ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-x5h4-9gqw-942j
Improper Verification of Cryptographic Signature in aws-encryption-sdk
### Impact This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages. This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages. For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit. Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data. ### Patches Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues. Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x ### Workarounds None ### For more information https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
null
2021-06-01T21:17:53Z
2021-06-01T21:17:53Z
MODERATE
0
{'CWE-347'}
{'https://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j', 'https://github.com/advisories/GHSA-x5h4-9gqw-942j'}
null
GHSA
GHSA-pcm6-g2qp-9gw8
Cap-Strap gem for Ruby places credentials on the useradd command line
lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.
{'CVE-2014-4992'}
2022-04-26T18:04:07Z
2018-03-16T01:13:46Z
HIGH
7.8
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-4992', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'http://www.openwall.com/lists/oss-security/2014/07/07/9', 'https://github.com/advisories/GHSA-pcm6-g2qp-9gw8', 'http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html'}
null
GHSA
GHSA-x54v-qxxr-93qc
Missing release of memory in sized-chunks
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, insert_from can have a memory-safety issue upon a panic.
{'CVE-2020-25795'}
2021-08-25T20:45:01Z
2021-08-25T20:45:01Z
HIGH
7.5
{'CWE-401'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25795', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://github.com/advisories/GHSA-x54v-qxxr-93qc', 'https://github.com/bodil/sized-chunks/issues/11'}
null
GHSA
GHSA-g2f6-v5qh-h2mq
Nexus Repository Manager 3 - Remote Code Execution
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
{'CVE-2020-10199'}
2021-07-28T21:48:58Z
2020-04-14T15:27:05Z
HIGH
8.8
{'CWE-917'}
{'https://support.sonatype.com/hc/en-us/articles/360044882533', 'http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html', 'https://github.com/advisories/GHSA-g2f6-v5qh-h2mq', 'https://securitylab.github.com/advisories/GHSL-2020-015-nxrm-sonatype', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10199'}
null
GHSA
GHSA-pccr-q7v9-5f27
Improper Input Validation and Path Traversal in Apache Solr
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.
{'CVE-2021-44548'}
2022-01-18T22:41:34Z
2022-01-06T21:32:35Z
HIGH
9.8
{'CWE-20', 'CWE-22', 'CWE-40'}
{'https://security.netapp.com/advisory/ntap-20220114-0005/', 'https://solr.apache.org/security.html#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler', 'https://github.com/advisories/GHSA-pccr-q7v9-5f27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44548'}
null
GHSA
GHSA-gf2j-f278-xh4v
Division by zero in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero in [`BiasAndClamp` implementation](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75): ```cc inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size, const float* bias_data, int array_size, float* array_data) { // ... TFLITE_DCHECK_EQ((array_size % bias_size), 0); // ... } ``` There is no check that the `bias_size` is non zero. ### Patches We have patched the issue in GitHub commit [8c6f391a2282684a25cbfec7687bd5d35261a209](https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23557'}
2022-02-11T16:11:40Z
2022-02-09T23:47:57Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23557', 'https://github.com/advisories/GHSA-gf2j-f278-xh4v', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v'}
null
GHSA
GHSA-4x6v-rwh4-55jw
Pomelo allows external control of critical state data
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
{'CVE-2019-18954'}
2021-08-19T16:02:00Z
2019-12-02T18:16:34Z
MODERATE
5.3
{'CWE-668'}
{'https://github.com/NetEase/pomelo/issues/1149', 'https://github.com/advisories/GHSA-4x6v-rwh4-55jw', 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}
null
GHSA
GHSA-3hq6-rmv7-39vh
Injection in op-browser
op-browser through 1.0.9 is vulnerable to Command Injection. It allows execution of arbitrary commands via the url function.
{'CVE-2020-7625'}
2022-02-10T23:45:35Z
2022-02-10T23:45:28Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/hiproxy/open-browser/pull/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7625', 'https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259', 'https://github.com/hiproxy/open-browser/blob/master/lib/index.js#L75,', 'https://github.com/hiproxy/open-browser/pull/4', 'https://github.com/advisories/GHSA-3hq6-rmv7-39vh'}
null
GHSA
GHSA-2j58-pwwv-x666
Cross-Site Request Forgery in sqlite-web
This affects all versions of package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack.
{'CVE-2021-23404'}
2021-09-09T17:10:35Z
2021-09-09T17:10:35Z
HIGH
7.6
{'CWE-352'}
{'https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324', 'https://github.com/coleifer/sqlite-web/blob/2e7c85da3d37f80074ed3ae39b5851069b4f301c/sqlite_web/__main__.py%23L1', 'https://github.com/advisories/GHSA-2j58-pwwv-x666', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23404'}
null
GHSA
GHSA-qv2g-99x4-45x6
Malicious npm package: discord-fix
The npm `discord-fix` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-01-29T18:12:07Z
2021-01-29T18:12:07Z
CRITICAL
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/1597', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755', 'https://github.com/advisories/GHSA-qv2g-99x4-45x6'}
null
GHSA
GHSA-m4fw-77v7-924m
Moderate severity vulnerability that affects qutebrowser
qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted <title> attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week).
{'CVE-2018-1000559'}
2021-09-14T22:12:29Z
2018-09-13T15:47:57Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/qutebrowser/qutebrowser/issues/4011', 'https://github.com/advisories/GHSA-m4fw-77v7-924m', 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f', 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000559'}
null
GHSA
GHSA-h4m5-qpfp-3mpv
Directory Traversal in Babel
Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.
{'CVE-2021-42771'}
2021-12-13T21:33:38Z
2021-10-21T17:49:59Z
HIGH
7.8
{'CWE-22'}
{'https://lists.debian.org/debian-lts/2021/10/msg00040.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html', 'https://www.tenable.com/security/research/tra-2021-14', 'https://github.com/advisories/GHSA-h4m5-qpfp-3mpv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42771', 'https://www.debian.org/security/2021/dsa-5018', 'https://github.com/python-babel/babel/pull/782'}
null
GHSA
GHSA-pvhp-v9qp-xf5r
High severity vulnerability that affects django-piston and django-tastypie
emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method. Django Tastypie has a very similar vulnerability.
{'CVE-2011-4103'}
2021-12-02T22:55:57Z
2018-07-23T19:50:48Z
HIGH
0
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2011/11/01/10', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4103', 'https://github.com/advisories/GHSA-pvhp-v9qp-xf5r', 'http://www.debian.org/security/2011/dsa-2344', 'https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/', 'https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/', 'https://bugzilla.redhat.com/show_bug.cgi?id=750658'}
null
GHSA
GHSA-r8wq-qrxc-hmcm
ReDoS in LDAP schema parser
https://github.com/python-ldap/python-ldap/issues/424 ### Impact The LDAP schema parser of python-ldap 3.3.1 and earlier are vulnerable to a regular expression denial-of-service attack. The issue affects clients that use ``ldap.schema`` package to parse LDAP schema definitions from an untrusted source. ### Patches The upcoming release of python-ldap 3.4.0 will contain a workaround to prevent ReDoS attacks. The schema parser refuses schema definitions with an excessive amount of backslashes. ### Workarounds As a workaround, users can check input for excessive amount of backslashes in schemas. More than a dozen backslashes per line are atypical. ### References [CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [python-ldap](https://github.com/python-ldap/python-ldap) tracker
null
2021-11-29T17:58:59Z
2021-11-29T17:58:59Z
MODERATE
6.5
{'CWE-1333'}
{'https://github.com/python-ldap/python-ldap/issues/424', 'https://github.com/advisories/GHSA-r8wq-qrxc-hmcm', 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}
null
GHSA
GHSA-939m-4xpw-v34v
Arbitrary Code Execution in blazar-dashboard
An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.
{'CVE-2020-26943'}
2021-09-21T16:36:47Z
2020-10-27T17:55:04Z
MODERATE
0
{'CWE-94'}
{'https://review.opendev.org/755814', 'http://www.openwall.com/lists/oss-security/2020/10/16/5', 'https://review.opendev.org/756064', 'https://security.openstack.org/ossa/OSSA-2020-007.html', 'https://review.opendev.org/755810', 'https://review.opendev.org/755813', 'https://github.com/advisories/GHSA-939m-4xpw-v34v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26943', 'https://launchpad.net/bugs/1895688', 'https://review.opendev.org/755812'}
null
GHSA
GHSA-q27f-v3r6-9v77
Improper Certificate Validation in EM-HTTP-Request
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
{'CVE-2020-13482'}
2021-05-24T18:13:13Z
2021-05-24T18:13:13Z
HIGH
7.4
{'CWE-295'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13482', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF/', 'https://github.com/igrigorik/em-http-request/issues/339', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://github.com/advisories/GHSA-q27f-v3r6-9v77'}
null
GHSA
GHSA-w8rc-pgxq-x2cj
Negative charge in shopping cart in Shopizer
### Impact Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total. ### Patches Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0 ### Workarounds Without uprading, it's possible to just apply the fixes in the same files it's done for the patch. Or you use javax constraint validation on the quantity parameter. ### References [Input Validation](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html) [Using bean validation constraint](https://javaee.github.io/tutorial/bean-validation002.html) [Commits with fixes](https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a) CVE Details below : [Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11007) [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-11007) ### Credits Found and solved by Yannick Gosset from Aix-Marseille University cybersecurity master program supervised by Yassine Ilmi
{'CVE-2020-11007'}
2022-04-19T19:02:25Z
2020-04-22T20:59:26Z
CRITICAL
6.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-w8rc-pgxq-x2cj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007', 'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a', 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj'}
null
GHSA
GHSA-c58c-w527-h77p
Deserialization of untrusted data in Apache Cayenne
Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server. This can result in arbitrary code execution.
{'CVE-2022-24289'}
2022-02-23T22:11:57Z
2022-02-12T00:00:48Z
HIGH
8.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24289', 'https://github.com/advisories/GHSA-c58c-w527-h77p', 'https://lists.apache.org/thread/zthjy83t3o66x7xcbygn2vg3yjvlc9vc', 'http://www.openwall.com/lists/oss-security/2022/02/11/1'}
null
GHSA
GHSA-2gc7-w4hw-rr2m
class.upload.php in verot.net omits .pht from the set of dangerous file extensions
class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576.
{'CVE-2019-19634'}
2021-08-19T19:29:18Z
2020-02-28T01:10:17Z
CRITICAL
9.8
{'CWE-434'}
{'https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e', 'https://github.com/jra89/CVE-2019-19634', 'https://github.com/advisories/GHSA-2gc7-w4hw-rr2m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19634', 'https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php#L3068'}
null
GHSA
GHSA-g9mp-8g3h-3c5c
Improper nonce handling: potential overflow, potential state DoS
The Go package `github.com/flynn/noise`, a [Noise Protocol](https://noiseprotocol.org/) implementation, has two bugs in nonce handling in versions prior to v1.0.0. ### Issue 1: Potential nonce overflow If 2^64 (~18.4 quintillion) or more messages are encrypted with `Encrypt` after handshaking, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce, resulting in a potentially catastrophic weakening of the security properties of the symmetric cipher. This has been resolved in the patched version by returning `ErrMaxNonce` from the `CipherState` `Encrypt` and `Decrypt` methods before the reserved maximum nonce is reached. If this error is encountered, the program should handshake again to start with a fresh `CipherState`. ### Issue 2: Potential denial of service via invalid ciphertext If an attacker sends an invalid ciphertext into one peer's `Decrypt`, the nonce is incremented unconditionally. This causes a desync of the `CipherState` due to a nonce mismatch between the peers, resulting in a failure to decrypt all subsequent messages. A new handshake will be required to establish a new `CipherState`. This has been resolved in the patched version by returning authentication errors from `Decrypt` before incrementing the nonce. ### Patches Fixed in https://github.com/flynn/noise/pull/44, tagged as v1.0.0. ### Acknowledgements These issues were discovered during [an audit](https://www.bamsoftware.com/software/dnstt/cure53-turbotunnel-2021.pdf) of a user of this package ([dnstt](https://www.bamsoftware.com/software/dnstt/)). Thanks to UC Berkley for commissioning the audit, and to David Fifield and Nathan Brown for their collaboration on the fixes. The fixed issues are noted in the audit as: * UCB-02-003 Potential nonce overflow in Noise protocol * UCB-02-006 DoS due to unconditional nonce increment
null
2022-04-12T22:48:22Z
2022-02-15T01:57:18Z
MODERATE
0
null
{'https://github.com/flynn/noise/security/advisories/GHSA-g9mp-8g3h-3c5c', 'https://github.com/advisories/GHSA-g9mp-8g3h-3c5c'}
null
GHSA
GHSA-x56r-5r34-qg74
Downloads Resources over HTTP in dalek-browser-ie-canary
Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10612'}
2021-01-08T00:47:51Z
2019-02-18T23:47:47Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10612', 'https://github.com/advisories/GHSA-x56r-5r34-qg74', 'https://nodesecurity.io/advisories/205', 'https://www.npmjs.com/advisories/205'}
null
GHSA
GHSA-f256-j965-7f32
Possible request smuggling in HTTP/2 due missing validation of content-length
### Impact The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case. ### Patches This was fixed as part of 4.1.61.Final ### Workarounds Validation can be done by the user before proxy the request by validating the header.
{'CVE-2021-21409'}
2022-04-22T15:50:24Z
2021-03-30T15:10:38Z
MODERATE
5.9
{'CWE-444'}
{'https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re9e6ed60941da831675de2f8f733c026757fb4fa28a7b6c9f3dfb575@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac9bd799ceac499c7a7e152a9b0dc7f2fe7f89ec5605d129bb047b@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-f256-j965-7f32', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r9ec78dc409f3f1edff88f21cab53737f36aad46f582a9825389092e0@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r967002f0939e69bdec58f070735a19dd57c1f2b8f817949ca17cddae@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rba2a9ef1d0af882ab58fadb336a58818495245dda43d32a7d7837187@%3Cissues.zookeeper.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295', 'https://lists.apache.org/thread.html/raa413040db6d2197593cc03edecfd168732e697119e6447b0a25d525@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9fe840c36b74f92b8d4a089ada1f9fd1d6293742efa18b10e06b66d2@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf148b2bf6c2754153a8629bc7495e216bd0bd4c915695486542a10b4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3Cdev.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21409', 'https://lists.apache.org/thread.html/r5f2f120b2b8d099226473db1832ffb4d7c1d6dc2d228a164bf293a8e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re1911e05c08f3ec2bab85744d788773519a0afb27272a31ac2a0b4e8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rcae42fba06979934208bbd515584b241d3ad01d1bb8b063512644362@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rafc77f9f03031297394f3d372ccea751b23576f8a2ae9b6b053894c5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432', 'https://lists.apache.org/thread.html/re39391adcb863f0e9f3f15e7986255948f263f02e4700b82453e7102@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7b54563abebe3dbbe421e1ba075c2030d8d460372f8c79b7789684b6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32', 'https://lists.apache.org/thread.html/r31044fb995e894749cb821c6fe56f487c16a97028e6e360e59f09d58@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-8j39-fgfp-vxh8
Moderate severity vulnerability that affects com.xuxueli:xxl-conf
An issue was discovered in XXL-CONF 1.6.0. There is a path traversal vulnerability via ../ in the keys parameter that can download any configuration file, related to ConfController.java and PropUtil.java.
{'CVE-2018-20094'}
2021-09-07T19:47:06Z
2018-12-19T19:25:04Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-8j39-fgfp-vxh8', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20094', 'https://github.com/xuxueli/xxl-conf/issues/61'}
null
GHSA
GHSA-2rxc-8f9w-fjq8
Window may read from uninitialized memory locations in rdiff
An issue was discovered in the rdiff crate through 2021-02-03 for Rust. Window may read from uninitialized memory locations.
{'CVE-2021-45694'}
2022-01-07T18:25:01Z
2022-01-06T22:14:13Z
HIGH
7.5
{'CWE-908'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rdiff/RUSTSEC-2021-0094.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45694', 'https://rustsec.org/advisories/RUSTSEC-2021-0094.html', 'https://github.com/advisories/GHSA-2rxc-8f9w-fjq8'}
null
GHSA
GHSA-8pfh-mm2g-hmc3
Authenticated Server Side Request Forgery
### Impact Authenticated Server Side Request Forgery ### Patches We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin: https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020 ### Credits We would like to thank <a rel="noopener" href="https://reqon.nl">REQON B.V.</a> for reporting this issue.
null
2020-12-21T18:01:24Z
2020-12-21T18:01:24Z
LOW
0
{'CWE-918'}
{'https://github.com/advisories/GHSA-8pfh-mm2g-hmc3', 'https://github.com/shopware/platform/security/advisories/GHSA-8pfh-mm2g-hmc3'}
null
GHSA
GHSA-hf66-r44g-p7j9
Inefficient Regular Expression Complexity in handsontable
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.
{'CVE-2021-23446'}
2021-10-08T21:29:09Z
2021-09-30T17:10:46Z
HIGH
7.5
{'CWE-1333'}
{'https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794', 'https://github.com/advisories/GHSA-hf66-r44g-p7j9', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795', 'https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770', 'https://github.com/handsontable/handsontable/pull/8742', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797', 'https://github.com/handsontable/handsontable/issues/8752', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23446'}
null
GHSA
GHSA-rvpc-w57p-q95f
HTTP Response Splitting in WSO2 transport-http
Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled.
{'CVE-2019-10797'}
2022-02-09T22:35:29Z
2022-02-09T22:35:29Z
MODERATE
6.5
{'CWE-113'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10797', 'https://github.com/advisories/GHSA-rvpc-w57p-q95f'}
null
GHSA
GHSA-w4fj-ccr6-7pcp
Insertion of Sensitive Information into Log File in Apache NiFi
An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
{'CVE-2020-1928'}
2022-01-06T20:40:56Z
2022-01-06T20:40:56Z
MODERATE
5.3
{'CWE-200', 'CWE-532'}
{'https://github.com/advisories/GHSA-w4fj-ccr6-7pcp', 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928', 'https://nifi.apache.org/security.html#CVE-2020-1928', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E'}
null
GHSA
GHSA-j38m-7q52-fgfh
Directory Traversal in node-server-forfront
Affected versions of `node-server-forfront` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16124'}
2021-01-08T18:37:57Z
2018-07-23T23:33:42Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/382', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront', 'https://nodesecurity.io/advisories/382', 'https://github.com/advisories/GHSA-j38m-7q52-fgfh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16124'}
null
GHSA
GHSA-94x5-94wf-m445
Directory Traversal in gomeplus-h5-proxy
Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16037'}
2021-01-08T19:06:21Z
2018-07-24T15:48:38Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/350', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16037', 'https://www.npmjs.com/advisories/350', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy', 'https://github.com/advisories/GHSA-94x5-94wf-m445'}
null
GHSA
GHSA-wjx2-7hqq-8h7m
rails_admin ruby gem XSS vulnerability
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
{'CVE-2020-36190'}
2021-01-19T18:16:40Z
2021-01-14T19:17:16Z
MODERATE
0
{'CWE-79'}
{'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3', 'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://github.com/advisories/GHSA-wjx2-7hqq-8h7m', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190'}
null
GHSA
GHSA-h9gj-rqrw-x4fq
Server Side Request Forgery in Apache Axis
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
{'CVE-2019-0227'}
2022-04-21T17:49:25Z
2019-05-14T04:02:24Z
HIGH
7.5
{'CWE-918'}
{'https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-h9gj-rqrw-x4fq', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0227', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-g5j6-r3x9-gf2m
Cross-site scripting in Contentful
Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.
{'CVE-2020-13258'}
2021-06-18T18:32:20Z
2021-06-18T18:32:20Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/contentful/the-example-app.py/issues/44', 'https://github.com/advisories/GHSA-g5j6-r3x9-gf2m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13258'}
null
GHSA
GHSA-g6w6-r76c-28j7
Incorrect Authorization in NATS nats-server
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2022-24450.txt>) ## Problem Description NATS nats-server through 2022-02-04 has Incorrect Access Control, with unchecked ability for clients to authorize into any account, because of a coding error in a long-extant experimental feature. A client crafting the initial protocol-level handshake could, with valid credentials for any account, specify a target account and switch into it immediately. This includes any other tenant, and includes the System account which controls nats-server core operations. For deployments not using multi-tenancy through NATS Accounts, there is still a vulnerability: normal users are able to choose to be in the System account. An experimental feature to provide dynamically provisioned sandbox accounts was designed to allow a server administrator to turn on an option to allow clients to dynamically request a brand new account inline at connection time. This feature went nowhere, but lived on in the code and was used by a number of tests; support was never added to any client libraries or to the documentation. A bug in handling the feature meant that if someone did in fact have valid account credentials, then they could specify any other existing account and they would be assigned into that account. Release 2.7.2 of nats-server removes the feature. Because of the lack of client support and absence from protocol documentation, we feel this is safe operationally as well as the safest fix for the code. ## Affected versions #### NATS Server * All 2.x versions up to and including 2.7.1. * Fixed with nats-io/nats-server: 2.7.2 * NATS Server 1.x did not have accounts. * Docker image: nats <https://hub.docker.com/_/nats> #### NATS Streaming Server * All versions embedding affected NATS Server: + Affected: v0.15.0 up to and including v0.24.0 + Fixed with nats-io/nats-streaming-server: 0.24.1 * Docker image: nats-streaming <https://hub.docker.com/_/nats-streaming> ## Impact Existing users could act in any account, including the System account. ## Workaround None. ## Solution Upgrade the NATS server.
{'CVE-2022-24450'}
2022-02-11T22:41:11Z
2022-02-08T17:23:16Z
CRITICAL
0
{'CWE-863'}
{'https://advisories.nats.io/CVE/CVE-2022-24450.txt', 'https://github.com/nats-io/nats-server/security/advisories/GHSA-g6w6-r76c-28j7', 'https://github.com/advisories/GHSA-g6w6-r76c-28j7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24450', 'https://github.com/nats-io/nats-server/releases/tag/v2.7.2'}
null
GHSA
GHSA-9ggp-4jpr-7ppj
Possible remote code execution via a remote procedure call
Withdrawn: duplicate of GHSA-pj4g-4488-wmxm ## Original Description In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
{'CVE-2019-16328'}
2021-02-17T19:44:51Z
2019-11-20T01:35:53Z
HIGH
0
null
{'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html', 'https://rpyc.readthedocs.io/en/latest/docs/security.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html', 'https://github.com/advisories/GHSA-9ggp-4jpr-7ppj', 'https://github.com/tomerfiliba/rpyc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16328'}
null
GHSA
GHSA-44r7-7p62-q3fr
Insecure generation of random numbers
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
{'CVE-2019-19794'}
2021-05-18T21:09:13Z
2021-05-18T21:09:13Z
MODERATE
5.9
{'CWE-338', 'CWE-330'}
{'https://github.com/advisories/GHSA-44r7-7p62-q3fr', 'https://github.com/coredns/coredns/issues/3547', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19794', 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33', 'https://github.com/coredns/coredns/issues/3519', 'https://github.com/miekg/dns/issues/1043', 'https://github.com/miekg/dns/pull/1044', 'https://github.com/miekg/dns/compare/v1.1.24...v1.1.25'}
null
GHSA
GHSA-57j2-w4cx-62h2
Deeply nested json in jackson-databind
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
{'CVE-2020-36518'}
2022-03-28T19:57:53Z
2022-03-12T00:00:36Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518', 'https://github.com/advisories/GHSA-57j2-w4cx-62h2', 'https://github.com/FasterXML/jackson-databind/issues/2816', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13'}
null
GHSA
GHSA-jc8m-cxhj-668x
Improper Restriction of Excessive Authentication Attempts in Sorcery
### Impact Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. ### Patches Patched as of version `0.15.0`. ### Workarounds Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`.
{'CVE-2020-11052'}
2022-04-19T19:02:25Z
2020-05-07T21:16:46Z
HIGH
8.3
{'CWE-307'}
{'https://github.com/Sorcery/sorcery/pull/235', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x', 'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/Sorcery/sorcery/issues/231', 'https://github.com/advisories/GHSA-jc8m-cxhj-668x'}
null
GHSA
GHSA-j838-vfpq-fmf2
Moderate severity vulnerability that affects actionpack
The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a &#x3a; sequence.
{'CVE-2013-1857'}
2021-09-14T19:16:51Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://support.apple.com/kb/HT5784', 'https://github.com/advisories/GHSA-j838-vfpq-fmf2', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}
null
GHSA
GHSA-rh7p-9c79-gpp8
Downloads Resources over HTTP in wasdk
Affected versions of `wasdk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wasdk`. ## Recommendation No fix is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit it are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10587'}
2021-09-17T18:23:53Z
2019-02-18T23:34:44Z
HIGH
8.1
{'CWE-311'}
{'https://github.com/advisories/GHSA-rh7p-9c79-gpp8', 'https://www.npmjs.com/advisories/179', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10587'}
null
GHSA
GHSA-r336-jxfr-4c3c
Path Traversal in LibreNMS
An issue was discovered in LibreNMS 1.50.1. An authenticated user can perform a directory traversal attack against the /pdf.php file with a partial filename in the report parameter, to cause local file inclusion resulting in code execution.
{'CVE-2019-12464'}
2021-08-17T22:42:32Z
2019-10-11T18:43:25Z
HIGH
7.5
{'CWE-22'}
{'https://www.darkmatter.ae/xen1thlabs/librenms-limited-local-file-inclusion-via-directory-traversal-vulnerability-xl-19-019/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12464', 'https://github.com/advisories/GHSA-r336-jxfr-4c3c'}
null
GHSA
GHSA-m639-9whg-fw97
Prototype Pollution in object-extend
The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend.
{'CVE-2021-23702'}
2022-02-28T22:17:43Z
2022-02-19T00:01:25Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-m639-9whg-fw97', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23702', 'https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470'}
null
GHSA
GHSA-898j-5cc8-cmf5
Moderate severity vulnerability that affects org.apache.storm:storm-core
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
{'CVE-2018-8008'}
2021-09-07T16:25:20Z
2018-10-16T17:35:24Z
MODERATE
5.5
{'CWE-22'}
{'http://www.securityfocus.com/bid/104418', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8008', 'https://lists.apache.org/thread.html/613b2fca8bcd0a3b12c0b763ea8f7cf62e422e9f79fce6cfa5b08a58@%3Cdev.storm.apache.org%3E', 'https://github.com/advisories/GHSA-898j-5cc8-cmf5'}
null
GHSA
GHSA-m648-33qf-v3gp
CHECK-fail in LSTM with zero-length input in TensorFlow
### Impact Running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a `CHECK` failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. ### Patches We have patched the issue in GitHub commit [14755416e364f17fb1870882fa778c7fec7f16e3](https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2020-26270'}
2021-01-07T22:35:25Z
2020-12-10T19:07:31Z
LOW
4.4
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3', 'https://github.com/advisories/GHSA-m648-33qf-v3gp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26270', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp'}
null
GHSA
GHSA-gh6x-4whr-2qv4
Null pointer dereference and heap OOB read in operations restoring tensors
### Impact When restoring tensors via raw APIs, if the tensor name is not provided, TensorFlow can be tricked into dereferencing a null pointer: ```python import tensorflow as tf tf.raw_ops.Restore( file_pattern=['/tmp'], tensor_name=[], default_value=21, dt=tf.int, preferred_shard=1) ``` The same undefined behavior can be triggered by `tf.raw_ops.RestoreSlice`: ```python import tensorflow as tf tf.raw_ops.RestoreSlice( file_pattern=['/tmp'], tensor_name=[], shape_and_slice='2', dt=inp.array([tf.int]), preferred_shard=1) ``` Alternatively, attackers can read memory outside the bounds of heap allocated data by providing some tensor names but not enough for a successful restoration: ```python import tensorflow as tf tf.raw_ops.Restore( file_pattern=['/tmp'], tensor_name=['x'], default_value=21, dt=tf.int, preferred_shard=42) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/save_restore_tensor.cc#L158-L159) retrieves the tensor list corresponding to the `tensor_name` user controlled input and immediately retrieves the tensor at the restoration index (controlled via `preferred_shard` argument). This occurs without validating that the provided list has enough values. If the list is empty this results in dereferencing a null pointer (undefined behavior). If, however, the list has some elements, if the restoration index is outside the bounds this results in heap OOB read. ### Patches We have patched the issue in GitHub commit [9e82dce6e6bd1f36a57e08fa85af213e2b2f2622](https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37639'}
2022-04-26T18:06:27Z
2021-08-25T14:44:05Z
HIGH
8.4
{'CWE-476', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4', 'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37639', 'https://github.com/advisories/GHSA-gh6x-4whr-2qv4'}
null
GHSA
GHSA-j9pj-hx76-92v6
Server-Side Request Forgery in phantomjs-seo
This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack.
{'CVE-2020-7739'}
2021-05-10T18:38:21Z
2021-05-10T18:38:21Z
HIGH
8.2
{'CWE-20', 'CWE-918'}
{'https://www.npmjs.com/package/phantomjs-seo', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7739', 'https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638', 'https://github.com/areverberi/phantomjs-seo/blob/083f66892f97d67031668decb917389ffc32a94c/index.js%23L17', 'https://github.com/advisories/GHSA-j9pj-hx76-92v6'}
null
GHSA
GHSA-gfv6-cj92-g3hx
Moderate severity vulnerability that affects pykmip
OpenKMIP PyKMIP version All versions before 0.8.0 contains a CWE 399: Resource Management Errors (similar issue to CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the server can be made unavailable by one or more clients opening all of the available sockets. This attack appear to be exploitable via A client or clients open sockets with the server and then never close them. This vulnerability appears to have been fixed in 0.8.0.
{'CVE-2018-1000872'}
2021-09-10T20:54:33Z
2018-12-21T17:46:39Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/OpenKMIP/PyKMIP/issues/430', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000872', 'https://github.com/advisories/GHSA-gfv6-cj92-g3hx'}
null
GHSA
GHSA-vhfp-9wvj-gwvg
XML External Entity vulnerability in MODX CMS
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
{'CVE-2020-25911'}
2021-11-03T14:52:00Z
2021-11-01T19:19:43Z
CRITICAL
9.1
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution/issues/15237', 'https://github.com/modxcms/revolution/pull/15238', 'https://github.com/advisories/GHSA-vhfp-9wvj-gwvg', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md'}
null
GHSA
GHSA-5p52-j8pw-j7x5
Moderate severity vulnerability that affects org.bedework:bw-webdav
Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java.
{'CVE-2018-20000'}
2021-09-01T22:18:42Z
2018-12-19T19:24:52Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/advisories/GHSA-5p52-j8pw-j7x5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20000', 'https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3', 'https://github.com/Bedework/bw-webdav/pull/1'}
null
GHSA
GHSA-r2j6-p67h-q639
Secret disclosure when containing characters that become URI encoded
### Impact Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. ### Patches Fixed in v17.2.3 ### Workarounds Secrets that do not contain characters that become encoded when included in a URL are already masked properly.
{'CVE-2020-26226'}
2022-04-19T19:02:39Z
2020-11-18T21:19:14Z
HIGH
8.1
{'CWE-116'}
{'https://github.com/advisories/GHSA-r2j6-p67h-q639', 'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226', 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639'}
null
GHSA
GHSA-4vf2-4xcg-65cx
Division by 0 in `Conv2D`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.Conv2D`: ```python import tensorflow as tf input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) strides = [1, 1, 1, 1] padding = "SAME" tf.raw_ops.Conv2D(input=input, filter=filter, strides=strides, padding=padding) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/988087bd83f144af14087fe4fecee2d250d93737/tensorflow/core/kernels/conv_ops.cc#L261-L263) does a division by a quantity that is controlled by the caller: ```cc const int64 patch_depth = filter.dim_size(2); if (in_depth % patch_depth != 0) { ... } ``` ### Patches We have patched the issue in GitHub commit [b12aa1d44352de21d1a6faaf04172d8c2508b42b](https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29526'}
2021-05-21T14:21:55Z
2021-05-21T14:21:55Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b', 'https://github.com/advisories/GHSA-4vf2-4xcg-65cx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29526'}
null
GHSA
GHSA-92xj-mqp7-vmcj
Prototype Pollution in node-forge
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
{'CVE-2020-7720'}
2022-01-13T18:24:31Z
2020-09-14T21:42:09Z
HIGH
8.8
{'CWE-1321', 'CWE-915'}
{'https://github.com/advisories/GHSA-92xj-mqp7-vmcj', 'https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7720'}
null
GHSA
GHSA-cxg7-84wp-8pcq
yetiforcecrm is vulnerable to Business Logic Errors
yetiforcecrm is vulnerable to Business Logic Errors.
{'CVE-2021-4117'}
2022-01-03T15:47:43Z
2021-12-16T21:01:07Z
HIGH
7.7
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://github.com/advisories/GHSA-cxg7-84wp-8pcq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a'}
null
GHSA
GHSA-5rg2-6qr5-2xp8
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3863'}
2021-10-25T20:08:18Z
2021-10-21T17:49:18Z
MODERATE
5.5
{'CWE-79'}
{'https://github.com/advisories/GHSA-5rg2-6qr5-2xp8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}
null
GHSA
GHSA-675m-85rw-j3w4
Prototype Pollution in just-extend
Versions of `just-extend` before 4.0.0 are vulnerable to prototype pollution. Provided certain input `just-extend` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation Update to version `4.0.0` or later.
{'CVE-2018-16489'}
2021-01-08T19:46:58Z
2019-02-07T18:17:12Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-675m-85rw-j3w4', 'https://www.npmjs.com/advisories/780', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16489', 'https://hackerone.com/reports/430291'}
null
GHSA
GHSA-8jpx-m2wh-2v34
Remote Code Execution (RCE) vulnerability in dropwizard-validation
### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability. If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended. The changes introduced in Dropwizard 1.3.19 and 2.0.2 (see [GHSA-3mcp-9wr4-cjqf](https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf)/[CVE-2020-5245](https://github.com/advisories/GHSA-3mcp-9wr4-cjqf)) unfortunately didn't fix the underlying issue completely. ### Impact This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**. ### Patches The issue has been fixed in **dropwizard-validation** **1.3.21** and **2.0.3** or later. We strongly recommend upgrading to one of these versions. The evaluation of EL expressions has been disabled by default now. In order to use some interpolation in the violation messages added to [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html), it has to be explicitly allowed by setting [`SelfValidating#escapeExpressions()`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html#escapeExpressions--) to `false`. It is also recommended to use the `addViolation` methods supporting message parameters instead of EL expressions introduced in Dropwizard 1.3.21 and 2.0.3: * [`ViolationCollector#addViolation(String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.util.Map-) * [`ViolationCollector#addViolation(String, String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.util.Map-) * [`ViolationCollector#addViolation(String, String, Integer, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.Integer-java.lang.String-java.util.Map-) * [`ViolationCollector#addViolation(String, String, String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.lang.String-java.util.Map-) ### Workarounds If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html). Example: ```java @SelfValidation public void validateFullName(ViolationCollector col) { if (fullName.contains("_")) { // Sanitize fullName variable by escaping relevant characters such as "$" col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName)); } } ``` See also: https://github.com/dropwizard/dropwizard/blob/v2.0.3/dropwizard-validation/src/main/java/io/dropwizard/validation/InterpolationHelper.java ### References * https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf * https://github.com/dropwizard/dropwizard/pull/3208 * https://github.com/dropwizard/dropwizard/pull/3209 * https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext ### For more information If you have any questions or comments about this advisory: * Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new) * Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev) ### Security contact If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy): https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability
{'CVE-2020-11002'}
2022-04-19T19:02:55Z
2020-04-10T18:42:20Z
HIGH
8
{'CWE-74'}
{'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability', 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext', 'https://github.com/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwizard/dropwizard/pull/3209', 'https://github.com/dropwizard/dropwizard/pull/3208', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11002'}
null
GHSA
GHSA-6973-94v8-5mgw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0991'}
2021-03-29T20:57:42Z
2021-03-29T20:57:42Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0991', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://github.com/advisories/GHSA-6973-94v8-5mgw', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991'}
null
GHSA
GHSA-vwjc-q9px-r9vq
Denial of Service in ecstatic
Versions of `ecstatic` prior to 1.4.0 are affected by a denial of service vulnerability when certain input strings are sent via the `Last-Modified` or `If-Modified-Since` headers. Parsing certain inputs with `new Date()` or `Date.parse()` cases v8 to crash. As ecstatic passes the value of the affected headers into one of these functions, sending certain inputs via one of the headers will cause the server to crash. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2015-9242'}
2021-01-08T01:57:13Z
2018-06-07T19:43:11Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9242', 'https://bugs.chromium.org/p/v8/issues/detail?id=4640', 'https://www.npmjs.com/advisories/64', 'https://github.com/advisories/GHSA-vwjc-q9px-r9vq'}
null
GHSA
GHSA-fm35-jgg3-3grx
NaN/INF in serverbound movement packets can crash clients and servers
### Impact A malicious client may send a `MovePlayerPacket` to the server whose position or rotation contains NaN or INF. Since neither the server nor vanilla client handles this properly, a number of interesting side effects come into play. - The server may crash in various ways if this exploit is used, because some mathematical operations on NaN/INF generate PHP warnings, which are converted into exceptions. - Clients may not be able to see other clients who have a NaN/INF rotation. - Clients may also crash in such cases. ### Patches A patch for this was included in the 3.18.1 release: https://github.com/pmmp/PocketMine-MP/commit/fb20bb38327b4c08ee3976640cd0dd547388a638 ### Workarounds Workarounds could be implemented as plugins using `DataPacketReceiveEvent` to block any inbound movement packets containing bogus values. ### For more information If you have any questions or comments about this advisory: - Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP) - Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-03-21T20:45:05Z
2022-03-18T17:54:38Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fm35-jgg3-3grx', 'https://github.com/advisories/GHSA-fm35-jgg3-3grx'}
null
GHSA
GHSA-q7q9-w24q-cpgh
Cross-site Scripting (XSS) in Apache Ambari Views
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
{'CVE-2020-1936'}
2022-01-06T20:35:22Z
2022-01-06T20:35:22Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1936', 'https://github.com/advisories/GHSA-q7q9-w24q-cpgh', 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210', 'https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/02/1', 'https://github.com/apache/ambari/pull/3040', 'https://issues.apache.org/jira/browse/AMBARI-25329'}
null
GHSA
GHSA-j8j8-348v-wfm3
High severity vulnerability that affects python-saml
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
{'CVE-2017-11427'}
2021-01-14T21:22:53Z
2019-07-05T21:11:26Z
HIGH
7.7
{'CWE-287'}
{'https://github.com/advisories/GHSA-j8j8-348v-wfm3', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11427'}
null
GHSA
GHSA-j7qv-pgf6-hvh4
XSS in `*Text` options of the Datepicker widget in jquery-ui
### Impact Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { showButtonPanel: true, showOn: "both", closeText: "<script>doEvilThing( 'closeText XSS' )</script>", currentText: "<script>doEvilThing( 'currentText XSS' )</script>", prevText: "<script>doEvilThing( 'prevText XSS' )</script>", nextText: "<script>doEvilThing( 'nextText XSS' )</script>", buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>", appendText: "<script>doEvilThing( 'appendText XSS' )</script>", } ); ``` will call `doEvilThing` with 6 different parameters coming from all `*Text` options. ### Patches The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. ### Workarounds A workaround is to not accept the value of the `*Text` options from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
{'CVE-2021-41183'}
2022-04-22T15:40:46Z
2021-10-26T14:55:21Z
MODERATE
6.5
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://bugs.jqueryui.com/ticket/15284', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-core-2022-001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://github.com/jquery/jquery-ui/pull/1953', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://github.com/advisories/GHSA-j7qv-pgf6-hvh4', 'https://www.drupal.org/sa-contrib-2022-004', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183', 'https://www.drupal.org/sa-core-2022-002'}
null
GHSA
GHSA-4rq4-32rv-6wp6
Improper Privilege Management in shelljs
shelljs is vulnerable to Improper Privilege Management
{'CVE-2022-0144'}
2022-01-21T23:37:28Z
2022-01-21T23:37:28Z
HIGH
7.1
{'CWE-269'}
{'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c', 'https://github.com/advisories/GHSA-4rq4-32rv-6wp6'}
null
GHSA
GHSA-mj87-8xf8-fp4w
Cross-Site Scripting in yui
Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url. ## Recommendation YUI has published their recommendation to fix this issue. Their recommendation is to: - Delete self-hosted copies of these files if you are not using them - Use the Yahoo! CDN hosted files - Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution).
{'CVE-2013-4939'}
2021-09-23T21:39:45Z
2020-09-01T16:42:51Z
MODERATE
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/332', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678', 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-mj87-8xf8-fp4w', 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E', 'https://moodle.org/mod/forum/discuss.php?d=232496', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939', 'https://yuilibrary.com/support/20130515-vulnerability/', 'http://yuilibrary.com/support/20130515-vulnerability/'}
null
GHSA
GHSA-gwr8-5j83-483c
OS Command Injection and Improper Input Validation in ansible
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
{'CVE-2019-14904'}
2022-04-26T17:59:52Z
2021-04-20T16:44:22Z
MODERATE
7.3
{'CWE-20', 'CWE-78'}
{'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/advisories/GHSA-gwr8-5j83-483c', 'https://github.com/ansible/ansible/pull/65686', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14904', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'}
null
GHSA
GHSA-jpjp-vxv6-59hm
Directory Traversal in open-device
Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16187'}
2021-01-08T18:33:22Z
2018-07-23T20:41:11Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device', 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm', 'https://nodesecurity.io/advisories/447', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187', 'https://www.npmjs.com/advisories/447'}
null
GHSA
GHSA-cch6-5x4h-6qc5
Directory Traversal in tiny-http
Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16097'}
2021-01-14T15:55:23Z
2020-09-01T16:46:04Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/342', 'https://github.com/advisories/GHSA-cch6-5x4h-6qc5', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097', 'https://www.npmjs.com/advisories/342'}
null
GHSA
GHSA-wf43-55jj-vwq8
DNS Rebinding in etcd
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
{'CVE-2018-1099'}
2022-04-12T22:12:47Z
2022-02-15T01:57:18Z
MODERATE
5.5
{'CWE-350', 'CWE-20'}
{'https://github.com/advisories/GHSA-wf43-55jj-vwq8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552717', 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56', 'https://github.com/coreos/etcd/issues/9353'}
null
GHSA
GHSA-j3jp-gvr5-7hwq
Low severity vulnerability that affects python-engineio
## WebSocket cross-origin vulnerability ### Impact This is a Cross-Site Request Forgery (CSRF) vulnerability. It affects Socket.IO and Engine.IO web servers that authenticate clients using cookies. ### Patches python-engineio version 3.9.0 patches this vulnerability by adding server-side Origin header checks. ### Workarounds Do not use cookies for client authentication, or else add a CSRF token to the connection URL. ### References https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) https://www.christian-schneider.net/CrossSiteWebSocketHijacking.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [python-engineio](http://github.com/miguelgrinberg/python-engineio)
{'CVE-2019-13611'}
2021-09-14T18:17:04Z
2019-07-30T20:47:25Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/miguelgrinberg/python-engineio/issues/128', 'https://github.com/advisories/GHSA-j3jp-gvr5-7hwq', 'https://github.com/miguelgrinberg/python-engineio/security/advisories/GHSA-j3jp-gvr5-7hwq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13611'}
null
GHSA
GHSA-mpww-j7xj-cj35
Downloads Resources over HTTP in native-opencv
Affected versions of `native-opencv` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `native-opencv`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10658'}
2021-01-08T18:26:49Z
2019-02-18T23:45:07Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/263', 'https://nodesecurity.io/advisories/263', 'https://github.com/advisories/GHSA-mpww-j7xj-cj35', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10658'}
null
GHSA
GHSA-cmj2-m9m2-6726
Downloads Resources over HTTP in grunt-ccompiler
Affected versions of `grunt-ccompiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-ccompiler`. ## Recommendation No patch is currently available for this vulnerability, and the repository has been deleted from the owner's github account. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10636'}
2021-01-08T18:57:40Z
2019-02-18T23:47:11Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-cmj2-m9m2-6726', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10636', 'https://nodesecurity.io/advisories/239', 'https://www.npmjs.com/advisories/239'}
null
GHSA
GHSA-frxj-5j27-f8rf
Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
{'CVE-2019-14905'}
2021-11-03T14:53:14Z
2021-04-20T16:44:49Z
MODERATE
5.6
{'CWE-668', 'CWE-20', 'CWE-73', 'CWE-610'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14905', 'https://access.redhat.com/errata/RHSA-2020:0216', 'https://access.redhat.com/errata/RHSA-2020:0218', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905', 'https://github.com/advisories/GHSA-frxj-5j27-f8rf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}
null
GHSA
GHSA-3p3g-vpw6-4w66
Authentication Bypass in hydra
### Impact "When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:" > A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties "Hydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens:" ``` $ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'grant_type=client_credentials' \ --data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \ --data-urlencode 'scope=application openid' \ --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \ --data-urlencode 'client_assertion=eyJhb [...] jTw' {"access_token":"zeG0NoqOtlACl8q5J6A-TIsNegQRRUzqLZaYrQtoBZQ.VR6iUcJQYp3u_j7pwvL7YtPqGhtyQe5OhnBE2KCp5pM","expires_in":3599,"scope":"application openid","token_type":"bearer"}⏎ ~$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode 'grant_type=client_credentials' \ --data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \ --data-urlencode 'scope=application openid' \ --data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \ --data-urlencode 'client_assertion=eyJhb [...] jTw' {"access_token":"wOYtgCLxLXlELORrwZlmeiqqMQ4kRzV-STU2_Sollas.mwlQGCZWXN7G2IoegUe1P0Vw5iGoKrkOzOaplhMSjm4","expires_in":3599,"scope":"application openid","token_type":"bearer"} ``` ### Severity "We rate the severity as medium because the following reasons make it hard to replay tokens without the patch:" - TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks - The expiry time of the JWT gives only a short window of opportunity where it could be replayed ### Patches This will be patched with v1.4.0+oryOS.17 ### Workarounds Two workarounds have been identified: - Do not allow clients to use `private_key_jwt` - Use short expiry times for the JWTs ### Upstream This issue will be resolved in the upstream repository https://github.com/ory/fosite
{'CVE-2020-5300'}
2021-05-27T18:43:22Z
2021-05-27T18:43:22Z
MODERATE
5.8
{'CWE-294'}
{'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication', 'https://github.com/ory/hydra/security/advisories/GHSA-3p3g-vpw6-4w66', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5300', 'https://github.com/advisories/GHSA-3p3g-vpw6-4w66', 'https://github.com/ory/hydra/releases/tag/v1.4.0', 'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}
null
GHSA
GHSA-hx83-rpqf-m267
user/group information can be corrupted across storing in fsimage and reading back from fsimage
In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.
{'CVE-2018-11768'}
2021-08-18T22:42:34Z
2019-11-20T01:38:00Z
HIGH
7.5
{'CWE-119'}
{'https://lists.apache.org/thread.html/f20bb4e055d8394fc525cc7772fb84096f706389043e76220c8a29a4@%3Chdfs-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ea6d2dfbefab8ebe46be18b05136b83ae53b7866f1bc60c680a2b600@%3Chdfs-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/2c9cc65864be0058a5d5ed2025dfb9c700bf23d352b0c826c36ff96a@%3Chdfs-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/72ca514e01cd5f08151e74f9929799b4cbe1b6e9e6cd24faa72ffcc6@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/9b609d4392d886711e694cf40d86f770022baf42a1b1aa97e8244c87@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/caacbbba2dcc1105163f76f3dfee5fbd22e0417e0783212787086378@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ceb16af9139ab0fea24aef935b6321581976887df7ad632e9a515dda@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11768', 'https://github.com/advisories/GHSA-hx83-rpqf-m267', 'https://hadoop.apache.org/cve_list.html'}
null
GHSA
GHSA-gcv9-6737-pjqw
SSRF vulnerability in jupyter-server-proxy
### Impact **What kind of vulnerability is it?** Server-Side Request Forgery ( SSRF ) **Who is impacted?** Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled. A lack of input validation allowed authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Upgrade to 3.2.1, or apply the patch https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch ### For more information If you have any questions or comments about this advisory: * Open a topic [on our forum](https://discourse.jupyter.org) * Email the Jupyter security team at [security@ipython.org](mailto:security@ipython.org)
{'CVE-2022-21697'}
2022-04-19T19:03:20Z
2022-01-27T16:24:26Z
MODERATE
6.3
{'CWE-918'}
{'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb', 'https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch', 'https://github.com/advisories/GHSA-gcv9-6737-pjqw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21697'}
null
GHSA
GHSA-9vh6-qfv6-vcqp
snipe-IT vulnerable to host header injection
Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This can lead to account take over.
{'CVE-2022-23064'}
2022-05-03T06:29:50Z
2022-05-03T00:00:43Z
HIGH
8.8
{'CWE-74'}
{'https://github.com/advisories/GHSA-9vh6-qfv6-vcqp', 'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064'}
null
GHSA
GHSA-6494-v9fq-fgq2
Keystone is vulnerable to CSV injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
{'CVE-2017-15879'}
2022-04-25T22:05:05Z
2017-11-16T01:46:50Z
HIGH
8.8
{'CWE-20'}
{'https://www.exploit-db.com/exploits/43053/', 'https://github.com/advisories/GHSA-6494-v9fq-fgq2', 'https://github.com/keystonejs/keystone/pull/4478', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879', 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}
null
GHSA
GHSA-9v3m-8fp8-mj99
Cross-Site Scripting in bootstrap
Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript. ## Recommendation For `bootstrap` 4.x upgrade to 4.3.1 or later. For `bootstrap` 3.x upgrade to 3.4.1 or later.
{'CVE-2019-8331'}
2021-06-15T16:39:39Z
2019-02-22T20:54:47Z
MODERATE
6.1
{'CWE-79'}
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://github.com/twbs/bootstrap/pull/28236', 'http://seclists.org/fulldisclosure/2019/May/10', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.npmjs.com/advisories/891', 'http://www.securityfocus.com/bid/107375', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331', 'https://support.f5.com/csp/article/K24383845', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://github.com/advisories/GHSA-9v3m-8fp8-mj99', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&amp;utm_medium=RSS', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}
null
GHSA
GHSA-gh8j-2pgf-x458
Infinite Loop in rencode
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
{'CVE-2021-40839'}
2022-02-16T22:03:02Z
2021-09-13T20:05:51Z
HIGH
7.5
{'CWE-835'}
{'https://seclists.org/fulldisclosure/2021/Sep/16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40839', 'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/', 'https://github.com/aresch/rencode/pull/29', 'https://security.netapp.com/advisory/ntap-20211008-0001/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/', 'https://github.com/advisories/GHSA-gh8j-2pgf-x458', 'https://pypi.org/project/rencode/#history'}
null
GHSA
GHSA-c3xm-pvg7-gh7r
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
### Summary runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby an attacker can request a seemingly-innocuous container configuration that actually results in the host filesystem being bind-mounted into the container (allowing for a container escape). CVE-2021-30465 has been assigned for this issue. An attacker must have the ability to start containers using some kind of custom volume configuration, and while recommended container hardening mechanisms such as LSMs (AppArmor/SELinux) and user namespaces will restrict the amount of damage an attacker could do, they do not block this attack outright. We have a reproducer using Kubernetes (and the below description mentions Kubernetes-specific paths), but this is not a Kubernetes-specific issue. The now-released [runc v1.0.0-rc95][release] contains a fix for this issue, we recommend users update as soon as possible. [release]: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95 ### Details In circumstances where a container is being started, and runc is mounting inside a volume shared with another container (which is conducting a symlink-exchange attack), runc can be tricked into mounting outside of the container rootfs by swapping the target of a mount with a symlink due to a time-of-check-to-time-of-use (TOCTTOU) flaw. This is fairly similar in style to previous TOCTTOU attacks (and is a problem we are working on solving with libpathrs). However, this alone is not useful because this happens inside a mount namespace with `MS_SLAVE` propagation applied to `/` (meaning that the mount doesn't appear on the host -- it's only a "host-side mount" inside the container's namespace). To exploit this, you must have additional mount entries in the configuration that use some subpath of the mounted-over host path as a source for a subsequent mount. However, it turns out with some container orchestrators (such as Kubernetes -- though it is very likely that other downstream users of runc could have similar behaviour be accessible to untrusted users), the existence of additional volume management infrastructure allows this attack to be applied to gain access to the host filesystem without requiring the attacker to have completely arbitrary control over container configuration. In the case of Kubernetes, this is exploitable by creating a symlink in a volume to the top-level (well-known) directory where volumes are sourced from (for instance, `/var/lib/kubelet/pods/$MY_POD_UID/volumes/kubernetes.io~empty-dir`), and then using that symlink as the target of a mount. The source of the mount is an attacker controlled directory, and thus the source directory from which subsequent mounts will occur is an attacker-controlled directory. Thus the attacker can first place a symlink to `/` in their malicious source directory with the name of a volume, and a subsequent mount in the container will bind-mount `/` into the container. Applying this attack requires the attacker to start containers with a slightly peculiar volume configuration (though not explicitly malicious-looking such as bind-mounting `/` into the container explicitly), and be able to run malicious code in a container that shares volumes with said volume configuration. It helps the attacker if the host paths used for volume management are well known, though this is not a hard requirement. ### Patches This has been patched in runc 1.0.0-rc95, and users should upgrade as soon as possible. The patch itself can be found [here](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f). ### Workarounds There are no known workarounds for this issue. However, users who enforce running containers with more confined security profiles (such as reduced capabilities, not running code as root in the container, user namespaces, AppArmor/SELinux, and seccomp) will restrict what an attacker can do in the case of a container breakout -- we recommend users make use of strict security profiles if possible (most notably user namespaces -- which can massively restrict the impact a container breakout can have on the host system). ### References * [commit](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f) * [seclists public disclosure](https://www.openwall.com/lists/oss-security/2021/05/19/2) ### Credit Thanks to Etienne Champetier for discovering and disclosing this vulnerability, to Noah Meyerhans for writing the first draft of this patch, and to Samuel Karp for testing it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencontainers/runc/issues). * Email us at <security@opencontainers.org>.
{'CVE-2021-30465'}
2022-04-19T19:02:53Z
2021-05-25T18:44:42Z
HIGH
7.6
{'CWE-367', 'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2021/05/19/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/', 'https://github.com/advisories/GHSA-c3xm-pvg7-gh7r', 'https://security.netapp.com/advisory/ntap-20210708-0003/', 'https://github.com/opencontainers/runc/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30465', 'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f', 'https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r', 'https://bugzilla.opensuse.org/show_bug.cgi?id=1185405', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/'}
null
GHSA
GHSA-wv83-jrfh-rp33
Cross site scripting in kindeditor
Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).
{'CVE-2021-42227'}
2021-10-21T14:56:28Z
2021-10-18T19:44:32Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42227', 'https://github.com/advisories/GHSA-wv83-jrfh-rp33', 'https://github.com/kindsoft/kindeditor/issues/336'}
null
GHSA
GHSA-7xc4-793x-25jp
Malicious Package in bpi66
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:49:13Z
2020-09-04T16:48:38Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1374', 'https://github.com/advisories/GHSA-7xc4-793x-25jp'}
null
GHSA
GHSA-78cj-fxph-m83p
Regular Expression Denial of Service (ReDoS) in ua-parser-js
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
{'CVE-2021-27292'}
2021-05-06T16:11:13Z
2021-05-06T16:11:13Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27292', 'https://github.com/advisories/GHSA-78cj-fxph-m83p'}
null
GHSA
GHSA-4jwp-vfvf-657p
Deserialization of Untrusted Data in bson
Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure.
{'CVE-2019-2391'}
2022-02-10T23:30:20Z
2022-02-10T23:30:20Z
MODERATE
5.4
{'CWE-502'}
{'https://github.com/advisories/GHSA-4jwp-vfvf-657p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2391', 'https://github.com/mongodb/js-bson/releases/tag/v1.1.4'}
null
GHSA
GHSA-p5ch-w78f-xh44
Cross-site scripting in @atlaskit/editor-core
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
{'CVE-2019-20903'}
2022-02-10T20:34:24Z
2022-02-10T20:34:24Z
MODERATE
5.4
{'CWE-79'}
{'https://atlaskit.atlassian.com/packages/editor/editor-core/changelog/113.1.5', 'https://www.npmjs.com/package/@atlaskit/editor-core', 'https://bitbucket.org/atlassian/atlaskit-mk-2/commits/ca88f616e4', 'https://github.com/advisories/GHSA-p5ch-w78f-xh44', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20903', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1021244735'}
null
GHSA
GHSA-rp28-29ch-gh92
Directory Traversal in elding
Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. This vulnerability only affects files that have file extensions - i.e. `/etc/passwd` will be treated as a directory, and a read attempt on `/etc/passwd/index.js` will be made and subsequently fail. Example request: ``` GET /../../../../../../../../../../some_app_dir/secrets.json HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16222'}
2021-09-17T18:59:08Z
2018-08-06T21:30:15Z
MODERATE
5.3
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16222', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding', 'https://www.npmjs.com/advisories/415', 'https://github.com/advisories/GHSA-rp28-29ch-gh92'}
null
GHSA
GHSA-68cm-mgv7-vg5c
Directory Traversal in utahcityfinder
Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16173'}
2021-01-08T19:46:25Z
2018-07-23T20:45:11Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16173', 'https://nodesecurity.io/advisories/467', 'https://www.npmjs.com/advisories/467', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder', 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c'}
null
GHSA
GHSA-6jg8-7333-554w
Sandbox Breakout in realms-shim
Versions of `realms-shim` prior to 1.2.0 are vulnerable to a Sandbox Breakout. `Reflect.construct` can be used on the sandboxed Function constructor to reach the prototypes of the primal Realm, which may allow an attacker to escape the sandbox and execute arbitrary code. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-09-02T16:40:48Z
2019-10-04T17:56:12Z
CRITICAL
9.8
null
{'https://www.npmjs.com/advisories/1181', 'https://www.npmjs.com/advisories/1190', 'https://www.npmjs.com/advisories/1191', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-6jg8-7333-554w', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-471680', 'https://github.com/advisories/GHSA-6jg8-7333-554w', 'https://www.npmjs.com/advisories/1182', 'https://www.npmjs.com/advisories/1180'}
null
GHSA
GHSA-hxxp-6546-wv6r
Improper Restriction of XML External Entity Reference
Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2021-21672'}
2022-04-19T18:25:32Z
2021-07-02T18:36:13Z
MODERATE
4.3
{'CWE-611'}
{'http://www.openwall.com/lists/oss-security/2021/06/30/1', 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21672', 'http://www.openwall.com/lists/oss-security/2022/04/14/2', 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1', 'https://github.com/advisories/GHSA-hxxp-6546-wv6r'}
null
GHSA
GHSA-8vh3-29mr-m9xg
Inadequate Encryption Strength in showdoc
showdoc makes use of a hardcoded salt in its user password hash function
{'CVE-2021-3680'}
2021-09-01T18:31:23Z
2021-09-01T18:31:23Z
MODERATE
4.9
{'CWE-326'}
{'https://github.com/advisories/GHSA-8vh3-29mr-m9xg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3680', 'https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2', 'https://github.com/star7th/showdoc/blob/fd1740234a12804b45af9cac3563567d83ba414d/server/Application/Home/Model/UserModel.class.php#L20'}
null
GHSA
GHSA-ph76-rhqq-xj7j
Cross-site scripting in Crafter CMS Crafter Studio
Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal users’ cookies.
{'CVE-2017-15686'}
2022-02-09T23:08:06Z
2022-02-09T23:08:06Z
MODERATE
6.1
{'CWE-79'}
{'https://docs.craftercms.org/en/3.0/security/advisory.html', 'https://github.com/advisories/GHSA-ph76-rhqq-xj7j', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15686'}
null
GHSA
GHSA-hwrr-rhmm-vcvf
NULL Pointer Dereference in Kubernetes CSI snapshot-controller
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users can’t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected.
{'CVE-2020-8569'}
2022-04-20T20:56:26Z
2022-02-15T01:57:18Z
MODERATE
6.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8569', 'https://github.com/advisories/GHSA-hwrr-rhmm-vcvf', 'https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU', 'https://github.com/kubernetes-csi/external-snapshotter/issues/380'}
null
GHSA
GHSA-5m9c-634g-47vq
Downloads Resources over HTTP in steroids
Affected versions of `steroids` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `steroids`. ## Recommendation This vulnerability was discovered and reported in 2016, yet has not seen a patch issued as of 3/2018. The best path forward for mitigating this issue is to attempt to use an alternative module that is actively maintained and which provides similar functionality, such as the native PhoneGap API.
{'CVE-2016-10581'}
2021-01-08T19:50:09Z
2019-02-18T23:35:01Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-5m9c-634g-47vq', 'https://github.com/AppGyver/steroids/blob/master/package.json#L101', 'https://nodesecurity.io/advisories/168', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10581', 'https://www.npmjs.com/advisories/168', 'https://github.com/AppGyver/steroids/blob/master/package.json#L74', 'https://github.com/AppGyver/steroids/blob/master/package.json#L103-L104'}
null
GHSA
GHSA-p3w3-4ppm-c3f6
Cross site scripting in FacturaScripts
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
{'CVE-2022-1514'}
2022-04-29T21:02:50Z
2022-04-29T00:00:23Z
CRITICAL
9
{'CWE-79'}
{'https://github.com/advisories/GHSA-p3w3-4ppm-c3f6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c'}
null
GHSA
GHSA-gjh4-fcv3-whpq
Cross-Site Scripting in webtorrent
Versions of `webtorrent` prior to 0.107.6 are vulnerable to Cross-Site Scripting. `webtorrent` servers started with `torrent.createServer()` lists a torrent's title and files in the index page without sanitization. This allows attackers to execute arbitrary JavaScript in the victim's browser through files with names containing the malicious payload. The issue is mitigated due to the fact that the server only allows fetching data pieces from the torrent. ## Recommendation Upgrade to version 0.107.6 or later.
{'CVE-2019-15782'}
2021-08-17T22:20:22Z
2019-09-04T10:02:50Z
MODERATE
6.1
{'CWE-79'}
{'https://hackerone.com/reports/681617', 'https://github.com/webtorrent/webtorrent/compare/v0.107.5...v0.107.6', 'https://www.npmjs.com/advisories/1158', 'https://github.com/advisories/GHSA-gjh4-fcv3-whpq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15782', 'https://snyk.io/vuln/SNYK-JS-WEBTORRENT-460351', 'https://github.com/webtorrent/webtorrent/pull/1714'}
null
GHSA
GHSA-cg3q-j54f-5p7p
Uncontrolled Resource Consumption in promhttp
This is the Go client library for Prometheus. It has two separate parts, one for instrumenting application code, and one for creating clients that talk to the Prometheus HTTP API. client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. ### Impact HTTP server susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. ### Affected Configuration In order to be affected, an instrumented software must * Use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`. * Do not filter any specific methods (e.g GET) before middleware. * Pass metric with `method` label name to our middleware. * Not have any firewall/LB/proxy that filters away requests with unknown `method`. ### Patches * https://github.com/prometheus/client_golang/pull/962 * https://github.com/prometheus/client_golang/pull/987 ### Workarounds If you cannot upgrade to [v1.11.1 or above](https://github.com/prometheus/client_golang/releases/tag/v1.11.1), in order to stop being affected you can: * Remove `method` label name from counter/gauge you use in the InstrumentHandler. * Turn off affected promhttp handlers. * Add custom middleware before promhttp handler that will sanitize the request method given by Go http.Request. * Use a reverse proxy or web application firewall, configured to only allow a limited set of methods. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/prometheus/client_golang * Email us at `prometheus-team@googlegroups.com`
{'CVE-2022-21698'}
2022-05-03T03:48:19Z
2022-02-16T22:26:35Z
HIGH
7.5
{'CWE-772', 'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBMVIQFKQDSSTHVVJWJ4QH6TW3JVB7XZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKORFJTRRDJCWBTJPISKKCVMMMJBIRLG/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21698', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SASRKYHT5ZFSVMJUQUG3UAEQRJYGJKAR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK7CJBCGERCRXYUR2EWDSSDVAQMTAZGX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V7I72LSQ3IET3QJR6QPAVGJZ4CBDLN5/', 'https://github.com/prometheus/client_golang/releases/tag/v1.11.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FY3N7H6VSDZM37B4SKM2PFFCUWU7QYWN/', 'https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p', 'https://github.com/prometheus/client_golang/pull/987', 'https://github.com/prometheus/client_golang/pull/962', 'https://github.com/advisories/GHSA-cg3q-j54f-5p7p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/'}
null
GHSA
GHSA-rwvj-jgc4-fqq5
Downloads Resources over HTTP in cobalt-cli
Affected versions of `cobalt-cli` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cobalt-cli`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10597'}
2021-09-16T20:42:21Z
2019-02-18T23:34:05Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://github.com/advisories/GHSA-rwvj-jgc4-fqq5', 'https://www.npmjs.com/advisories/197', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10597', 'https://nodesecurity.io/advisories/197'}
null
GHSA
GHSA-h56g-v4vp-q9q6
Cross-site Scripting in calibreweb
calibreweb prior to version 0.6.16 contains a cross-site scripting vulnerability.
{'CVE-2022-0352'}
2022-02-10T22:40:43Z
2022-01-29T00:00:41Z
MODERATE
6.1
{'CWE-79'}
{'https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717', 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1', 'https://github.com/advisories/GHSA-h56g-v4vp-q9q6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0352'}
null
GHSA
GHSA-qrpm-p2h7-hrv2
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
{'CVE-2021-23566'}
2022-03-18T13:15:56Z
2022-01-21T23:57:06Z
MODERATE
5.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-qrpm-p2h7-hrv2', 'https://github.com/ai/nanoid/pull/328', 'https://snyk.io/vuln/SNYK-JS-NANOID-2332193', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566', 'https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550', 'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'}
null
GHSA
GHSA-44c6-4v22-4mhx
Regular Expression Denial of Service (ReDOS)
npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3795'}
2021-09-20T20:42:25Z
2021-09-20T20:42:25Z
MODERATE
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-44c6-4v22-4mhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795', 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28', 'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'}
null