ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-q485-j897-qc27 | Moderate severity vulnerability that affects com.mchange:c3p0 | c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization. | {'CVE-2018-20433'} | 2022-03-03T05:13:58.482425Z | 2019-01-07T19:14:34Z | CRITICAL | null | {'CWE-611'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/', 'https://github.com/zhutougg/c3p0', 'https://github.com/advisories/GHSA-q485-j897-qc27', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/', 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b', 'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'} | null |
Maven | GHSA-v4qh-6367-4cx2 | Server-Side Request Forgery (SSRF) in Apache Olingo | Apache Olingo versions 4.0.0 to 4.7.0 provide the AsyncRequestWrapperImpl class which reads a URL from the Location header, and then sends a GET or DELETE request to this URL. It may allow to implement a SSRF attack. If an attacker tricks a client to connect to a malicious server, the server can make the client call any URL including internal resources which are not directly accessible by the attacker. | {'CVE-2020-1925'} | 2022-03-03T05:13:40.845210Z | 2020-02-04T22:38:38Z | HIGH | null | {'CWE-918'} | {'https://mail-archives.apache.org/mod_mbox/olingo-user/202001.mbox/%3CCAGSZ4d6HwpF2woOrZJg_d0SkHytXJaCtAWXa3ZtBn33WG0YFvw%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1925'} | null |
Maven | GHSA-6v39-p2xq-g5c3 | Missing authentication in ShenYu | User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | {'CVE-2022-23944'} | 2022-03-03T05:12:57.845436Z | 2022-01-28T22:13:44Z | CRITICAL | null | {'CWE-306', 'CWE-862'} | {'https://github.com/apache/incubator-shenyu/', 'http://www.openwall.com/lists/oss-security/2022/01/25/15', 'http://www.openwall.com/lists/oss-security/2022/01/25/5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23944', 'https://lists.apache.org/thread/dbrjnnlrf80dr0f92k5r2ysfvf1kr67y', 'http://www.openwall.com/lists/oss-security/2022/01/26/2'} | null |
Maven | GHSA-w3hj-wr2q-x83g | Discovery uses the same AES/GCM Nonce throughout the session | Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer.
From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache):
> The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator. | null | 2021-03-30T17:04:34Z | 2021-04-06T17:22:17Z | LOW | null | {'CWE-323'} | {'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g'} | null |
Maven | GHSA-pffw-p2q5-w6vh | Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-builder and org.apache.jspwiki:jspwiki-war | A specially crafted url could be used to access files under the ROOT directory of the application on Apache JSPWiki 2.9.0 to 2.11.0.M2, which could be used by an attacker to obtain registered users' details. | {'CVE-2019-0225'} | 2022-03-03T05:13:50.301938Z | 2019-04-08T16:23:36Z | HIGH | null | {'CWE-22'} | {'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/03/26/2', 'http://www.securityfocus.com/bid/107627', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0225', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/4f19fdbd8b9c4caf6137a459d723f4ec60379b033ed69277eb4e0af9@%3Cuser.jspwiki.apache.org%3E', 'https://lists.apache.org/thread.html/6251c06cb11e0b495066be73856592dbd7ed712487ef283d10972831@%3Cdev.jspwiki.apache.org%3E', 'https://github.com/advisories/GHSA-pffw-p2q5-w6vh', 'https://lists.apache.org/thread.html/03ddbcb1d6322e04734e65805a147a32bcfdb71b8fc5821fb046ba8d@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0225'} | null |
Maven | GHSA-gc58-v8h3-x2gr | Incorrect Default Permissions in Apache Tomcat | A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1. | {'CVE-2020-8022'} | 2022-03-03T05:13:47.452917Z | 2022-02-09T23:01:49Z | HIGH | null | {'CWE-276'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8022', 'https://bugzilla.suse.com/show_bug.cgi?id=1172405', 'https://lists.apache.org/thread.html/ra87ec20a0f4b226c81c7eed27e5d7433ccdc41e61a8da408a45f0fa1@%3Cusers.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html', 'https://lists.apache.org/thread.html/r5be80ba868a11a1f64e4922399f171b8619bca4bc2039f79cf913928@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/rf50d02409e5732c4ee37f19a193af171251a25a652599ce3c2bc69e7@%3Cusers.tomcat.apache.org%3E'} | null |
Maven | GHSA-jrg3-qq99-35g7 | Deserialization of Untrusted Data in Jodd | Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set. | {'CVE-2018-21234'} | 2022-04-26T18:01:55.893226Z | 2022-02-10T23:03:26Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/oblac/jodd/issues/628', 'https://lists.apache.org/thread.html/r729bc1e0f367fe8a857ac8a14641dba284ac4cf5131edf483022cf59@%3Cissues.hive.apache.org%3E', 'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16', 'https://lists.apache.org/thread.html/rc23200043872384e0fc48a4a4502f4c6b4b5ddc79ba4076414150d59@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r0bacc701ab7105500a0ab2769270d18f332cb379e6a62ec7553f3327@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21234', 'https://lists.apache.org/thread.html/r157d01c96a2c10e7ceb3e005f42c52cfe87b11dd018935e1c4277433@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rc85b650b4ad2c77d7c39c69824488e40dce6d0ebbb4204777d094375@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r965503b27d67a2d934e34fc1d088c9547d51d927c43b8b9bd9b7e695@%3Cissues.hive.apache.org%3E', 'https://github.com/oblac/jodd/compare/v5.0.3...v5.0.4', 'https://lists.apache.org/thread.html/rd575d9877424a2d8776f5c2ff33bf3dc3382cd83f031d483f29c11ab@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rf458683390d6650b26a2c8ba8ad396e038e520ad1cc3f3f1e20514d9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r317aec95c436848233047af7ecb3ce04ce446eb6031f981aef50df0d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rdbb99b43334b59d3d3478d360c87e3235ba22edb1de7d39019194347@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdce006b282e56c5cc73cdf452c51c5097154d0503396d62f48abbeae@%3Cgitbox.hive.apache.org%3E', 'https://github.com/oblac/jodd'} | null |
Maven | GHSA-gx96-vgf7-hwfg | In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF file can trigger an extremely long running computation when parsing the page tree. | {'CVE-2018-11797'} | 2022-04-27T14:30:10.991683Z | 2018-10-17T18:22:29Z | MODERATE | null | {'CWE-400'} | {'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00008.html', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/645574bc50b886d39c20b4065d51ccb1cd5d3a6b4750a22edbb565eb@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-gx96-vgf7-hwfg', 'https://lists.apache.org/thread.html/a9760973a873522f4d4c0a99916ceb74f361d91006b663a0a418d34a@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/'} | null |
Maven | GHSA-7grw-6pjh-jpc9 | Infinite Loop in Apache PDFBox | In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions. | {'CVE-2021-31812'} | 2022-04-26T18:17:11.151997Z | 2021-06-15T15:54:29Z | MODERATE | null | {'CWE-835', 'CWE-834'} | {'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'http://www.openwall.com/lists/oss-security/2021/06/12/1', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31812', 'https://lists.apache.org/thread.html/ra2ab0ce69ce8aaff0773b8c1036438387ce004c2afc6f066626e205e@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf251f6c358087107f8c23473468b279d59d50a75db6b4768165c78d3@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E'} | null |
Maven | GHSA-fvm3-cfvj-gxqq | High severity vulnerability that affects commons-fileupload:commons-fileupload | The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. | {'CVE-2016-3092'} | 2022-03-03T05:12:55.690217Z | 2018-12-21T17:47:47Z | HIGH | null | {'CWE-20'} | {'http://svn.apache.org/viewvc?view=revision&revision=1743722', 'http://tomcat.apache.org/security-9.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E', 'http://www.securitytracker.com/id/1036900', 'http://rhn.redhat.com/errata/RHSA-2016-2807.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://security.gentoo.org/glsa/201705-09', 'http://rhn.redhat.com/errata/RHSA-2016-2070.html', 'http://jvn.jp/en/jp/JVN89379547/index.html', 'http://rhn.redhat.com/errata/RHSA-2016-2069.html', 'http://svn.apache.org/viewvc?view=revision&revision=1743480', 'https://bugzilla.redhat.com/show_bug.cgi?id=1349468', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2017:0456', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2072.html', 'http://tomcat.apache.org/security-8.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759', 'http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'http://svn.apache.org/viewvc?view=revision&revision=1743742', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'http://www.ubuntu.com/usn/USN-3024-1', 'http://www.debian.org/security/2016/dsa-3614', 'http://www.securitytracker.com/id/1036427', 'http://rhn.redhat.com/errata/RHSA-2016-2599.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://rhn.redhat.com/errata/RHSA-2016-2808.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3092', 'http://svn.apache.org/viewvc?view=revision&revision=1743738', 'http://rhn.redhat.com/errata/RHSA-2017-0457.html', 'http://www.debian.org/security/2016/dsa-3611', 'http://www.securityfocus.com/bid/91453', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840', 'http://rhn.redhat.com/errata/RHSA-2016-2071.html', 'https://security.netapp.com/advisory/ntap-20190212-0001/', 'http://rhn.redhat.com/errata/RHSA-2016-2068.html', 'http://www.securitytracker.com/id/1037029', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121', 'https://github.com/advisories/GHSA-fvm3-cfvj-gxqq', 'http://www.securitytracker.com/id/1039606', 'http://tomcat.apache.org/security-7.html', 'http://www.debian.org/security/2016/dsa-3609', 'https://access.redhat.com/errata/RHSA-2017:0455', 'http://www.ubuntu.com/usn/USN-3027-1'} | null |
Maven | GHSA-wfj5-2mqr-7jvv | Expression Language Injection in Netflix Conductor | Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintValidatorContext.buildConstraintViolationWithTemplate() argument, they will be able to run arbitrary Java code. | {'CVE-2020-9296'} | 2022-03-03T05:13:28.495855Z | 2022-02-10T23:06:57Z | CRITICAL | null | {'CWE-917'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9296', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-001.md', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md'} | null |
Maven | GHSA-grc3-8q8m-4j7c | Improper privilege handling in Apache Accumulo | Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties. | {'CVE-2020-17533'} | 2022-03-03T05:14:10.252302Z | 2022-02-09T22:37:59Z | HIGH | null | {'CWE-732', 'CWE-280'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-17533', 'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4', 'http://www.openwall.com/lists/oss-security/2020/12/29/1', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.accumulo.apache.org%3E'} | null |
Maven | GHSA-45hx-wfhj-473x | Arbitrary code execution in H2 Console | H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392. | {'CVE-2022-23221'} | 2022-04-22T15:47:09.601059Z | 2022-01-21T23:07:39Z | CRITICAL | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23221', 'https://github.com/h2database/h2database/security/advisories', 'http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html', 'https://twitter.com/d0nkey_man/status/1483824727936450564', 'http://seclists.org/fulldisclosure/2022/Jan/39', 'https://github.com/h2database/h2database/releases/tag/version-2.1.210', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2022/dsa-5076', 'https://github.com/h2database/h2database'} | null |
Maven | GHSA-83x4-9cwr-5487 | Improper Authorization in Keycloak | A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled. | {'CVE-2021-4133'} | 2022-04-22T15:47:07.416744Z | 2022-01-06T18:32:58Z | HIGH | null | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4133', 'https://github.com/keycloak/keycloak/issues/9247', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487', 'https://github.com/keycloak/keycloak', 'https://bugzilla.redhat.com/show_bug.cgi?id=2033602', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-qvm7-23cj-437v | Remote Code Execution in Apache Dubbo | Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13 | {'CVE-2021-36161'} | 2022-03-03T05:13:32.627719Z | 2021-09-10T17:54:37Z | CRITICAL | null | {'CWE-134'} | {'https://github.com/apache/dubbo', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36161', 'https://lists.apache.org/thread.html/r40212261fd5d638074b65f22ac73eebe93ace310c79d4cfcca4863da%40%3Cdev.dubbo.apache.org%3E'} | null |
Maven | GHSA-qcj7-g2j5-g7r3 | In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. | {'CVE-2016-1000342'} | 2022-04-27T13:30:06.880260Z | 2018-10-17T16:24:12Z | HIGH | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1000342', 'https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/advisories/GHSA-qcj7-g2j5-g7r3'} | null |
Maven | GHSA-6vqp-h455-42mr | Uncontrolled Memory Allocation in Apache PDFBox | A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27906'} | 2022-04-22T18:30:22.909055Z | 2021-05-13T22:30:13Z | MODERATE | null | {'CWE-789'} | {'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-5112', 'https://github.com/apache/pdfbox', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r64982b768c8a2220b07aaf813bd099a9863de0d13eb212fd4efe208f@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://github.com/apache/pdfbox/commit/8c47be1011c11dc47300faecffd8ab32fba3646f', 'https://lists.apache.org/thread.html/rf35026148ccc0e1af133501c0d003d052883fcc65107b3ff5d3b61cd@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/10', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27906', 'https://lists.apache.org/thread.html/rdf78aef4793362e778e21e34328b0456e302bde4b7e74f229df0ee04@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-72m5-fvvv-55m6 | Observable Differences in Behavior to Error Inputs in Bouncy Castle | In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption. | {'CVE-2020-26939'} | 2022-03-03T05:12:45.225730Z | 2021-04-22T16:16:49Z | MODERATE | null | {'CWE-203'} | {'https://security.netapp.com/advisory/ntap-20201202-0005/', 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-26939', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26939'} | null |
Maven | GHSA-3rj3-qp2j-4fj2 | Cross-Site Request Forgery in Jenkins P4 Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password. | {'CVE-2021-21655'} | 2022-03-18T18:03:13.723640Z | 2022-03-18T17:53:10Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21655', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'} | null |
Maven | GHSA-4m9r-5gqp-7j82 | High severity vulnerability that affects org.dspace:dspace-xmlui | The XMLUI feature in DSpace before 3.6, 4.x before 4.5, and 5.x before 5.5 allows directory traversal via the themes/ path in an attack with two or more arbitrary characters and a colon before a pathname, as demonstrated by a themes/Reference/aa:etc/passwd URI. | {'CVE-2016-10726'} | 2022-03-03T05:12:42.348876Z | 2018-10-19T16:52:06Z | HIGH | null | {'CWE-22'} | {'https://wiki.duraspace.org/display/DSDOC5x/Release+Notes', 'https://jira.duraspace.org/browse/DS-3094', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10726', 'https://github.com/DSpace/DSpace/releases/tag/dspace-5.5', 'https://github.com/advisories/GHSA-4m9r-5gqp-7j82'} | null |
Maven | GHSA-wx5j-54mm-rqqq | HTTP request smuggling in io.netty:netty-codec-http | ### Impact
Netty currently just skips control chars when these are present at the beginning / end of the header name. We should better fail fast as these are not allowed by the spec and could lead to HTTP request smuggling.
Failing to do the validation might cause netty to "sanitize" header names before it forward these to another remote system when used as proxy. This remote system can't see the invalid usage anymore and so not do the validation itself.
| {'CVE-2021-43797'} | 2022-04-22T15:47:44.975474Z | 2021-12-09T19:09:17Z | MODERATE | null | {'CWE-444'} | {'https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43797', 'https://security.netapp.com/advisory/ntap-20220107-0003/', 'https://github.com/netty/netty/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323', 'https://github.com/netty/netty/pull/11891'} | null |
Maven | GHSA-r8h9-hq9c-2p5c | High severity vulnerability that affects com.github.shyiko.ktlint:ktlint-core | Using ktlint to download and execute custom rulesets can result in arbitrary code execution as the served jars can be compromised by a MITM. This attack is exploitable via Man in the Middle of the HTTP connection to the artifact servers. This vulnerability appears to have been fixed in 0.30.0 and later; after commit 5e547b287d6c260d328a2cb658dbe6b7a7ff2261. | {'CVE-2019-1010260'} | 2022-03-03T05:13:09.189464Z | 2019-04-08T15:18:54Z | HIGH | null | {'CWE-319'} | {'https://github.com/shyiko/ktlint', 'https://github.com/shyiko/ktlint/pull/332', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010260', 'https://github.com/advisories/GHSA-r8h9-hq9c-2p5c'} | null |
Maven | GHSA-5pv7-hx9m-8jh3 | Missing permission checks in Jenkins Publish Over FTP Plugin | Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials. | {'CVE-2022-29051'} | 2022-05-05T16:18:16.198799Z | 2022-04-13T00:00:16Z | MODERATE | null | {'CWE-862'} | {'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'} | null |
Maven | GHSA-4hrm-m67v-5cxr | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21346](https://x-stream.github.io/CVE-2021-21346.html).
### Credits
wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21346'} | 2022-03-03T05:14:00.440111Z | 2021-03-22T23:28:49Z | MODERATE | null | {'CWE-502', 'CWE-434'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21346', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-21346.html', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'} | null |
Maven | GHSA-vgvf-9jh3-fg75 | Moderate severity vulnerability that affects io.swagger:swagger-codegen and io.swagger:swagger-parser | A vulnerability in Swagger-Parser's version <= 1.0.30 and Swagger codegen version <= 2.2.2 yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. | {'CVE-2017-1000207'} | 2022-03-03T05:13:31.333536Z | 2018-10-19T16:46:30Z | HIGH | null | {'CWE-502'} | {'https://github.com/advisories/GHSA-vgvf-9jh3-fg75', 'https://github.com/swagger-api/swagger-parser/pull/481', 'https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000207', 'https://github.com/swagger-api/swagger-parser'} | null |
Maven | GHSA-8cw6-5qvp-q3wj | Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not. | {'CVE-2018-8024'} | 2022-03-03T05:12:50.969477Z | 2019-03-14T15:40:57Z | MODERATE | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8024', 'https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E', 'https://spark.apache.org/security.html#CVE-2018-8024', 'https://github.com/advisories/GHSA-8cw6-5qvp-q3wj'} | null |
Maven | GHSA-vjw7-6gfq-6wf5 | Path Traversal in Eclipse Vert | In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory. | {'CVE-2019-17640'} | 2022-03-03T05:13:34.325224Z | 2022-02-10T20:28:57Z | CRITICAL | null | {'CWE-22', 'CWE-23'} | {'https://mvnrepository.com/artifact/io.vertx/vertx-web', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17640', 'https://lists.apache.org/thread.html/r8d863b148efe778ce5f8f961d0cafeda399e681d3f0656233b4c5511@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8383b5e7344a8b872e430ad72241b84b83e9701d275c602cfe34a941@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rfd0ebf8387cfd0b959d1e218797e709793cce51a5ea2f84d0976f47d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r591f6932560c8c46cee87415afed92924a982189fea7f7c9096f8e33@%3Ccommits.pulsar.apache.org%3E'} | null |
Maven | GHSA-9378-f4v7-jgm4 | Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils | Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release. | {'CVE-2021-41616'} | 2022-03-03T05:12:36.929575Z | 2021-10-04T20:12:30Z | CRITICAL | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41616', 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E', 'https://github.com/apache/ddlutils'} | null |
Maven | GHSA-5429-pjww-7675 | SQL Injection in Apache Kylin | Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions. | {'CVE-2021-36774'} | 2022-03-03T05:13:01.384718Z | 2022-01-08T00:43:04Z | MODERATE | null | {'CWE-668', 'CWE-89'} | {'https://github.com/apache/kylin', 'http://www.openwall.com/lists/oss-security/2022/01/06/5', 'https://github.com/apache/kylin/pull/1646', 'https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36774'} | null |
Maven | GHSA-m9w8-v359-9ffr | Moderate severity vulnerability that affects org.apache.activemq:activemq-client | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. | {'CVE-2018-11775'} | 2022-03-03T05:14:17.511662Z | 2018-10-19T16:42:27Z | HIGH | null | {'CWE-295'} | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'http://www.securityfocus.com/bid/105335', 'https://github.com/advisories/GHSA-m9w8-v359-9ffr', 'http://www.securitytracker.com/id/1041618', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11775', 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E'} | null |
Maven | GHSA-f92j-qf46-p6vm | Reflected Cross-site Scripting in ACS Commons | ### Impact
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly.
An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.
### Patches
This issue has been resolved in v4.10.0
### Workarounds
No workaround exist.
### References
N/A
### For more information
If you have any questions or comments about this advisory open an issue in acs-aem-commons.
### Credit
This issue was discovered and reported by Christopher Whipp (Christopher.Whipp@servicesaustralia.gov.au). | {'CVE-2021-21028'} | 2022-03-03T05:12:54.085750Z | 2021-02-02T15:46:52Z | HIGH | null | {'CWE-79', 'CWE-416'} | {'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://helpx.adobe.com/security/products/acrobat/apsb21-09.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21028'} | null |
Maven | GHSA-mp28-rq7g-qx62 | Remote code execution in Apache TomEE | If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case. | {'CVE-2020-13931'} | 2022-03-03T05:13:32.982473Z | 2022-02-09T22:44:38Z | CRITICAL | null | {'CWE-306'} | {'https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13931', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E'} | null |
Maven | GHSA-qcjv-wfcg-mmpr | Critical severity vulnerability that affects org.apache.ignite:ignite-core | Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to GridClientJdkMarshaller deserialization endpoint. | {'CVE-2018-8018'} | 2022-03-03T05:12:54.977820Z | 2018-10-16T20:53:54Z | CRITICAL | null | {'CWE-502'} | {'http://www.securityfocus.com/bid/104911', 'https://github.com/advisories/GHSA-qcjv-wfcg-mmpr', 'https://lists.apache.org/thread.html/e0fdf53114a321142ecfa5cfa17658090f0b4e1677de431e329b37ab@%3Cdev.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8018', 'https://access.redhat.com/errata/RHSA-2018:3768'} | null |
Maven | GHSA-8mr5-h28g-36qx | Spring AOP functionality (Struts) vulnerable to DoS attack | When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33. | {'CVE-2017-9787'} | 2022-04-26T19:15:41.315196Z | 2018-10-16T19:37:07Z | HIGH | null | null | {'http://struts.apache.org/docs/s2-049.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9787', 'https://lists.apache.org/thread.html/de3d325f0433cd3b42258b6a302c0d7a72b69eedc1480ed561d3b065@%3Cannouncements.struts.apache.org%3E', 'https://github.com/advisories/GHSA-8mr5-h28g-36qx', 'https://lists.apache.org/thread.html/3795c4dd46d9ec75f4a6eb9eca11c11edd3e796c6c1fd7b17b5dc50d@%3Cannouncements.struts.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0002/', 'http://www.securitytracker.com/id/1039115', 'http://www.securityfocus.com/bid/99562', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html'} | null |
Maven | GHSA-p8ww-vv84-c2rm | Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio | The JSONP endpoint in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 does not properly restrict callback values, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted HTTP request. | {'CVE-2015-2912'} | 2021-09-16T16:14:54Z | 2018-10-18T17:41:13Z | HIGH | null | {'CWE-352'} | {'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/orientechnologies/orientdb', 'https://github.com/orientechnologies/orientdb/issues/4824', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2912', 'https://github.com/advisories/GHSA-p8ww-vv84-c2rm'} | null |
Maven | GHSA-4mq5-mj59-qq9c | Allocation of Resources Without Limits or Throttling in Apache Tika | In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later. | {'CVE-2019-10093'} | 2022-03-03T05:12:51.622292Z | 2019-08-06T01:43:38Z | MODERATE | null | {'CWE-770'} | {'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20190828-0004/', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html'} | null |
Maven | GHSA-7qw5-pqhc-xm4g | Users with SCRIPT right can execute arbitrary code in XWiki | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.
### Patches
It has been patched in both version XWiki 12.2.1 and XWiki 11.10.5.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-17141
https://jira.xwiki.org/browse/XWIKI-17266
It's been reported by the GitHub Security Lab under #GHSL-2020-046.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2020-15171'} | 2021-11-19T15:29:44Z | 2020-09-10T19:19:27Z | LOW | null | {'CWE-74', 'CWE-94'} | {'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15171', 'https://github.com/xwiki/xwiki-platform'} | null |
Maven | GHSA-qwh6-xwj4-9cjg | Remote code execution in net.mingsoft:ms-mcms | net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS. | {'CVE-2021-46384'} | 2022-03-14T23:02:01.245091Z | 2022-03-05T00:00:41Z | CRITICAL | null | {'CWE-287'} | {'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384'} | null |
Maven | GHSA-rcjj-h6gh-jf3r | Information Disclosure in Apache Groovy | Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2. | {'CVE-2020-17521'} | 2022-04-22T18:30:45.285392Z | 2020-12-09T19:03:03Z | MODERATE | null | {'CWE-379'} | {'https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E', 'https://github.com/apache/groovy', 'https://lists.apache.org/thread.html/rea63a4666ba245d2892471307772a2d8ce0f0741f341d6576625c1b3@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17521', 'https://groovy-lang.org/security.html#CVE-2020-17521', 'https://github.com/apache/groovy/pull/1425', 'https://security.netapp.com/advisory/ntap-20201218-0006/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/ra9dab34bf8625511f23692ad0fcee2725f782e9aad6c5cdff6cf4465@%3Cnotifications.groovy.apache.org%3E', 'https://github.com/apache/groovy/commit/bcbe5c4c76db83736166530647c024ac1e47ef28'} | null |
Maven | GHSA-p8jx-x2vw-wm33 | High severity vulnerability that affects org.apache.storm:storm-core | In Apache Storm 0.10.0 through 0.10.2, 1.0.0 through 1.0.6, 1.1.0 through 1.1.2, and 1.2.0 through 1.2.1, an attacker with access to a secure storm cluster in some cases could execute arbitrary code as a different user. | {'CVE-2018-1331'} | 2022-03-03T05:11:47.704491Z | 2018-10-17T19:48:06Z | HIGH | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1331', 'https://github.com/advisories/GHSA-p8jx-x2vw-wm33', 'http://storm.apache.org/2018/06/04/storm122-released.html', 'http://www.openwall.com/lists/oss-security/2018/07/10/4', 'http://www.securityfocus.com/bid/104732', 'http://www.securitytracker.com/id/1041273', 'http://storm.apache.org/2018/06/04/storm113-released.html'} | null |
Maven | GHSA-9f52-hpvw-v96w | Improper Validation of Specified Quantity in Input in Eclipse Hono | In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception. | {'CVE-2020-27217'} | 2022-03-03T05:12:58.108965Z | 2022-02-10T20:22:06Z | HIGH | null | {'CWE-1284'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27217'} | null |
Maven | GHSA-q8xj-8xg3-w432 | Moderate severity vulnerability that affects io.spray:spray-json_2.10, io.spray:spray-json_2.11, and io.spray:spray-json_2.12 | Lightbend Spray spray-json through 1.3.4 allows remote attackers to cause a denial of service (resource consumption) because of Algorithmic Complexity during the parsing of many JSON object fields (with keys that have the same hash code). | {'CVE-2018-18854'} | 2022-03-03T05:13:15.672988Z | 2018-11-09T17:41:35Z | HIGH | null | {'CWE-400'} | {'https://github.com/spray/spray-json/issues/277', 'https://github.com/spray/spray-jso', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18854', 'https://github.com/advisories/GHSA-q8xj-8xg3-w432'} | null |
Maven | GHSA-rjww-2x8v-m9v9 | Potential sensitive data exposure in applications using Vaadin 15 | Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319 | {'CVE-2020-36319'} | 2022-03-03T05:12:58.940843Z | 2021-04-19T14:52:14Z | LOW | null | {'CWE-200'} | {'https://github.com/vaadin/flow/pull/8051', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319', 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9', 'https://github.com/vaadin/flow/pull/8016', 'https://vaadin.com/security/cve-2020-36319'} | null |
Maven | GHSA-3h29-52vh-pqgr | Uncontrolled Resource Consumption in Apache Tika | A carefully crafted or corrupt PSD file can cause excessive memory usage in Apache Tika's PSDParser in versions 1.0-1.23. | {'CVE-2020-1950'} | 2022-03-03T05:13:58.897227Z | 2021-05-07T15:53:48Z | MODERATE | null | {'CWE-400'} | {'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://usn.ubuntu.com/4564-1/', 'https://lists.apache.org/thread.html/r463b1a67817ae55fe022536edd6db34e8f9636971188430cbcf8a8dd%40%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1950', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-rmr5-cpv2-vgjf | Denial of Service by injecting highly recursive collections or maps in XStream | ### Impact
The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream.
### Patches
XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded.
### Workarounds
The attack uses the hash code implementation for collections and maps to force an exponential calculation time due to highly recursive structures with in the collection or map. Following types of the Java runtime are affected in Java versions available in December 2021:
- java.util.HashMap
- java.util.HashSet
- java.util.Hashtable
- java.util.LinkedHashMap
- java.util.LinkedHashSet
- java.util.Stack (older Java revisions only)
- java.util.Vector (older Java revisions only)
- Other third party collection implementations that use their element's hash code may also be affected
If your object graph does not use referenced elements at all, you may simply set the NO_REFERENCE mode:
```Java
XStream xstream = new XStream();
xstream.setMode(XStream.NO_REFERENCES);
```
If your object graph contains neither a Hashtable, HashMap nor a HashSet (or one of the linked variants of it) then you can use the security framework to deny the usage of these types:
```Java
XStream xstream = new XStream();
xstream.denyTypes(new Class[]{
java.util.HashMap.class, java.util.HashSet.class, java.util.Hashtable.class, java.util.LinkedHashMap.class, java.util.LinkedHashSet.class
});
```
Unfortunately these types are very common. If you only use HashMap or HashSet and your XML refers these only as default map or set, you may additionally change the default implementation of java.util.Map and java.util.Set at unmarshalling time::
```Java
xstream.addDefaultImplementation(java.util.TreeMap.class, java.util.Map.class);
xstream.addDefaultImplementation(java.util.TreeSet.class, java.util.Set.class);
```
However, this implies that your application does not care about the implementation of the map and all elements are comparable.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html).
### Credits
The vulnerability was discovered and reported by r00t4dm at Cloud-Penetrating Arrow Lab.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-43859'} | 2022-04-22T15:47:34.675024Z | 2022-02-01T00:48:15Z | HIGH | null | {'CWE-502', 'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43859', 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846', 'https://x-stream.github.io/CVE-2021-43859.html', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00018.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XODFRE2ZL64FICBJDOPWOLPTSSAI4U7X/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VACQYG356OHUTD5WQGAQ4L2TTFTAV3SJ/', 'https://github.com/x-stream/xstream/', 'http://www.openwall.com/lists/oss-security/2022/02/09/1'} | null |
Maven | GHSA-645p-88qh-w398 | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization. | {'CVE-2018-14718'} | 2022-03-03T05:12:37.404567Z | 2019-01-04T19:06:55Z | CRITICAL | null | {'CWE-502'} | {'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://github.com/advisories/GHSA-645p-88qh-w398', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/106601', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Maven | GHSA-3x7h-5hfr-hvjm | Moderate severity vulnerability that affects io.undertow:undertow-core | It was found in Undertow before 1.3.28 that with non-clean TCP close, the Websocket server gets into infinite loop on every IO thread, effectively causing DoS. | {'CVE-2017-2670'} | 2022-03-03T05:14:17.716139Z | 2018-10-19T16:54:56Z | MODERATE | null | {'CWE-835'} | {'https://github.com/advisories/GHSA-3x7h-5hfr-hvjm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2670'} | null |
Maven | GHSA-fmqw-vqh5-cwq9 | Apache NiFi user log out issue | When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi. | {'CVE-2019-12421'} | 2022-03-03T05:14:10.558352Z | 2019-12-02T18:19:39Z | HIGH | null | {'CWE-613'} | {'https://nifi.apache.org/security.html#CVE-2019-12421', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/apache/nifi/pull/3362'} | null |
Maven | GHSA-f9pg-g9xw-r5g2 | SQL Injection in Jeecg-boot | Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData. | {'CVE-2022-22881'} | 2022-03-03T05:12:53.635388Z | 2022-02-17T00:00:25Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22881', 'https://github.com/jeecgboot/jeecg-boot/issues/3348'} | null |
Maven | GHSA-h8q5-g2cj-qr5h | Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack | In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later. | {'CVE-2018-11796'} | 2022-04-26T22:00:11.236469Z | 2018-10-17T15:43:25Z | HIGH | null | {'CWE-611'} | {'http://www.securityfocus.com/bid/105585', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11796', 'https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190903-0002/', 'https://github.com/apache/tika', 'https://github.com/advisories/GHSA-h8q5-g2cj-qr5h'} | null |
Maven | GHSA-3w6p-8f82-gw8r | Using JMSAppender in log4j configuration may lead to deserialization of untrusted data | ### Impact
ClickHouse JDBC Bridge uses [slf4j-log4j12 1.7.32](https://repo1.maven.org/maven2/org/slf4j/slf4j-log4j12/1.7.32/), which depends on [log4j 1.2.17](https://repo1.maven.org/maven2/log4j/log4j/1.2.17/). It allows a remote attacker to execute code on the server, if you changed default log4j configuration by adding JMSAppender and an insecure JMS broker.
### Patches
The patch version `2.0.7` removed log4j dependency by replacing `slf4j-log4j12` to `slf4j-jdk14`. Logging configuration is also changed from `log4j.properties` to `logging.properties`.
### Workarounds
1. Do NOT change log4j configuration to use JMSAppender along with insecure JMS broker
2. Alternatively, you can issue below command to remove `JMSAppender.class`:
```(bash)
# install zip command if you don't have
apt-get update && apt-get install -y zip
# remove the class
zip -d clickhouse-jdbc-bridge*.jar ru/yandex/clickhouse/jdbcbridge/internal/log4j/net/JMSAppender.class
```
### References
Please refer to [CVE-2021-4104](https://access.redhat.com/security/cve/CVE-2021-4104) to read more.
### For more information
If you have any questions or comments about this advisory, please feel free to open an issue in the repository.
| null | 2022-03-03T05:13:47.954772Z | 2021-12-17T20:42:38Z | HIGH | null | {'CWE-502'} | {'https://access.redhat.com/security/cve/CVE-2021-4104', 'https://github.com/ClickHouse/clickhouse-jdbc-bridge/security/advisories/GHSA-3w6p-8f82-gw8r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4104', 'https://github.com/ClickHouse/clickhouse-jdbc-bridge'} | null |
Maven | GHSA-24ww-mc5x-xc43 | Man-in-the-middle attack in Apache Cassandra | In Apache Cassandra, all versions prior to 2.1.22, 2.2.18, 3.0.22, 3.11.8 and 4.0-beta2, it is possible for a local attacker without access to the Apache Cassandra process or configuration files to manipulate the RMI registry to perform a man-in-the-middle attack and capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and perform unauthorised operations. Users should also be aware of CVE-2019-2684, a JRE vulnerability that enables this issue to be exploited remotely. | {'CVE-2020-13946'} | 2022-03-03T05:13:19.119160Z | 2021-05-07T15:54:46Z | MODERATE | null | {'CWE-668'} | {'https://lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce@%3Cuser.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cuser.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13946', 'https://security.netapp.com/advisory/ntap-20210521-0005/', 'https://lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7@%3Cuser.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc@%3Cuser.cassandra.apache.org%3E'} | null |
Maven | GHSA-767j-jfh2-jvrc | Potential HTTP request smuggling in Apache Tomcat | The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. | {'CVE-2019-17569'} | 2022-03-03T05:13:14.475639Z | 2020-02-28T01:10:58Z | MODERATE | null | {'CWE-444'} | {'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'https://security.netapp.com/advisory/ntap-20200327-0005/', 'https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17569', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-v9j2-q4q5-cxh4 | No CSRF protection on the password change form | ### Impact
It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki.
### Patches
The problem has been patched in XWiki 12.10.5, 13.2RC1.
### Workarounds
It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257.
### References
https://jira.xwiki.org/browse/XWIKI-18315
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [security ML](mailto:security@xwiki.org)
| {'CVE-2021-32730'} | 2021-07-02T16:41:31Z | 2021-07-02T19:19:13Z | MODERATE | null | {'CWE-352'} | {'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4', 'https://jira.xwiki.org/browse/XWIKI-18315', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730'} | null |
Maven | GHSA-6jv7-28mv-qp9c | Missing permission check in Jenkins autonomiq Plugin | A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | {'CVE-2022-25195'} | 2022-05-04T20:59:04Z | 2022-02-16T00:01:23Z | MODERATE | null | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25195', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc', 'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545'} | null |
Maven | GHSA-2pwh-52h7-7j84 | JavaScript execution via malicious molfiles (XSS) | ### Impact
The viewer plugin implementation of `<mol:molecule>` renders molfile data directly inside a `<script>` tag without any escaping. Arbitrary JavaScript code can thus be executed in the client browser via crafted molfiles.
### Patches
Patched in v0.3.0: Molfile data is now rendered as value of a hidden `<input>` tag and escaped via JSF's mechanisms.
### Workarounds
No workaround available. | null | 2022-03-03T05:13:10.415702Z | 2021-04-16T19:52:49Z | MODERATE | null | {'CWE-79'} | {'https://github.com/ipb-halle/MolecularFaces/security/advisories/GHSA-2pwh-52h7-7j84'} | null |
Maven | GHSA-whw7-h25v-9qvx | Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, and org.apache.cxf.fediz:fediz-spring2 | Apache CXF Fediz ships with a number of container-specific plugins to enable WS-Federation for applications. A CSRF (Cross Style Request Forgery) style vulnerability has been found in the Spring 2, Spring 3, Jetty 8 and Jetty 9 plugins in Apache CXF Fediz prior to 1.4.0, 1.3.2 and 1.2.4. | {'CVE-2017-7661'} | 2022-03-03T05:12:46.188219Z | 2018-10-18T16:56:38Z | MODERATE | null | {'CWE-352'} | {'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://www.securitytracker.com/id/1038497', 'http://cxf.apache.org/security-advisories.data/CVE-2017-7661.txt.asc', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-whw7-h25v-9qvx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7661', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
Maven | GHSA-2xpp-75vr-22vq | Low severity vulnerability that affects org.apache.nifi:nifi | The X-Frame-Options headers were applied inconsistently on some HTTP responses, resulting in duplicate or missing security headers. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. Mitigation: The fix to consistently apply the security headers was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | {'CVE-2018-17192'} | 2022-03-03T05:13:51.907236Z | 2018-12-20T22:02:24Z | MODERATE | null | {'CWE-1021'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-17192', 'https://nifi.apache.org/security.html#CVE-2018-17192', 'https://github.com/advisories/GHSA-2xpp-75vr-22vq'} | null |
Maven | GHSA-q39c-5vh5-vw2p | Improper Authentication in Apereo CAS | Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication. | {'CVE-2020-27178'} | 2022-03-03T05:11:21.845366Z | 2021-08-02T16:47:10Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27178', 'https://apereo.github.io/2020/10/14/gauthvuln/'} | null |
Maven | GHSA-h6qv-f5gf-8gcf | Missing Authorization in Jenkins P4 plugin | Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password. | {'CVE-2021-21654'} | 2021-05-19T18:33:13Z | 2021-06-16T17:29:35Z | MODERATE | null | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21654', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'} | null |
Maven | GHSA-3rhm-67j6-42jq | Moderate severity vulnerability that affects com.jason-goodwin:authentikat-jwt_2.12 | A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests. | {'CVE-2017-18239'} | 2022-03-03T05:13:53.187473Z | 2018-11-09T17:50:40Z | CRITICAL | null | null | {'https://github.com/advisories/GHSA-3rhm-67j6-42jq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239', 'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0', 'https://github.com/jasongoodwin/authentikat-jwt', 'https://github.com/jasongoodwin/authentikat-jwt/issues/12', 'https://github.com/jasongoodwin/authentikat-jwt/pull/36'} | null |
Maven | GHSA-m59c-jpc8-m2x4 | In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder | An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. | {'CVE-2018-1336'} | 2022-04-27T13:45:11.459717Z | 2018-10-17T16:32:18Z | HIGH | null | {'CWE-835'} | {'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2701', 'https://access.redhat.com/errata/RHSA-2018:2921', 'https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html', 'https://usn.ubuntu.com/3723-1/', 'http://www.securityfocus.com/bid/104898', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2945', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041375', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2018:2700', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHEA-2018:2189', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1336', 'https://www.debian.org/security/2018/dsa-4281', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2930', 'https://github.com/advisories/GHSA-m59c-jpc8-m2x4', 'https://access.redhat.com/errata/RHEA-2018:2188'} | null |
Maven | GHSA-jcq3-cprp-m333 | Privilege escalation in mysql-connector-jav | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | {'CVE-2019-2692'} | 2022-03-03T05:14:11.644457Z | 2020-07-01T17:12:20Z | MODERATE | null | {'CWE-843'} | {'http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.securityfocus.com/bid/107925', 'https://security.netapp.com/advisory/ntap-20190423-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692', 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574'} | null |
Maven | GHSA-f68h-hfqp-8rmv | Path Traversal in Crafter CMS Crafter Studio | Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system. | {'CVE-2017-15684'} | 2022-03-03T05:09:47.421296Z | 2022-02-09T23:08:03Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-15684', 'http://crafter.com', 'https://docs.craftercms.org/en/3.0/security/advisory.html'} | null |
Maven | GHSA-3hrc-f439-727g | Moderate severity vulnerability that affects org.apache.camel:camel-core | XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource. | {'CVE-2015-0263'} | 2022-03-03T05:14:16.535754Z | 2018-10-16T23:08:43Z | MODERATE | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-3hrc-f439-727g', 'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0263', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'http://www.securitytracker.com/id/1032442', 'https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36'} | null |
Maven | GHSA-g99m-3m46-4gm9 | Infinite Loop in Apache Sanselan | Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging. | {'CVE-2018-17202'} | 2022-03-03T05:13:15.458457Z | 2019-05-14T04:00:47Z | HIGH | null | {'CWE-835'} | {'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202'} | null |
Maven | GHSA-3gx9-37ww-9qw6 | Code injection in Spring Cloud Gateway | In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host. | {'CVE-2022-22947'} | 2022-04-26T21:00:24.753629Z | 2022-03-04T00:00:15Z | CRITICAL | null | {'CWE-94'} | {'http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22947', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://tanzu.vmware.com/security/cve-2022-22947'} | null |
Maven | GHSA-5mf7-26mw-3rqr | Moderate severity vulnerability that affects org.apache.tika:tika-core | A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18. | {'CVE-2018-1338'} | 2022-03-03T05:13:16.144258Z | 2018-10-17T15:50:45Z | MODERATE | null | {'CWE-835'} | {'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-5mf7-26mw-3rqr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1338', 'https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E'} | null |
Maven | GHSA-xrr9-rh8p-433v | Request smuggling is possible when both chunked TE and content length specified | ### Impact
Request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle alone \n as a headers separator.
### Patches
https://github.com/ktorio/ktor/pull/1547
### Workarounds
None except migrating to a better proxy.
### References
https://portswigger.net/web-security/request-smuggling
https://tools.ietf.org/html/rfc7230#section-9.5 | {'CVE-2020-5207'} | 2022-03-03T05:13:17.260116Z | 2020-01-27T19:28:40Z | LOW | null | {'CWE-444'} | {'https://github.com/ktorio/ktor/pull/1547', 'https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5207'} | null |
Maven | GHSA-338v-3958-8v8r | Information disclosure in JBoss Weld | Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state. | {'CVE-2014-8122'} | 2022-03-03T05:12:41.722214Z | 2020-06-10T20:54:15Z | MODERATE | null | {'CWE-362'} | {'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086', 'http://rhn.redhat.com/errata/RHSA-2015-0217.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8122', 'http://rhn.redhat.com/errata/RHSA-2015-0218.html', 'http://rhn.redhat.com/errata/RHSA-2015-0215.html', 'http://www.securityfocus.com/bid/74252', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://www.securitytracker.com/id/1031741', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100892', 'http://rhn.redhat.com/errata/RHSA-2015-0216.html', 'http://rhn.redhat.com/errata/RHSA-2015-0773.html', 'https://github.com/weld/core/', 'https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml', 'http://rhn.redhat.com/errata/RHSA-2015-0920.html', 'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65'} | null |
Maven | GHSA-7qmg-qg53-mrp8 | Cross-site scripting in Apache JSPWiki | On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to InfoContent.jsp, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. | {'CVE-2019-12404'} | 2022-03-03T05:12:17.330345Z | 2019-10-11T18:41:59Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12404', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-12404'} | null |
Maven | GHSA-pc22-3g76-gm6j | Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory | ### Impact
On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory.
This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
#### Java Code
The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability.
https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185
### Patches
Fix has been applied to the master branch with:
* https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89
included in release: 2.4.19
### References
* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@swagger.io](mailto:security@swagger.io)
#### Original vulnerability report
> I'm performing OSS security research under the GitHub Security Lab Bug Bounty program.
> I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries.
>
> - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f
> - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac
> - https://github.com/github/codeql/pull/4473
>
> The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users.
>
> ---
>
> This vulnerability exists in the maven plugin.
>
> This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability.
>
> https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185
>
> This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project.
>
> https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
>
> This is due to a race condition between the call to `delete` and the call to `mkdirs`.
>
> ```java
> // ensure file will always be unique by appending random digits
> File outputFolder = File.createTempFile("codegen-", "-tmp"); // Attacker knows the full path of the file that will be generated
> // delete the file that was created
> outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator.
> // and make a directory of the same name
> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory
> outputFolder.mkdirs();
> ```
>
> This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
>
> The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions.
> | {'CVE-2021-21363'} | 2022-03-03T05:13:14.024392Z | 2021-03-11T03:09:16Z | LOW | null | {'CWE-379', 'CWE-378'} | {'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j'} | null |
Maven | GHSA-558x-2xjg-6232 | Allocation of Resources Without Limits or Throttling in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0 - 5.2.19, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. | {'CVE-2022-22950'} | 2022-04-12T15:31:51.092026Z | 2022-04-03T00:01:00Z | MODERATE | null | {'CWE-770'} | {'https://tanzu.vmware.com/security/cve-2022-22950', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22950'} | null |
Maven | GHSA-r8j4-96mx-rjcc | Improper Restriction of XML External Entity Reference in skylot/jadx | skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure. | {'CVE-2022-0219'} | 2022-03-03T05:13:21.676040Z | 2022-01-21T18:13:42Z | MODERATE | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0219', 'https://github.com/skylot/jadx', 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e', 'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'} | null |
Maven | GHSA-cpcr-74q9-74gp | Broken Authentication in Atlassian Connect Spring Boot | Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3. Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. | {'CVE-2021-26074'} | 2022-03-07T20:47:35.451950Z | 2021-05-10T15:19:04Z | MODERATE | null | {'CWE-863', 'CWE-287'} | {'https://confluence.atlassian.com/pages/viewpage.action?pageId=1051986106', 'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26074'} | null |
Maven | GHSA-869j-5855-hjpm | Moderate severity vulnerability that affects org.apache.karaf:apache-karaf and org.apache.karaf:karaf | Apache Karaf kar deployer reads .kar archives and extracts the paths from the "repository/" and "resources/" entries in the zip file. It then writes out the content of these paths to the Karaf repo and resources directories. However, it doesn't do any validation on the paths in the zip file. This means that a malicious user could craft a .kar file with ".." directory names and break out of the directories to write arbitrary content to the filesystem. This is the "Zip-slip" vulnerability - https://snyk.io/research/zip-slip-vulnerability. This vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf releases prior 4.2.3 is impacted. | {'CVE-2019-0191'} | 2022-03-03T05:13:26.317059Z | 2019-03-25T16:16:44Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0191', 'http://www.securityfocus.com/bid/107462', 'https://lists.apache.org/thread.html/6856aa7ed7dd805eaf65d0e5e95027dda3b2307aacd1ab4a838c5cd1@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/cef9a2d4b547625e5214684283ac5c59c9d9740e092e777dc3f85070@%3Ccommits.karaf.apache.org%3E', 'https://github.com/advisories/GHSA-869j-5855-hjpm'} | null |
Maven | GHSA-xcrm-qpp8-hcw4 | Moderate severity vulnerability that affects org.apache.struts:struts2-rest-plugin | In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload. | {'CVE-2017-15707'} | 2022-03-03T05:13:18.667698Z | 2018-10-16T19:35:55Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-15707', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://www.securityfocus.com/bid/102021', 'http://www.securitytracker.com/id/1039946', 'https://security.netapp.com/advisory/ntap-20171214-0001/', 'https://github.com/advisories/GHSA-xcrm-qpp8-hcw4', 'https://cwiki.apache.org/confluence/display/WW/S2-054'} | null |
Maven | GHSA-9295-mhf3-v33m | Insecure temporary file in Netflix OSS Hollow | > ID: NFLX-2021-001
> Title: Local information disclosure in Hollow
> Release Date: 2021-03-23
> Credit: Security Researcher @JLLeitschuh
# Overview
Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it.
# Impact
An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process.
# Description
Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
# Workarounds and Fixes
Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release. | {'CVE-2021-28099'} | 2022-03-03T05:13:01.545840Z | 2021-03-29T18:25:26Z | MODERATE | null | {'CWE-377'} | {'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md', 'https://github.com/Netflix/hollow/issues/502', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099'} | null |
Maven | GHSA-jmf4-pq78-f8vj | Moderate severity vulnerability that affects org.apache.hive:hive-jdbc | In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics. | {'CVE-2018-1314'} | 2022-03-03T05:14:17.862578Z | 2018-11-21T22:24:50Z | MODERATE | null | {'CWE-862'} | {'https://github.com/advisories/GHSA-jmf4-pq78-f8vj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1314', 'http://www.securityfocus.com/bid/105884', 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'} | null |
Maven | GHSA-fr26-qjc8-mvjx | Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19 | Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. | null | 2022-03-03T05:13:54.990381Z | 2021-10-13T18:56:12Z | MODERATE | null | null | {'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx', 'https://vaadin.com/security/cve-2021-31412'} | null |
Maven | GHSA-rp4x-wxqv-cf9m | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-25027 | {'CVE-2019-25027'} | 2022-03-03T05:13:40.240510Z | 2021-04-19T14:52:29Z | MODERATE | null | {'CWE-79', 'CWE-81'} | {'https://github.com/vaadin/flow/pull/5498', 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027', 'https://vaadin.com/security/cve-2019-25027'} | null |
Maven | GHSA-45xm-v8gq-7jqx | Excessive memory allocation | In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the WebSocket HTTP upgrade implementation buffers the full http request before doing the handshake, holding the entire request body in memory. There should be a reasonnable limit (8192 bytes) above which the WebSocket gets an HTTP response with the 413 status code and the connection gets closed. | {'CVE-2018-12541'} | 2022-04-25T20:32:01.190663Z | 2018-10-17T16:19:59Z | MODERATE | null | {'CWE-119', 'CWE-789'} | {'https://lists.apache.org/thread.html/rbdc279ecdb7ac496a03befb05a53605c4ce2b67e14f8f4df4cfa1203@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r11789cd6d67ecca2d6f6bbb11e34495e68ee99287b6c59edf5b1a09c@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12541', 'https://lists.apache.org/thread.html/r8db0431ecf93f2dd2128db5ddca897b33ba883b7f126648d6a9e4c47@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539170', 'https://access.redhat.com/errata/RHSA-2018:2946', 'https://lists.apache.org/thread.html/r79789a0afb184abd13a2c07016e6e7ab8e64331f332b630bf82a2eed@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-45xm-v8gq-7jqx', 'https://lists.apache.org/thread.html/r344235b1aea2f7fa2381495df1d77d02b595e3d7e4626e701f7c1062@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r362835e6c7f34324ed24e318b363fcdd20cea91d0cea0b2e1164f73e@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/reb3cc4f3e10264896a541813c0030ec9d9466ba9b722fe5d4adc91cd@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3da899890536af744dec897fbc561fd9810ac45e79a16164b53c31b2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01123837ffbfdf5809e0a4ac354ad546e4ca8f18df89ee5a10eeb81b@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r98dc06e2b1c498d0e9eb5038d8e1aefd24e411e50522e7082dd9e0b7@%3Ccommits.bookkeeper.apache.org%3E', 'https://github.com/eclipse-vertx/vert.x/issues/2648', 'https://lists.apache.org/thread.html/re5ddabee26fbcadc7254d03a5a073d64080a9389adc9e452529664ed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1af71105539fe01fcecb92d2ecd8eea56c515fb1c80ecab4df424553@%3Cissues.bookkeeper.apache.org%3E', 'https://github.com/eclipse-vertx/vert.x'} | null |
Maven | GHSA-jvpp-hxjj-5ccc | Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ | It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. | {'CVE-2015-7559'} | 2022-03-03T05:13:42.748518Z | 2019-08-01T19:17:45Z | MODERATE | null | {'CWE-20', 'CWE-306'} | {'https://issues.apache.org/jira/browse/AMQ-6470', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7559', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559'} | null |
Maven | GHSA-c9hw-wf7x-jp9j | Improper Privilege Management in Tomcat | When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. | {'CVE-2020-1938'} | 2022-05-02T16:36:38.159228Z | 2020-06-15T18:51:21Z | CRITICAL | null | {'CWE-269'} | {'https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'http://support.blackberry.com/kb/articleDetail?articleNumber=000062739', 'https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200226-0002/', 'https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html', 'https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/', 'https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1938', 'https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E'} | null |
Maven | GHSA-j8jw-g6fq-mp7h | SQL injection in hibernate-core | "A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity." | {'CVE-2020-25638'} | 2022-04-22T17:30:10.500218Z | 2022-02-09T22:57:29Z | HIGH | null | {'CWE-89'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25638', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00000.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1881353', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4908', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E'} | null |
Maven | GHSA-x3rh-m7vp-35f2 | Operation on a Resource after Expiration or Release in Jetty Server | In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). | {'CVE-2019-17638'} | 2022-03-03T05:13:52.159814Z | 2020-08-05T14:52:59Z | CRITICAL | null | {'CWE-675', 'CWE-672'} | {'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba', 'https://github.com/eclipse/jetty.project/issues/4936', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17638', 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/', 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984', 'http://www.openwall.com/lists/oss-security/2020/08/17/1', 'https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561', 'https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E'} | null |
Maven | GHSA-6h7w-fc84-x7p6 | StaticFile.fromUrl can leak presence of a directory | ### Impact
`StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed.
This affects http4s versions:
* 0.21.7 through 0.21.23
* 0.22.0-M1 through 0.22.0-M8
* 0.23.0-M1
* 1.0.0-M1 through 1.0.0-M22
### Patches
The [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions:
* v0.21.24
* v0.22.0-RC1
* v0.23.0-RC1
* v1.0.0-M23
Note: a previous version of this advisory incorrectly referred to 0.22.0-M9 and 0.23.0-M2.
### Workarounds
Don't call `StaticFile.fromUrl` with non-file URLs.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the http4s repository](https://github.com/http4s/http4s)
* Disclose further vulnerabilities according to the [http4s security policy](https://github.com/http4s/http4s/blob/main/SECURITY.md)
| {'CVE-2021-32643'} | 2021-05-27T21:17:06Z | 2021-05-28T15:54:39Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32643', 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9', 'https://mvnrepository.com/artifact/org.http4s/http4s-core', 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6'} | null |
Maven | GHSA-23gj-368h-92pq | Path Traversal in DKPro Core | core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive. | {'CVE-2019-11082'} | 2022-03-03T05:13:29.151405Z | 2019-05-29T18:05:11Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-11082', 'https://github.com/dkpro/dkpro-core/issues/1325'} | null |
Maven | GHSA-gp32-7h29-rpxm | Moderate severity vulnerability that affects com.puppycrawl.tools:checkstyle | Checkstyle prior to 8.18 loads external DTDs by default, which can potentially lead to denial of service attacks or the leaking of confidential information. | {'CVE-2019-9658'} | 2022-03-03T05:13:06.051976Z | 2019-03-14T15:39:14Z | MODERATE | null | {'CWE-611'} | {'https://github.com/checkstyle/checkstyle', 'https://lists.apache.org/thread.html/fff26ee7b59360a0264fef4e8ed9454ef652db2c39f2892a9ea1c9cb@%3Cnotifications.fluo.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/994221405e940e148adcfd9cb24ffc6700bed70c7820c55a22559d26@%3Cnotifications.fluo.apache.org%3E', 'https://github.com/checkstyle/checkstyle/pull/6476', 'https://checkstyle.org/releasenotes.html#Release_8.18', 'https://github.com/advisories/GHSA-gp32-7h29-rpxm', 'https://lists.apache.org/thread.html/7eea10e7be4c21060cb1e79f6524c6e6559ba833b1465cd2870a56b9@%3Cserver-dev.james.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/04/msg00029.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BMOPJ2XYE4LB2HM7OMSUBBIYEDUTLWE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJPT54USMGWT3Y6XVXLDEHKRUY2EI4OE/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9658', 'https://github.com/checkstyle/checkstyle/issues/6478', 'https://github.com/checkstyle/checkstyle/issues/6474', 'https://lists.apache.org/thread.html/6bf8bbbca826e883f09ba40bc0d319350e1d6d4cf4df7c9e399b2699@%3Ccommits.fluo.apache.org%3E', 'https://lists.apache.org/thread.html/a35a8ccb316d4c2340710f610cba8058e87d5376259b35ef3ed2bf89@%3Cnotifications.accumulo.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEYBAHYAV37WHMOXZYM2ZWF46FHON6YC/'} | null |
Maven | GHSA-phwj-86vx-cfjc | Cross-site scripting in Apache Jena Fuseki | A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive). | {'CVE-2021-33192'} | 2022-03-03T05:14:21.928075Z | 2021-08-13T15:21:35Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33192'} | null |
Maven | GHSA-673j-qm5f-xpv8 | Arbitrary File Write Vulnerability | ### Overview
The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers that level of control.
It's not the job of the pgjdbc driver to decide whether a given log file location is acceptable. End user applications that use the pgjdbc driver must ensure that filenames are valid and restrict unauthenticated attackers from being able to supply arbitrary values. That's not specific to the pgjdbc driver either, it would be true for any library that can write to the application's local file system.
While we do not consider this a security issue with the driver, we have decided to remove the loggerFile and loggerLevel connection properties in the next release of the driver. Removal of those properties does not make exposing the JDBC URL or connection properties to an attacker safe and we continue to suggest that applications do not allow untrusted users to specify arbitrary connection properties. We are removing them to prevent misuse and their functionality can be delegated to java.util.logging.
If you identify an application that allows remote users to specify a complete JDBC URL or properties without validating it's contents, we encourage you to notify the application owner as that may be a security defect in that specific application.
### Impact
It is possible to specify an arbitrary filename in the loggerFileName connection parameter
"jdbc:postgresql://localhost:5432/test?user=test&password=test&loggerLevel=DEBUG&loggerFile=./blah.jsp&<%Runtime.getRuntime().exec(request.getParameter(\"i\"));%>"
This creates a valid JSP file which could lead to a Remote Code Execution
### Patches
Problem has been resolved in version 42.3.3
### Workarounds
sanitize the inputs to the driver
| null | 2022-03-03T05:13:55.969503Z | 2022-02-16T00:08:18Z | MODERATE | null | null | {'https://github.com/pgjdbc/pgjdbc', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8', 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'} | null |
Maven | GHSA-2hw2-62cp-p9p7 | Access control bypass in Apache ZooKeeper | An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users. | {'CVE-2019-0201'} | 2022-03-03T05:13:15.782066Z | 2019-05-29T18:54:11Z | MODERATE | null | {'CWE-862'} | {'https://access.redhat.com/errata/RHSA-2019:3892', 'https://www.debian.org/security/2019/dsa-4461', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201', 'https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://seclists.org/bugtraq/2019/Jun/13', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://issues.apache.org/jira/browse/ZOOKEEPER-1392', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://zookeeper.apache.org/security.html#CVE-2019-0201', 'https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html', 'https://security.netapp.com/advisory/ntap-20190619-0001/', 'https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E', 'http://www.securityfocus.com/bid/108427'} | null |
Maven | GHSA-ghm8-mmx7-xvg2 | Information Exposure in Apache Tapestry | Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1. | {'CVE-2021-30638'} | 2022-03-18T18:02:33.418375Z | 2022-03-18T17:53:58Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-30638', 'http://www.openwall.com/lists/oss-security/2021/04/27/3', 'https://security.netapp.com/advisory/ntap-20210528-0004/', 'https://www.zerodayinitiative.com/advisories/ZDI-21-491/', 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E'} | null |
Maven | GHSA-mm44-wc5p-wqhq | Denial of service due to reference expansion in versions earlier than 4.0 | ### Impact
The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
### Patches
This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
### Workarounds
Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows:
CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false"));
In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
cbor.EncodeToBytes();
}
Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
LimitedMemoryStream stream = new LimitedMemoryStream(100000); // Limit to 100000 bytes
cbor.WriteTo(stream);
return stream.ToBytes();
To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
### References
See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
### For more information
If you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
| null | 2022-03-03T05:13:21.899317Z | 2020-07-07T16:45:24Z | HIGH | null | null | {'https://github.com/peteroupc/CBOR-Java', 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq'} | null |
Maven | GHSA-hv53-q76c-7f8c | OS Command Injection in OpenTSDB | A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.) | {'CVE-2020-35476'} | 2022-03-03T05:13:01.818108Z | 2021-08-02T17:02:21Z | CRITICAL | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35476', 'https://github.com/OpenTSDB/opentsdb/issues/2051'} | null |
Maven | GHSA-wcp5-m52f-mhh5 | Improper Restriction of XML External Entity Reference in MPXJ | "MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components." | {'CVE-2020-25020'} | 2022-03-03T05:14:17.857779Z | 2021-05-07T15:54:36Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020', 'https://github.com/joniles/mpxj/releases/tag/v8.1.4', 'https://www.oracle.com/security-alerts/cpujan2021.html'} | null |
Maven | GHSA-g973-978j-2c3p | Denial of Service in SheetJS Pro | SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js. | {'CVE-2021-32014'} | 2022-03-03T05:14:12.644117Z | 2021-07-22T19:47:15Z | MODERATE | null | {'CWE-345', 'CWE-400'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014'} | null |
Maven | GHSA-9xcj-c8cr-8c3c | In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack | When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. | {'CVE-2019-17563'} | 2022-03-03T05:13:32.952120Z | 2019-12-26T18:22:26Z | HIGH | null | {'CWE-384'} | {'https://seclists.org/bugtraq/2019/Dec/43', 'https://usn.ubuntu.com/4251-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html', 'https://www.debian.org/security/2020/dsa-4680', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200107-0001/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'} | null |
Maven | GHSA-qmqc-x3r4-6v39 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. | {'CVE-2019-14893'} | 2022-03-03T05:13:31.341201Z | 2020-05-15T18:59:07Z | HIGH | null | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://security.netapp.com/advisory/ntap-20200327-0006/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-p8p6-rcp6-4mrm | Uncontrolled Recursion in Play Framework | In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents. | {'CVE-2020-26883'} | 2021-04-22T16:54:42Z | 2022-02-10T20:23:01Z | HIGH | null | {'CWE-674'} | {'https://www.playframework.com/security/vulnerability/CVE-2020-26883-JsonParseUncontrolledRecursion', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26883', 'https://github.com/playframework/playframework/pull/10495'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.