'http://rhn.redhat.com/errata/RHSA-2015-0773.html', 'https://github.com/weld/core/', 'https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml', 'http://rhn.redhat.com/errata/RHSA-2015-0920.html', 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65'}
null
Maven
GHSA-7qmg-qg53-mrp8
Cross-site scripting in Apache JSPWiki
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to InfoContent.jsp, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
{'CVE-2019-12404'}
2022-03-03T05:12:17.330345Z
2019-10-11T18:41:59Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12404', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-12404'}
null
Maven
GHSA-pc22-3g76-gm6j
Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. #### Java Code The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 ### Patches Fix has been applied to the master branch with: * https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89 included in release: 2.4.19 ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information If you have any questions or comments about this advisory: * Email us at [security@swagger.io](mailto:security@swagger.io) #### Original vulnerability report > I'm performing OSS security research under the GitHub Security Lab Bug Bounty program. > I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries. > > - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f > - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac > - https://github.com/github/codeql/pull/4473 > > The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. > > --- > > This vulnerability exists in the maven plugin. > > This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability. > > https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 > > This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project. > > https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 > > This is due to a race condition between the call to `delete` and the call to `mkdirs`. > > ```java > // ensure file will always be unique by appending random digits > File outputFolder = File.createTempFile("codegen-", "-tmp"); // Attacker knows the full path of the file that will be generated > // delete the file that was created > outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator. > // and make a directory of the same name > // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory > outputFolder.mkdirs(); > ``` > > This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. > > The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions. >
{'CVE-2021-21363'}
2022-03-03T05:13:14.024392Z
2021-03-11T03:09:16Z
LOW
null
{'CWE-379', 'CWE-378'}
{'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j'}
null
Maven
GHSA-558x-2xjg-6232
Allocation of Resources Without Limits or Throttling in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0 - 5.2.19, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
{'CVE-2022-22950'}
2022-04-12T15:31:51.092026Z
2022-04-03T00:01:00Z
MODERATE
null
{'CWE-770'}
{'https://tanzu.vmware.com/security/cve-2022-22950', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22950'}
null
Maven
GHSA-r8j4-96mx-rjcc
Improper Restriction of XML External Entity Reference in skylot/jadx
skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure.
{'CVE-2022-0219'}
2022-03-03T05:13:21.676040Z
2022-01-21T18:13:42Z
MODERATE
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0219', 'https://github.com/skylot/jadx', 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e', 'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'}
null
Maven
GHSA-cpcr-74q9-74gp
Broken Authentication in Atlassian Connect Spring Boot
Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3. Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
{'CVE-2021-26074'}
2022-03-07T20:47:35.451950Z
2021-05-10T15:19:04Z
MODERATE
null
{'CWE-863', 'CWE-287'}
{'https://confluence.atlassian.com/pages/viewpage.action?pageId=1051986106', 'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26074'}
null
Maven
GHSA-869j-5855-hjpm
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf and org.apache.karaf:karaf
Apache Karaf kar deployer reads .kar archives and extracts the paths from the "repository/" and "resources/" entries in the zip file. It then writes out the content of these paths to the Karaf repo and resources directories. However, it doesn't do any validation on the paths in the zip file. This means that a malicious user could craft a .kar file with ".." directory names and break out of the directories to write arbitrary content to the filesystem. This is the "Zip-slip" vulnerability - https://snyk.io/research/zip-slip-vulnerability. This vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf releases prior 4.2.3 is impacted.
{'CVE-2019-0191'}
2022-03-03T05:13:26.317059Z
2019-03-25T16:16:44Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0191', 'http://www.securityfocus.com/bid/107462', 'https://lists.apache.org/thread.html/6856aa7ed7dd805eaf65d0e5e95027dda3b2307aacd1ab4a838c5cd1@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/cef9a2d4b547625e5214684283ac5c59c9d9740e092e777dc3f85070@%3Ccommits.karaf.apache.org%3E', 'https://github.com/advisories/GHSA-869j-5855-hjpm'}
null
Maven
GHSA-xcrm-qpp8-hcw4
Moderate severity vulnerability that affects org.apache.struts:struts2-rest-plugin
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
{'CVE-2017-15707'}
2022-03-03T05:13:18.667698Z
2018-10-16T19:35:55Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15707', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://www.securityfocus.com/bid/102021', 'http://www.securitytracker.com/id/1039946', 'https://security.netapp.com/advisory/ntap-20171214-0001/', 'https://github.com/advisories/GHSA-xcrm-qpp8-hcw4', 'https://cwiki.apache.org/confluence/display/WW/S2-054'}
null
Maven
GHSA-9295-mhf3-v33m
Insecure temporary file in Netflix OSS Hollow
> ID: NFLX-2021-001 > Title: Local information disclosure in Hollow > Release Date: 2021-03-23 > Credit: Security Researcher @JLLeitschuh # Overview Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it. # Impact An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process. # Description Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated. # Workarounds and Fixes Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release.
{'CVE-2021-28099'}
2022-03-03T05:13:01.545840Z
2021-03-29T18:25:26Z
MODERATE
null
{'CWE-377'}
{'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md', 'https://github.com/Netflix/hollow/issues/502', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099'}
null
Maven
GHSA-jmf4-pq78-f8vj
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
{'CVE-2018-1314'}
2022-03-03T05:14:17.862578Z
2018-11-21T22:24:50Z
MODERATE
null
{'CWE-862'}
{'https://github.com/advisories/GHSA-jmf4-pq78-f8vj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1314', 'http://www.securityfocus.com/bid/105884', 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'}
null
Maven
GHSA-fr26-qjc8-mvjx
Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19
Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.
null
2022-03-03T05:13:54.990381Z
2021-10-13T18:56:12Z
MODERATE
null
null
{'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx', 'https://vaadin.com/security/cve-2021-31412'}
null
Maven
GHSA-rp4x-wxqv-cf9m
Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13
Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. - https://vaadin.com/security/cve-2019-25027
{'CVE-2019-25027'}
2022-03-03T05:13:40.240510Z
2021-04-19T14:52:29Z
MODERATE
null
{'CWE-79', 'CWE-81'}
{'https://github.com/vaadin/flow/pull/5498', 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027', 'https://vaadin.com/security/cve-2019-25027'}
null
Maven
GHSA-45xm-v8gq-7jqx
Excessive memory allocation
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the WebSocket HTTP upgrade implementation buffers the full http request before doing the handshake, holding the entire request body in memory. There should be a reasonnable limit (8192 bytes) above which the WebSocket gets an HTTP response with the 413 status code and the connection gets closed.
{'CVE-2018-12541'}
2022-04-25T20:32:01.190663Z
2018-10-17T16:19:59Z
MODERATE
null
{'CWE-119', 'CWE-789'}
{'https://lists.apache.org/thread.html/rbdc279ecdb7ac496a03befb05a53605c4ce2b67e14f8f4df4cfa1203@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r11789cd6d67ecca2d6f6bbb11e34495e68ee99287b6c59edf5b1a09c@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12541', 'https://lists.apache.org/thread.html/r8db0431ecf93f2dd2128db5ddca897b33ba883b7f126648d6a9e4c47@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539170', 'https://access.redhat.com/errata/RHSA-2018:2946', 'https://lists.apache.org/thread.html/r79789a0afb184abd13a2c07016e6e7ab8e64331f332b630bf82a2eed@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-45xm-v8gq-7jqx', 'https://lists.apache.org/thread.html/r344235b1aea2f7fa2381495df1d77d02b595e3d7e4626e701f7c1062@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r362835e6c7f34324ed24e318b363fcdd20cea91d0cea0b2e1164f73e@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/reb3cc4f3e10264896a541813c0030ec9d9466ba9b722fe5d4adc91cd@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3da899890536af744dec897fbc561fd9810ac45e79a16164b53c31b2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01123837ffbfdf5809e0a4ac354ad546e4ca8f18df89ee5a10eeb81b@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r98dc06e2b1c498d0e9eb5038d8e1aefd24e411e50522e7082dd9e0b7@%3Ccommits.bookkeeper.apache.org%3E', 'https://github.com/eclipse-vertx/vert.x/issues/2648', 'https://lists.apache.org/thread.html/re5ddabee26fbcadc7254d03a5a073d64080a9389adc9e452529664ed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1af71105539fe01fcecb92d2ecd8eea56c515fb1c80ecab4df424553@%3Cissues.bookkeeper.apache.org%3E', 'https://github.com/eclipse-vertx/vert.x'}
null
Maven
GHSA-jvpp-hxjj-5ccc
Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ
It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.
{'CVE-2015-7559'}
2022-03-03T05:13:42.748518Z
2019-08-01T19:17:45Z
MODERATE
null
{'CWE-20', 'CWE-306'}
{'https://issues.apache.org/jira/browse/AMQ-6470', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7559', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559'}
null
Maven
GHSA-c9hw-wf7x-jp9j
Improper Privilege Management in Tomcat
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
{'CVE-2020-1938'}
2022-05-02T16:36:38.159228Z
2020-06-15T18:51:21Z
CRITICAL
null
{'CWE-269'}
{'https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'http://support.blackberry.com/kb/articleDetail?articleNumber=000062739', 'https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200226-0002/', 'https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html', 'https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/', 'https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1938', 'https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E'}
null
Maven
GHSA-j8jw-g6fq-mp7h
SQL injection in hibernate-core
"A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity."
{'CVE-2020-25638'}
2022-04-22T17:30:10.500218Z
2022-02-09T22:57:29Z
HIGH
null
{'CWE-89'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25638', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00000.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1881353', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4908', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E'}
null
Maven
GHSA-x3rh-m7vp-35f2
Operation on a Resource after Expiration or Release in Jetty Server
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.).
{'CVE-2019-17638'}
2022-03-03T05:13:52.159814Z
2020-08-05T14:52:59Z
CRITICAL
null
{'CWE-675', 'CWE-672'}
{'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba', 'https://github.com/eclipse/jetty.project/issues/4936', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17638', 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/', 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984', 'http://www.openwall.com/lists/oss-security/2020/08/17/1', 'https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561', 'https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E'}
null
Maven
GHSA-6h7w-fc84-x7p6
StaticFile.fromUrl can leak presence of a directory
### Impact `StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed. This affects http4s versions: * 0.21.7 through 0.21.23 * 0.22.0-M1 through 0.22.0-M8 * 0.23.0-M1 * 1.0.0-M1 through 1.0.0-M22 ### Patches The [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions: * v0.21.24 * v0.22.0-RC1 * v0.23.0-RC1 * v1.0.0-M23 Note: a previous version of this advisory incorrectly referred to 0.22.0-M9 and 0.23.0-M2. ### Workarounds Don't call `StaticFile.fromUrl` with non-file URLs. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the http4s repository](https://github.com/http4s/http4s) * Disclose further vulnerabilities according to the [http4s security policy](https://github.com/http4s/http4s/blob/main/SECURITY.md)
{'CVE-2021-32643'}
2021-05-27T21:17:06Z
2021-05-28T15:54:39Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32643', 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9', 'https://mvnrepository.com/artifact/org.http4s/http4s-core', 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6'}
null
Maven
GHSA-23gj-368h-92pq
Path Traversal in DKPro Core
core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive.
{'CVE-2019-11082'}
2022-03-03T05:13:29.151405Z
2019-05-29T18:05:11Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11082', 'https://github.com/dkpro/dkpro-core/issues/1325'}
null
Maven
GHSA-gp32-7h29-rpxm
Moderate severity vulnerability that affects com.puppycrawl.tools:checkstyle
Checkstyle prior to 8.18 loads external DTDs by default, which can potentially lead to denial of service attacks or the leaking of confidential information.
{'CVE-2019-9658'}
2022-03-03T05:13:06.051976Z
2019-03-14T15:39:14Z
MODERATE
null
{'CWE-611'}
{'https://github.com/checkstyle/checkstyle', 'https://lists.apache.org/thread.html/fff26ee7b59360a0264fef4e8ed9454ef652db2c39f2892a9ea1c9cb@%3Cnotifications.fluo.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/994221405e940e148adcfd9cb24ffc6700bed70c7820c55a22559d26@%3Cnotifications.fluo.apache.org%3E', 'https://github.com/checkstyle/checkstyle/pull/6476', 'https://checkstyle.org/releasenotes.html#Release_8.18', 'https://github.com/advisories/GHSA-gp32-7h29-rpxm', 'https://lists.apache.org/thread.html/7eea10e7be4c21060cb1e79f6524c6e6559ba833b1465cd2870a56b9@%3Cserver-dev.james.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/04/msg00029.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BMOPJ2XYE4LB2HM7OMSUBBIYEDUTLWE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJPT54USMGWT3Y6XVXLDEHKRUY2EI4OE/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9658', 'https://github.com/checkstyle/checkstyle/issues/6478', 'https://github.com/checkstyle/checkstyle/issues/6474', 'https://lists.apache.org/thread.html/6bf8bbbca826e883f09ba40bc0d319350e1d6d4cf4df7c9e399b2699@%3Ccommits.fluo.apache.org%3E', 'https://lists.apache.org/thread.html/a35a8ccb316d4c2340710f610cba8058e87d5376259b35ef3ed2bf89@%3Cnotifications.accumulo.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEYBAHYAV37WHMOXZYM2ZWF46FHON6YC/'}
null
Maven
GHSA-phwj-86vx-cfjc
Cross-site scripting in Apache Jena Fuseki
A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive).
{'CVE-2021-33192'}
2022-03-03T05:14:21.928075Z
2021-08-13T15:21:35Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33192'}
null
Maven
GHSA-673j-qm5f-xpv8
Arbitrary File Write Vulnerability
### Overview The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers that level of control. It's not the job of the pgjdbc driver to decide whether a given log file location is acceptable. End user applications that use the pgjdbc driver must ensure that filenames are valid and restrict unauthenticated attackers from being able to supply arbitrary values. That's not specific to the pgjdbc driver either, it would be true for any library that can write to the application's local file system. While we do not consider this a security issue with the driver, we have decided to remove the loggerFile and loggerLevel connection properties in the next release of the driver. Removal of those properties does not make exposing the JDBC URL or connection properties to an attacker safe and we continue to suggest that applications do not allow untrusted users to specify arbitrary connection properties. We are removing them to prevent misuse and their functionality can be delegated to java.util.logging. If you identify an application that allows remote users to specify a complete JDBC URL or properties without validating it's contents, we encourage you to notify the application owner as that may be a security defect in that specific application. ### Impact It is possible to specify an arbitrary filename in the loggerFileName connection parameter "jdbc:postgresql://localhost:5432/test?user=test&password=test&loggerLevel=DEBUG&loggerFile=./blah.jsp&<%Runtime.getRuntime().exec(request.getParameter(\"i\"));%>" This creates a valid JSP file which could lead to a Remote Code Execution ### Patches Problem has been resolved in version 42.3.3 ### Workarounds sanitize the inputs to the driver
null
2022-03-03T05:13:55.969503Z
2022-02-16T00:08:18Z
MODERATE
null
null
{'https://github.com/pgjdbc/pgjdbc', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8', 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'}
null
Maven
GHSA-2hw2-62cp-p9p7
Access control bypass in Apache ZooKeeper
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
{'CVE-2019-0201'}
2022-03-03T05:13:15.782066Z
2019-05-29T18:54:11Z
MODERATE
null
{'CWE-862'}
{'https://access.redhat.com/errata/RHSA-2019:3892', 'https://www.debian.org/security/2019/dsa-4461', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201', 'https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://seclists.org/bugtraq/2019/Jun/13', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://issues.apache.org/jira/browse/ZOOKEEPER-1392', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://zookeeper.apache.org/security.html#CVE-2019-0201', 'https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html', 'https://security.netapp.com/advisory/ntap-20190619-0001/', 'https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E', 'http://www.securityfocus.com/bid/108427'}
null
Maven
GHSA-ghm8-mmx7-xvg2
Information Exposure in Apache Tapestry
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.
{'CVE-2021-30638'}
2022-03-18T18:02:33.418375Z
2022-03-18T17:53:58Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30638', 'http://www.openwall.com/lists/oss-security/2021/04/27/3', 'https://security.netapp.com/advisory/ntap-20210528-0004/', 'https://www.zerodayinitiative.com/advisories/ZDI-21-491/', 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E'}
null
Maven
GHSA-mm44-wc5p-wqhq
Denial of service due to reference expansion in versions earlier than 4.0
### Impact The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved. The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication. ### Patches This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library. ### Workarounds Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution. In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows: CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false")); In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows: if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) { cbor.EncodeToBytes(); } Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory. LimitedMemoryStream stream = new LimitedMemoryStream(100000); // Limit to 100000 bytes cbor.WriteTo(stream); return stream.ToBytes(); To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings). ### References See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253). ### For more information If you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
null
2022-03-03T05:13:21.899317Z
2020-07-07T16:45:24Z
HIGH
null
null
{'https://github.com/peteroupc/CBOR-Java', 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq'}
null
Maven
GHSA-hv53-q76c-7f8c
OS Command Injection in OpenTSDB
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
{'CVE-2020-35476'}
2022-03-03T05:13:01.818108Z
2021-08-02T17:02:21Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35476', 'https://github.com/OpenTSDB/opentsdb/issues/2051'}
null
Maven
GHSA-wcp5-m52f-mhh5
Improper Restriction of XML External Entity Reference in MPXJ
"MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components."
{'CVE-2020-25020'}
2022-03-03T05:14:17.857779Z
2021-05-07T15:54:36Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020', 'https://github.com/joniles/mpxj/releases/tag/v8.1.4', 'https://www.oracle.com/security-alerts/cpujan2021.html'}
null
Maven
GHSA-g973-978j-2c3p
Denial of Service in SheetJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.
{'CVE-2021-32014'}
2022-03-03T05:14:12.644117Z
2021-07-22T19:47:15Z
MODERATE
null
{'CWE-345', 'CWE-400'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014'}
null
Maven
GHSA-9xcj-c8cr-8c3c
In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
{'CVE-2019-17563'}
2022-03-03T05:13:32.952120Z
2019-12-26T18:22:26Z
HIGH
null
{'CWE-384'}
{'https://seclists.org/bugtraq/2019/Dec/43', 'https://usn.ubuntu.com/4251-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200107-0001/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'}
null
Maven
GHSA-qmqc-x3r4-6v39
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14893'}
2022-03-03T05:13:31.341201Z
2020-05-15T18:59:07Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://security.netapp.com/advisory/ntap-20200327-0006/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-p8p6-rcp6-4mrm
Uncontrolled Recursion in Play Framework
In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents.
{'CVE-2020-26883'}
2021-04-22T16:54:42Z
2022-02-10T20:23:01Z
HIGH
null
{'CWE-674'}
{'https://www.playframework.com/security/vulnerability/CVE-2020-26883-JsonParseUncontrolledRecursion', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26883', 'https://github.com/playframework/playframework/pull/10495'}
null