ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-x5h4-9gqw-942j
|
Improper Verification of Cryptographic Signature in aws-encryption-sdk
|
### Impact
This advisory addresses several LOW severity issues with streaming signed messages and restricting processing of certain types of invalid messages.
This ESDK supports a streaming mode where callers may stream the plaintext of signed messages before the ECDSA signature is validated. In addition to these signatures, the ESDK uses AES-GCM encryption and all plaintext is verified before being released to a caller. There is no impact on the integrity of the ciphertext or decrypted plaintext, however some callers may rely on the the ECDSA signature for non-repudiation. Without validating the ECDSA signature, an actor with trusted KMS permissions to decrypt a message may also be able to encrypt messages. This update introduces a new API for callers who wish to stream only unsigned messages.
For customers who process ESDK messages from untrusted sources, this update also introduces a new configuration to limit the number of Encrypted Data Keys (EDKs) that the ESDK will attempt to process per message. This configuration provides customers with a way to limit the number of AWS KMS Decrypt API calls that the ESDK will make per message. This setting will reject messages with more EDKs than the configured limit.
Finally, this update adds early rejection of invalid messages with certain invalid combinations of algorithm suite and header data.
### Patches
Fixed in versions 1.9 and 2.2. We recommend that all users upgrade to address these issues.
Customers leveraging the ESDK’s streaming features have several options to protect signature validation. One is to ensure that client code reads to the end of the stream before using released plaintext. With this release, using the new API for streaming and falling back to the non-streaming decrypt API for signed messages prevents using any plaintext from signed data before the signature is validated. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
Users processing ESDK messages from untrusted sources should use the new maximum encrypted data keys parameter. See https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
### Workarounds
None
### For more information
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/concepts.html#digital-sigs
https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/about-versions.html#version2.2.x
| null |
2021-06-01T21:17:53Z
|
2021-06-01T21:17:53Z
|
MODERATE
| 0
|
{'CWE-347'}
|
{'https://github.com/aws/aws-encryption-sdk-python/security/advisories/GHSA-x5h4-9gqw-942j', 'https://github.com/advisories/GHSA-x5h4-9gqw-942j'}
| null |
GHSA
|
GHSA-pcm6-g2qp-9gw8
|
Cap-Strap gem for Ruby places credentials on the useradd command line
|
lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.
|
{'CVE-2014-4992'}
|
2022-04-26T18:04:07Z
|
2018-03-16T01:13:46Z
|
HIGH
| 7.8
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-4992', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'http://www.openwall.com/lists/oss-security/2014/07/07/9', 'https://github.com/advisories/GHSA-pcm6-g2qp-9gw8', 'http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html'}
| null |
GHSA
|
GHSA-x54v-qxxr-93qc
|
Missing release of memory in sized-chunks
|
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, insert_from can have a memory-safety issue upon a panic.
|
{'CVE-2020-25795'}
|
2021-08-25T20:45:01Z
|
2021-08-25T20:45:01Z
|
HIGH
| 7.5
|
{'CWE-401'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25795', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://github.com/advisories/GHSA-x54v-qxxr-93qc', 'https://github.com/bodil/sized-chunks/issues/11'}
| null |
GHSA
|
GHSA-g2f6-v5qh-h2mq
|
Nexus Repository Manager 3 - Remote Code Execution
|
Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
|
{'CVE-2020-10199'}
|
2021-07-28T21:48:58Z
|
2020-04-14T15:27:05Z
|
HIGH
| 8.8
|
{'CWE-917'}
|
{'https://support.sonatype.com/hc/en-us/articles/360044882533', 'http://packetstormsecurity.com/files/160835/Sonatype-Nexus-3.21.1-Remote-Code-Execution.html', 'http://packetstormsecurity.com/files/157261/Nexus-Repository-Manager-3.21.1-01-Remote-Code-Execution.html', 'https://github.com/advisories/GHSA-g2f6-v5qh-h2mq', 'https://securitylab.github.com/advisories/GHSL-2020-015-nxrm-sonatype', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10199'}
| null |
GHSA
|
GHSA-pccr-q7v9-5f27
|
Improper Input Validation and Path Traversal in Apache Solr
|
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.
|
{'CVE-2021-44548'}
|
2022-01-18T22:41:34Z
|
2022-01-06T21:32:35Z
|
HIGH
| 9.8
|
{'CWE-20', 'CWE-22', 'CWE-40'}
|
{'https://security.netapp.com/advisory/ntap-20220114-0005/', 'https://solr.apache.org/security.html#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler', 'https://github.com/advisories/GHSA-pccr-q7v9-5f27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44548'}
| null |
GHSA
|
GHSA-gf2j-f278-xh4v
|
Division by zero in TFLite
|
### Impact
An attacker can craft a TFLite model that would trigger a division by zero in [`BiasAndClamp` implementation](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75):
```cc
inline void BiasAndClamp(float clamp_min, float clamp_max, int bias_size,
const float* bias_data, int array_size,
float* array_data) {
// ...
TFLITE_DCHECK_EQ((array_size % bias_size), 0);
// ...
}
```
There is no check that the `bias_size` is non zero.
### Patches
We have patched the issue in GitHub commit [8c6f391a2282684a25cbfec7687bd5d35261a209](https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
|
{'CVE-2022-23557'}
|
2022-02-11T16:11:40Z
|
2022-02-09T23:47:57Z
|
MODERATE
| 6.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23557', 'https://github.com/advisories/GHSA-gf2j-f278-xh4v', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v'}
| null |
GHSA
|
GHSA-4x6v-rwh4-55jw
|
Pomelo allows external control of critical state data
|
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
|
{'CVE-2019-18954'}
|
2021-08-19T16:02:00Z
|
2019-12-02T18:16:34Z
|
MODERATE
| 5.3
|
{'CWE-668'}
|
{'https://github.com/NetEase/pomelo/issues/1149', 'https://github.com/advisories/GHSA-4x6v-rwh4-55jw', 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}
| null |
GHSA
|
GHSA-3hq6-rmv7-39vh
|
Injection in op-browser
|
op-browser through 1.0.9 is vulnerable to Command Injection. It allows execution of arbitrary commands via the url function.
|
{'CVE-2020-7625'}
|
2022-02-10T23:45:35Z
|
2022-02-10T23:45:28Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/hiproxy/open-browser/pull/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7625', 'https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259', 'https://github.com/hiproxy/open-browser/blob/master/lib/index.js#L75,', 'https://github.com/hiproxy/open-browser/pull/4', 'https://github.com/advisories/GHSA-3hq6-rmv7-39vh'}
| null |
GHSA
|
GHSA-2j58-pwwv-x666
|
Cross-Site Request Forgery in sqlite-web
|
This affects all versions of package sqlite-web. The SQL dashboard area allows sensitive actions to be performed without validating that the request originated from the application. This could enable an attacker to trick a user into performing these actions unknowingly through a Cross Site Request Forgery (CSRF) attack.
|
{'CVE-2021-23404'}
|
2021-09-09T17:10:35Z
|
2021-09-09T17:10:35Z
|
HIGH
| 7.6
|
{'CWE-352'}
|
{'https://snyk.io/vuln/SNYK-PYTHON-SQLITEWEB-1316324', 'https://github.com/coleifer/sqlite-web/blob/2e7c85da3d37f80074ed3ae39b5851069b4f301c/sqlite_web/__main__.py%23L1', 'https://github.com/advisories/GHSA-2j58-pwwv-x666', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23404'}
| null |
GHSA
|
GHSA-qv2g-99x4-45x6
|
Malicious npm package: discord-fix
|
The npm `discord-fix` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-01-29T18:12:07Z
|
2021-01-29T18:12:07Z
|
CRITICAL
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1597', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755', 'https://github.com/advisories/GHSA-qv2g-99x4-45x6'}
| null |
GHSA
|
GHSA-m4fw-77v7-924m
|
Moderate severity vulnerability that affects qutebrowser
|
qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted <title> attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week).
|
{'CVE-2018-1000559'}
|
2021-09-14T22:12:29Z
|
2018-09-13T15:47:57Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/qutebrowser/qutebrowser/issues/4011', 'https://github.com/advisories/GHSA-m4fw-77v7-924m', 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f', 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000559'}
| null |
GHSA
|
GHSA-h4m5-qpfp-3mpv
|
Directory Traversal in Babel
|
Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.
|
{'CVE-2021-42771'}
|
2021-12-13T21:33:38Z
|
2021-10-21T17:49:59Z
|
HIGH
| 7.8
|
{'CWE-22'}
|
{'https://lists.debian.org/debian-lts/2021/10/msg00040.html', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html', 'https://www.tenable.com/security/research/tra-2021-14', 'https://github.com/advisories/GHSA-h4m5-qpfp-3mpv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42771', 'https://www.debian.org/security/2021/dsa-5018', 'https://github.com/python-babel/babel/pull/782'}
| null |
GHSA
|
GHSA-pvhp-v9qp-xf5r
|
High severity vulnerability that affects django-piston and django-tastypie
|
emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.
Django Tastypie has a very similar vulnerability.
|
{'CVE-2011-4103'}
|
2021-12-02T22:55:57Z
|
2018-07-23T19:50:48Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'http://www.openwall.com/lists/oss-security/2011/11/01/10', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4103', 'https://github.com/advisories/GHSA-pvhp-v9qp-xf5r', 'http://www.debian.org/security/2011/dsa-2344', 'https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/', 'https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/', 'https://bugzilla.redhat.com/show_bug.cgi?id=750658'}
| null |
GHSA
|
GHSA-r8wq-qrxc-hmcm
|
ReDoS in LDAP schema parser
|
https://github.com/python-ldap/python-ldap/issues/424
### Impact
The LDAP schema parser of python-ldap 3.3.1 and earlier are vulnerable to a regular expression denial-of-service attack. The issue affects clients that use ``ldap.schema`` package to parse LDAP schema definitions from an untrusted source.
### Patches
The upcoming release of python-ldap 3.4.0 will contain a workaround to prevent ReDoS attacks. The schema parser refuses schema definitions with an excessive amount of backslashes.
### Workarounds
As a workaround, users can check input for excessive amount of backslashes in schemas. More than a dozen backslashes per line are atypical.
### References
[CWE-1333](https://cwe.mitre.org/data/definitions/1333.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [python-ldap](https://github.com/python-ldap/python-ldap) tracker
| null |
2021-11-29T17:58:59Z
|
2021-11-29T17:58:59Z
|
MODERATE
| 6.5
|
{'CWE-1333'}
|
{'https://github.com/python-ldap/python-ldap/issues/424', 'https://github.com/advisories/GHSA-r8wq-qrxc-hmcm', 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}
| null |
GHSA
|
GHSA-939m-4xpw-v34v
|
Arbitrary Code Execution in blazar-dashboard
|
An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.
|
{'CVE-2020-26943'}
|
2021-09-21T16:36:47Z
|
2020-10-27T17:55:04Z
|
MODERATE
| 0
|
{'CWE-94'}
|
{'https://review.opendev.org/755814', 'http://www.openwall.com/lists/oss-security/2020/10/16/5', 'https://review.opendev.org/756064', 'https://security.openstack.org/ossa/OSSA-2020-007.html', 'https://review.opendev.org/755810', 'https://review.opendev.org/755813', 'https://github.com/advisories/GHSA-939m-4xpw-v34v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26943', 'https://launchpad.net/bugs/1895688', 'https://review.opendev.org/755812'}
| null |
GHSA
|
GHSA-q27f-v3r6-9v77
|
Improper Certificate Validation in EM-HTTP-Request
|
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
|
{'CVE-2020-13482'}
|
2021-05-24T18:13:13Z
|
2021-05-24T18:13:13Z
|
HIGH
| 7.4
|
{'CWE-295'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13482', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF/', 'https://github.com/igrigorik/em-http-request/issues/339', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://github.com/advisories/GHSA-q27f-v3r6-9v77'}
| null |
GHSA
|
GHSA-w8rc-pgxq-x2cj
|
Negative charge in shopping cart in Shopizer
|
### Impact
Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total.
### Patches
Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0
### Workarounds
Without uprading, it's possible to just apply the fixes in the same files it's done for the patch. Or you use javax constraint validation on the quantity parameter.
### References
[Input Validation](https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html)
[Using bean validation constraint](https://javaee.github.io/tutorial/bean-validation002.html)
[Commits with fixes](https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a)
CVE Details below :
[Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11007)
[NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-11007)
### Credits
Found and solved by Yannick Gosset from Aix-Marseille University cybersecurity
master program supervised by Yassine Ilmi
|
{'CVE-2020-11007'}
|
2022-04-19T19:02:25Z
|
2020-04-22T20:59:26Z
|
CRITICAL
| 6.5
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-w8rc-pgxq-x2cj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007', 'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a', 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj'}
| null |
GHSA
|
GHSA-c58c-w527-h77p
|
Deserialization of untrusted data in Apache Cayenne
|
Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-current patch versions of Java, an attacker with client access to Cayenne ROP can transmit a malicious payload to any vulnerable third-party dependency on the server. This can result in arbitrary code execution.
|
{'CVE-2022-24289'}
|
2022-02-23T22:11:57Z
|
2022-02-12T00:00:48Z
|
HIGH
| 8.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24289', 'https://github.com/advisories/GHSA-c58c-w527-h77p', 'https://lists.apache.org/thread/zthjy83t3o66x7xcbygn2vg3yjvlc9vc', 'http://www.openwall.com/lists/oss-security/2022/02/11/1'}
| null |
GHSA
|
GHSA-2gc7-w4hw-rr2m
|
class.upload.php in verot.net omits .pht from the set of dangerous file extensions
|
class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576.
|
{'CVE-2019-19634'}
|
2021-08-19T19:29:18Z
|
2020-02-28T01:10:17Z
|
CRITICAL
| 9.8
|
{'CWE-434'}
|
{'https://medium.com/@jra8908/cve-2019-19634-arbitrary-file-upload-in-class-upload-php-ccaf9e13875e', 'https://github.com/jra89/CVE-2019-19634', 'https://github.com/advisories/GHSA-2gc7-w4hw-rr2m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19634', 'https://github.com/verot/class.upload.php/blob/2.0.4/src/class.upload.php#L3068'}
| null |
GHSA
|
GHSA-g9mp-8g3h-3c5c
|
Improper nonce handling: potential overflow, potential state DoS
|
The Go package `github.com/flynn/noise`, a [Noise Protocol](https://noiseprotocol.org/) implementation, has two bugs in nonce handling in versions prior to v1.0.0.
### Issue 1: Potential nonce overflow
If 2^64 (~18.4 quintillion) or more messages are encrypted with `Encrypt` after handshaking, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce, resulting in a potentially catastrophic weakening of the security properties of the symmetric cipher.
This has been resolved in the patched version by returning `ErrMaxNonce` from the `CipherState` `Encrypt` and `Decrypt` methods before the reserved maximum nonce is reached. If this error is encountered, the program should handshake again to start with a fresh `CipherState`.
### Issue 2: Potential denial of service via invalid ciphertext
If an attacker sends an invalid ciphertext into one peer's `Decrypt`, the nonce is incremented unconditionally. This causes a desync of the `CipherState` due to a nonce mismatch between the peers, resulting in a failure to decrypt all subsequent messages. A new handshake will be required to establish a new `CipherState`.
This has been resolved in the patched version by returning authentication errors from `Decrypt` before incrementing the nonce.
### Patches
Fixed in https://github.com/flynn/noise/pull/44, tagged as v1.0.0.
### Acknowledgements
These issues were discovered during [an audit](https://www.bamsoftware.com/software/dnstt/cure53-turbotunnel-2021.pdf) of a user of this package ([dnstt](https://www.bamsoftware.com/software/dnstt/)). Thanks to UC Berkley for commissioning the audit, and to David Fifield and Nathan Brown for their collaboration on the fixes. The fixed issues are noted in the audit as:
* UCB-02-003 Potential nonce overflow in Noise protocol
* UCB-02-006 DoS due to unconditional nonce increment
| null |
2022-04-12T22:48:22Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 0
| null |
{'https://github.com/flynn/noise/security/advisories/GHSA-g9mp-8g3h-3c5c', 'https://github.com/advisories/GHSA-g9mp-8g3h-3c5c'}
| null |
GHSA
|
GHSA-x56r-5r34-qg74
|
Downloads Resources over HTTP in dalek-browser-ie-canary
|
Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10612'}
|
2021-01-08T00:47:51Z
|
2019-02-18T23:47:47Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10612', 'https://github.com/advisories/GHSA-x56r-5r34-qg74', 'https://nodesecurity.io/advisories/205', 'https://www.npmjs.com/advisories/205'}
| null |
GHSA
|
GHSA-f256-j965-7f32
|
Possible request smuggling in HTTP/2 due missing validation of content-length
|
### Impact
The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1
This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.
### Patches
This was fixed as part of 4.1.61.Final
### Workarounds
Validation can be done by the user before proxy the request by validating the header.
|
{'CVE-2021-21409'}
|
2022-04-22T15:50:24Z
|
2021-03-30T15:10:38Z
|
MODERATE
| 5.9
|
{'CWE-444'}
|
{'https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re9e6ed60941da831675de2f8f733c026757fb4fa28a7b6c9f3dfb575@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac9bd799ceac499c7a7e152a9b0dc7f2fe7f89ec5605d129bb047b@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-f256-j965-7f32', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r9ec78dc409f3f1edff88f21cab53737f36aad46f582a9825389092e0@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r967002f0939e69bdec58f070735a19dd57c1f2b8f817949ca17cddae@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rba2a9ef1d0af882ab58fadb336a58818495245dda43d32a7d7837187@%3Cissues.zookeeper.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295', 'https://lists.apache.org/thread.html/raa413040db6d2197593cc03edecfd168732e697119e6447b0a25d525@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9fe840c36b74f92b8d4a089ada1f9fd1d6293742efa18b10e06b66d2@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf148b2bf6c2754153a8629bc7495e216bd0bd4c915695486542a10b4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3Cdev.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21409', 'https://lists.apache.org/thread.html/r5f2f120b2b8d099226473db1832ffb4d7c1d6dc2d228a164bf293a8e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re1911e05c08f3ec2bab85744d788773519a0afb27272a31ac2a0b4e8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rcae42fba06979934208bbd515584b241d3ad01d1bb8b063512644362@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rafc77f9f03031297394f3d372ccea751b23576f8a2ae9b6b053894c5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432', 'https://lists.apache.org/thread.html/re39391adcb863f0e9f3f15e7986255948f263f02e4700b82453e7102@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7b54563abebe3dbbe421e1ba075c2030d8d460372f8c79b7789684b6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32', 'https://lists.apache.org/thread.html/r31044fb995e894749cb821c6fe56f487c16a97028e6e360e59f09d58@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-8j39-fgfp-vxh8
|
Moderate severity vulnerability that affects com.xuxueli:xxl-conf
|
An issue was discovered in XXL-CONF 1.6.0. There is a path traversal vulnerability via ../ in the keys parameter that can download any configuration file, related to ConfController.java and PropUtil.java.
|
{'CVE-2018-20094'}
|
2021-09-07T19:47:06Z
|
2018-12-19T19:25:04Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-8j39-fgfp-vxh8', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20094', 'https://github.com/xuxueli/xxl-conf/issues/61'}
| null |
GHSA
|
GHSA-2rxc-8f9w-fjq8
|
Window may read from uninitialized memory locations in rdiff
|
An issue was discovered in the rdiff crate through 2021-02-03 for Rust. Window may read from uninitialized memory locations.
|
{'CVE-2021-45694'}
|
2022-01-07T18:25:01Z
|
2022-01-06T22:14:13Z
|
HIGH
| 7.5
|
{'CWE-908'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rdiff/RUSTSEC-2021-0094.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45694', 'https://rustsec.org/advisories/RUSTSEC-2021-0094.html', 'https://github.com/advisories/GHSA-2rxc-8f9w-fjq8'}
| null |
GHSA
|
GHSA-8pfh-mm2g-hmc3
|
Authenticated Server Side Request Forgery
|
### Impact
Authenticated Server Side Request Forgery
### Patches
We recommend to update to the current version 6.3.4.1. You can get the update to 6.3.4.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 and 6.2 the corresponding changes are also available via plugin:
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
### For more information
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-12-2020
### Credits
We would like to thank <a rel="noopener" href="https://reqon.nl">REQON B.V.</a> for reporting this issue.
| null |
2020-12-21T18:01:24Z
|
2020-12-21T18:01:24Z
|
LOW
| 0
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-8pfh-mm2g-hmc3', 'https://github.com/shopware/platform/security/advisories/GHSA-8pfh-mm2g-hmc3'}
| null |
GHSA
|
GHSA-hf66-r44g-p7j9
|
Inefficient Regular Expression Complexity in handsontable
|
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.
|
{'CVE-2021-23446'}
|
2021-10-08T21:29:09Z
|
2021-09-30T17:10:46Z
|
HIGH
| 7.5
|
{'CWE-1333'}
|
{'https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794', 'https://github.com/advisories/GHSA-hf66-r44g-p7j9', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795', 'https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770', 'https://github.com/handsontable/handsontable/pull/8742', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797', 'https://github.com/handsontable/handsontable/issues/8752', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23446'}
| null |
GHSA
|
GHSA-rvpc-w57p-q95f
|
HTTP Response Splitting in WSO2 transport-http
|
Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled.
|
{'CVE-2019-10797'}
|
2022-02-09T22:35:29Z
|
2022-02-09T22:35:29Z
|
MODERATE
| 6.5
|
{'CWE-113'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10797', 'https://github.com/advisories/GHSA-rvpc-w57p-q95f'}
| null |
GHSA
|
GHSA-w4fj-ccr6-7pcp
|
Insertion of Sensitive Information into Log File in Apache NiFi
|
An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
|
{'CVE-2020-1928'}
|
2022-01-06T20:40:56Z
|
2022-01-06T20:40:56Z
|
MODERATE
| 5.3
|
{'CWE-200', 'CWE-532'}
|
{'https://github.com/advisories/GHSA-w4fj-ccr6-7pcp', 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928', 'https://nifi.apache.org/security.html#CVE-2020-1928', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E'}
| null |
GHSA
|
GHSA-j38m-7q52-fgfh
|
Directory Traversal in node-server-forfront
|
Affected versions of `node-server-forfront` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16124'}
|
2021-01-08T18:37:57Z
|
2018-07-23T23:33:42Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/382', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront', 'https://nodesecurity.io/advisories/382', 'https://github.com/advisories/GHSA-j38m-7q52-fgfh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16124'}
| null |
GHSA
|
GHSA-94x5-94wf-m445
|
Directory Traversal in gomeplus-h5-proxy
|
Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16037'}
|
2021-01-08T19:06:21Z
|
2018-07-24T15:48:38Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/350', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16037', 'https://www.npmjs.com/advisories/350', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy', 'https://github.com/advisories/GHSA-94x5-94wf-m445'}
| null |
GHSA
|
GHSA-wjx2-7hqq-8h7m
|
rails_admin ruby gem XSS vulnerability
|
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
|
{'CVE-2020-36190'}
|
2021-01-19T18:16:40Z
|
2021-01-14T19:17:16Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3', 'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://github.com/advisories/GHSA-wjx2-7hqq-8h7m', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190'}
| null |
GHSA
|
GHSA-h9gj-rqrw-x4fq
|
Server Side Request Forgery in Apache Axis
|
A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.
|
{'CVE-2019-0227'}
|
2022-04-21T17:49:25Z
|
2019-05-14T04:02:24Z
|
HIGH
| 7.5
|
{'CWE-918'}
|
{'https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-h9gj-rqrw-x4fq', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0227', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
| null |
GHSA
|
GHSA-g5j6-r3x9-gf2m
|
Cross-site scripting in Contentful
|
Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.
|
{'CVE-2020-13258'}
|
2021-06-18T18:32:20Z
|
2021-06-18T18:32:20Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/contentful/the-example-app.py/issues/44', 'https://github.com/advisories/GHSA-g5j6-r3x9-gf2m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13258'}
| null |
GHSA
|
GHSA-g6w6-r76c-28j7
|
Incorrect Authorization in NATS nats-server
|
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2022-24450.txt>)
## Problem Description
NATS nats-server through 2022-02-04 has Incorrect Access Control, with unchecked ability for clients to authorize into any account, because of a coding error in a long-extant experimental feature.
A client crafting the initial protocol-level handshake could, with valid credentials for any account, specify a target account and switch into it immediately. This includes any other tenant, and includes the System account which controls nats-server core operations.
For deployments not using multi-tenancy through NATS Accounts, there is still a vulnerability: normal users are able to choose to be in the System account.
An experimental feature to provide dynamically provisioned sandbox accounts was designed to allow a server administrator to turn on an option to allow clients to dynamically request a brand new account inline at connection time. This feature went nowhere, but lived on in the code and was used by a number of tests; support was never added to any client libraries or to the documentation.
A bug in handling the feature meant that if someone did in fact have valid account credentials, then they could specify any other existing account and they would be assigned into that account.
Release 2.7.2 of nats-server removes the feature.
Because of the lack of client support and absence from protocol documentation, we feel this is safe operationally as well as the safest fix for the code.
## Affected versions
#### NATS Server
* All 2.x versions up to and including 2.7.1.
* Fixed with nats-io/nats-server: 2.7.2
* NATS Server 1.x did not have accounts.
* Docker image: nats <https://hub.docker.com/_/nats>
#### NATS Streaming Server
* All versions embedding affected NATS Server:
+ Affected: v0.15.0 up to and including v0.24.0
+ Fixed with nats-io/nats-streaming-server: 0.24.1
* Docker image: nats-streaming <https://hub.docker.com/_/nats-streaming>
## Impact
Existing users could act in any account, including the System account.
## Workaround
None.
## Solution
Upgrade the NATS server.
|
{'CVE-2022-24450'}
|
2022-02-11T22:41:11Z
|
2022-02-08T17:23:16Z
|
CRITICAL
| 0
|
{'CWE-863'}
|
{'https://advisories.nats.io/CVE/CVE-2022-24450.txt', 'https://github.com/nats-io/nats-server/security/advisories/GHSA-g6w6-r76c-28j7', 'https://github.com/advisories/GHSA-g6w6-r76c-28j7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24450', 'https://github.com/nats-io/nats-server/releases/tag/v2.7.2'}
| null |
GHSA
|
GHSA-9ggp-4jpr-7ppj
|
Possible remote code execution via a remote procedure call
|
Withdrawn: duplicate of GHSA-pj4g-4488-wmxm
## Original Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
|
{'CVE-2019-16328'}
|
2021-02-17T19:44:51Z
|
2019-11-20T01:35:53Z
|
HIGH
| 0
| null |
{'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html', 'https://rpyc.readthedocs.io/en/latest/docs/security.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html', 'https://github.com/advisories/GHSA-9ggp-4jpr-7ppj', 'https://github.com/tomerfiliba/rpyc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16328'}
| null |
GHSA
|
GHSA-44r7-7p62-q3fr
|
Insecure generation of random numbers
|
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
|
{'CVE-2019-19794'}
|
2021-05-18T21:09:13Z
|
2021-05-18T21:09:13Z
|
MODERATE
| 5.9
|
{'CWE-338', 'CWE-330'}
|
{'https://github.com/advisories/GHSA-44r7-7p62-q3fr', 'https://github.com/coredns/coredns/issues/3547', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19794', 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33', 'https://github.com/coredns/coredns/issues/3519', 'https://github.com/miekg/dns/issues/1043', 'https://github.com/miekg/dns/pull/1044', 'https://github.com/miekg/dns/compare/v1.1.24...v1.1.25'}
| null |
GHSA
|
GHSA-57j2-w4cx-62h2
|
Deeply nested json in jackson-databind
|
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
|
{'CVE-2020-36518'}
|
2022-03-28T19:57:53Z
|
2022-03-12T00:00:36Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518', 'https://github.com/advisories/GHSA-57j2-w4cx-62h2', 'https://github.com/FasterXML/jackson-databind/issues/2816', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13'}
| null |
GHSA
|
GHSA-jc8m-cxhj-668x
|
Improper Restriction of Excessive Authentication Attempts in Sorcery
|
### Impact
Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.
### Patches
Patched as of version `0.15.0`.
### Workarounds
Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`.
|
{'CVE-2020-11052'}
|
2022-04-19T19:02:25Z
|
2020-05-07T21:16:46Z
|
HIGH
| 8.3
|
{'CWE-307'}
|
{'https://github.com/Sorcery/sorcery/pull/235', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x', 'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/Sorcery/sorcery/issues/231', 'https://github.com/advisories/GHSA-jc8m-cxhj-668x'}
| null |
GHSA
|
GHSA-j838-vfpq-fmf2
|
Moderate severity vulnerability that affects actionpack
|
The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence.
|
{'CVE-2013-1857'}
|
2021-09-14T19:16:51Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://support.apple.com/kb/HT5784', 'https://github.com/advisories/GHSA-j838-vfpq-fmf2', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}
| null |
GHSA
|
GHSA-rh7p-9c79-gpp8
|
Downloads Resources over HTTP in wasdk
|
Affected versions of `wasdk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wasdk`.
## Recommendation
No fix is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit it are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10587'}
|
2021-09-17T18:23:53Z
|
2019-02-18T23:34:44Z
|
HIGH
| 8.1
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-rh7p-9c79-gpp8', 'https://www.npmjs.com/advisories/179', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10587'}
| null |
GHSA
|
GHSA-r336-jxfr-4c3c
|
Path Traversal in LibreNMS
|
An issue was discovered in LibreNMS 1.50.1. An authenticated user can perform a directory traversal attack against the /pdf.php file with a partial filename in the report parameter, to cause local file inclusion resulting in code execution.
|
{'CVE-2019-12464'}
|
2021-08-17T22:42:32Z
|
2019-10-11T18:43:25Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://www.darkmatter.ae/xen1thlabs/librenms-limited-local-file-inclusion-via-directory-traversal-vulnerability-xl-19-019/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12464', 'https://github.com/advisories/GHSA-r336-jxfr-4c3c'}
| null |
GHSA
|
GHSA-m639-9whg-fw97
|
Prototype Pollution in object-extend
|
The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend.
|
{'CVE-2021-23702'}
|
2022-02-28T22:17:43Z
|
2022-02-19T00:01:25Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-m639-9whg-fw97', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23702', 'https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470'}
| null |
GHSA
|
GHSA-898j-5cc8-cmf5
|
Moderate severity vulnerability that affects org.apache.storm:storm-core
|
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
|
{'CVE-2018-8008'}
|
2021-09-07T16:25:20Z
|
2018-10-16T17:35:24Z
|
MODERATE
| 5.5
|
{'CWE-22'}
|
{'http://www.securityfocus.com/bid/104418', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8008', 'https://lists.apache.org/thread.html/613b2fca8bcd0a3b12c0b763ea8f7cf62e422e9f79fce6cfa5b08a58@%3Cdev.storm.apache.org%3E', 'https://github.com/advisories/GHSA-898j-5cc8-cmf5'}
| null |
GHSA
|
GHSA-m648-33qf-v3gp
|
CHECK-fail in LSTM with zero-length input in TensorFlow
|
### Impact
Running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a `CHECK` failure when using the CUDA backend.
This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer.
### Patches
We have patched the issue in GitHub commit [14755416e364f17fb1870882fa778c7fec7f16e3](https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2020-26270'}
|
2021-01-07T22:35:25Z
|
2020-12-10T19:07:31Z
|
LOW
| 4.4
|
{'CWE-20'}
|
{'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3', 'https://github.com/advisories/GHSA-m648-33qf-v3gp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26270', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp'}
| null |
GHSA
|
GHSA-gh6x-4whr-2qv4
|
Null pointer dereference and heap OOB read in operations restoring tensors
|
### Impact
When restoring tensors via raw APIs, if the tensor name is not provided, TensorFlow can be tricked into dereferencing a null pointer:
```python
import tensorflow as tf
tf.raw_ops.Restore(
file_pattern=['/tmp'],
tensor_name=[],
default_value=21,
dt=tf.int,
preferred_shard=1)
```
The same undefined behavior can be triggered by `tf.raw_ops.RestoreSlice`:
```python
import tensorflow as tf
tf.raw_ops.RestoreSlice(
file_pattern=['/tmp'],
tensor_name=[],
shape_and_slice='2',
dt=inp.array([tf.int]),
preferred_shard=1)
```
Alternatively, attackers can read memory outside the bounds of heap allocated data by providing some tensor names but not enough for a successful restoration:
```python
import tensorflow as tf
tf.raw_ops.Restore(
file_pattern=['/tmp'],
tensor_name=['x'],
default_value=21,
dt=tf.int,
preferred_shard=42)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/save_restore_tensor.cc#L158-L159) retrieves the tensor list corresponding to the `tensor_name` user controlled input and immediately retrieves the tensor at the restoration index (controlled via `preferred_shard` argument). This occurs without validating that the provided list has enough values.
If the list is empty this results in dereferencing a null pointer (undefined behavior). If, however, the list has some elements, if the restoration index is outside the bounds this results in heap OOB read.
### Patches
We have patched the issue in GitHub commit [9e82dce6e6bd1f36a57e08fa85af213e2b2f2622](https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37639'}
|
2022-04-26T18:06:27Z
|
2021-08-25T14:44:05Z
|
HIGH
| 8.4
|
{'CWE-476', 'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4', 'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37639', 'https://github.com/advisories/GHSA-gh6x-4whr-2qv4'}
| null |
GHSA
|
GHSA-j9pj-hx76-92v6
|
Server-Side Request Forgery in phantomjs-seo
|
This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack.
|
{'CVE-2020-7739'}
|
2021-05-10T18:38:21Z
|
2021-05-10T18:38:21Z
|
HIGH
| 8.2
|
{'CWE-20', 'CWE-918'}
|
{'https://www.npmjs.com/package/phantomjs-seo', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7739', 'https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638', 'https://github.com/areverberi/phantomjs-seo/blob/083f66892f97d67031668decb917389ffc32a94c/index.js%23L17', 'https://github.com/advisories/GHSA-j9pj-hx76-92v6'}
| null |
GHSA
|
GHSA-gfv6-cj92-g3hx
|
Moderate severity vulnerability that affects pykmip
|
OpenKMIP PyKMIP version All versions before 0.8.0 contains a CWE 399: Resource Management Errors (similar issue to CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the server can be made unavailable by one or more clients opening all of the available sockets. This attack appear to be exploitable via A client or clients open sockets with the server and then never close them. This vulnerability appears to have been fixed in 0.8.0.
|
{'CVE-2018-1000872'}
|
2021-09-10T20:54:33Z
|
2018-12-21T17:46:39Z
|
MODERATE
| 6.5
|
{'CWE-400'}
|
{'https://github.com/OpenKMIP/PyKMIP/issues/430', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000872', 'https://github.com/advisories/GHSA-gfv6-cj92-g3hx'}
| null |
GHSA
|
GHSA-vhfp-9wvj-gwvg
|
XML External Entity vulnerability in MODX CMS
|
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
|
{'CVE-2020-25911'}
|
2021-11-03T14:52:00Z
|
2021-11-01T19:19:43Z
|
CRITICAL
| 9.1
|
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution/issues/15237', 'https://github.com/modxcms/revolution/pull/15238', 'https://github.com/advisories/GHSA-vhfp-9wvj-gwvg', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md'}
| null |
GHSA
|
GHSA-5p52-j8pw-j7x5
|
Moderate severity vulnerability that affects org.bedework:bw-webdav
|
Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java.
|
{'CVE-2018-20000'}
|
2021-09-01T22:18:42Z
|
2018-12-19T19:24:52Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-5p52-j8pw-j7x5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20000', 'https://github.com/Bedework/bw-webdav/compare/bw-webdav-4.0.2...bw-webdav-4.0.3', 'https://github.com/Bedework/bw-webdav/pull/1'}
| null |
GHSA
|
GHSA-r2j6-p67h-q639
|
Secret disclosure when containing characters that become URI encoded
|
### Impact
Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL.
### Patches
Fixed in v17.2.3
### Workarounds
Secrets that do not contain characters that become encoded when included in a URL are already masked properly.
|
{'CVE-2020-26226'}
|
2022-04-19T19:02:39Z
|
2020-11-18T21:19:14Z
|
HIGH
| 8.1
|
{'CWE-116'}
|
{'https://github.com/advisories/GHSA-r2j6-p67h-q639', 'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226', 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639'}
| null |
GHSA
|
GHSA-4vf2-4xcg-65cx
|
Division by 0 in `Conv2D`
|
### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.Conv2D`:
```python
import tensorflow as tf
input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
strides = [1, 1, 1, 1]
padding = "SAME"
tf.raw_ops.Conv2D(input=input, filter=filter, strides=strides, padding=padding)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/988087bd83f144af14087fe4fecee2d250d93737/tensorflow/core/kernels/conv_ops.cc#L261-L263) does a division by a quantity that is controlled by the caller:
```cc
const int64 patch_depth = filter.dim_size(2);
if (in_depth % patch_depth != 0) { ... }
```
### Patches
We have patched the issue in GitHub commit [b12aa1d44352de21d1a6faaf04172d8c2508b42b](https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29526'}
|
2021-05-21T14:21:55Z
|
2021-05-21T14:21:55Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b', 'https://github.com/advisories/GHSA-4vf2-4xcg-65cx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29526'}
| null |
GHSA
|
GHSA-92xj-mqp7-vmcj
|
Prototype Pollution in node-forge
|
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
|
{'CVE-2020-7720'}
|
2022-01-13T18:24:31Z
|
2020-09-14T21:42:09Z
|
HIGH
| 8.8
|
{'CWE-1321', 'CWE-915'}
|
{'https://github.com/advisories/GHSA-92xj-mqp7-vmcj', 'https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7720'}
| null |
GHSA
|
GHSA-cxg7-84wp-8pcq
|
yetiforcecrm is vulnerable to Business Logic Errors
|
yetiforcecrm is vulnerable to Business Logic Errors.
|
{'CVE-2021-4117'}
|
2022-01-03T15:47:43Z
|
2021-12-16T21:01:07Z
|
HIGH
| 7.7
| null |
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://github.com/advisories/GHSA-cxg7-84wp-8pcq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a'}
| null |
GHSA
|
GHSA-5rg2-6qr5-2xp8
|
Cross-site Scripting in snipe-it
|
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3863'}
|
2021-10-25T20:08:18Z
|
2021-10-21T17:49:18Z
|
MODERATE
| 5.5
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5rg2-6qr5-2xp8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0', 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}
| null |
GHSA
|
GHSA-675m-85rw-j3w4
|
Prototype Pollution in just-extend
|
Versions of `just-extend` before 4.0.0 are vulnerable to prototype pollution. Provided certain input `just-extend` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
Update to version `4.0.0` or later.
|
{'CVE-2018-16489'}
|
2021-01-08T19:46:58Z
|
2019-02-07T18:17:12Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-675m-85rw-j3w4', 'https://www.npmjs.com/advisories/780', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16489', 'https://hackerone.com/reports/430291'}
| null |
GHSA
|
GHSA-8jpx-m2wh-2v34
|
Remote Code Execution (RCE) vulnerability in dropwizard-validation
|
### Summary
A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expressions, leading to Remote Code Execution (RCE) vulnerability.
If you're using a self-validating bean (via [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)), an upgrade to Dropwizard 1.3.21/2.0.3 or later is strongly recommended.
The changes introduced in Dropwizard 1.3.19 and 2.0.2 (see [GHSA-3mcp-9wr4-cjqf](https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf)/[CVE-2020-5245](https://github.com/advisories/GHSA-3mcp-9wr4-cjqf)) unfortunately didn't fix the underlying issue completely.
### Impact
This issue may allow Remote Code Execution (RCE), allowing to run arbitrary code on the host system (with the privileges of the Dropwizard service account privileges) by injecting arbitrary [Java Expression Language (EL)](https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-interpolation-with-message-expressions) expressions when using the self-validating feature ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html), [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html)) in **dropwizard-validation**.
### Patches
The issue has been fixed in **dropwizard-validation** **1.3.21** and **2.0.3** or later. We strongly recommend upgrading to one of these versions.
The evaluation of EL expressions has been disabled by default now.
In order to use some interpolation in the violation messages added to [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html), it has to be explicitly allowed by setting [`SelfValidating#escapeExpressions()`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html#escapeExpressions--) to `false`.
It is also recommended to use the `addViolation` methods supporting message parameters instead of EL expressions introduced in Dropwizard 1.3.21 and 2.0.3:
* [`ViolationCollector#addViolation(String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.util.Map-)
* [`ViolationCollector#addViolation(String, String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.util.Map-)
* [`ViolationCollector#addViolation(String, String, Integer, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.Integer-java.lang.String-java.util.Map-)
* [`ViolationCollector#addViolation(String, String, String, Map<String, Object>`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html#addViolation-java.lang.String-java.lang.String-java.lang.String-java.util.Map-)
### Workarounds
If you are not able to upgrade to one of the aforementioned versions of **dropwizard-validation** but still want to use the [`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.2/io/dropwizard/validation/selfvalidating/SelfValidating.html) feature, make sure to properly sanitize any message you're adding to the [`ViolationCollector`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/ViolationCollector.html) in the method annotated with [`@SelfValidation`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidation.html).
Example:
```java
@SelfValidation
public void validateFullName(ViolationCollector col) {
if (fullName.contains("_")) {
// Sanitize fullName variable by escaping relevant characters such as "$"
col.addViolation("Full name contains invalid characters: " + sanitizeJavaEl(fullName));
}
}
```
See also:
https://github.com/dropwizard/dropwizard/blob/v2.0.3/dropwizard-validation/src/main/java/io/dropwizard/validation/InterpolationHelper.java
### References
* https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf
* https://github.com/dropwizard/dropwizard/pull/3208
* https://github.com/dropwizard/dropwizard/pull/3209
* https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [dropwizard/dropwizard](https://github.com/dropwizard/dropwizard/issues/new)
* Start a discussion on the [dropwizard-dev mailing list](https://groups.google.com/forum/#!forum/dropwizard-dev)
### Security contact
If you want to responsibly disclose a security issue in Dropwizard or one of its official modules, please contact us via the published channels in our [security policy](https://github.com/dropwizard/dropwizard/security/policy):
https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability
|
{'CVE-2020-11002'}
|
2022-04-19T19:02:55Z
|
2020-04-10T18:42:20Z
|
HIGH
| 8
|
{'CWE-74'}
|
{'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability', 'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext', 'https://github.com/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwizard/dropwizard/pull/3209', 'https://github.com/dropwizard/dropwizard/pull/3208', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11002'}
| null |
GHSA
|
GHSA-6973-94v8-5mgw
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
|
{'CVE-2019-0991'}
|
2021-03-29T20:57:42Z
|
2021-03-29T20:57:42Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0991', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://github.com/advisories/GHSA-6973-94v8-5mgw', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991'}
| null |
GHSA
|
GHSA-vwjc-q9px-r9vq
|
Denial of Service in ecstatic
|
Versions of `ecstatic` prior to 1.4.0 are affected by a denial of service vulnerability when certain input strings are sent via the `Last-Modified` or `If-Modified-Since` headers.
Parsing certain inputs with `new Date()` or `Date.parse()` cases v8 to crash. As ecstatic passes the value of the affected headers into one of these functions, sending certain inputs via one of the headers will cause the server to crash.
## Recommendation
Update to version 1.4.0 or later.
|
{'CVE-2015-9242'}
|
2021-01-08T01:57:13Z
|
2018-06-07T19:43:11Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9242', 'https://bugs.chromium.org/p/v8/issues/detail?id=4640', 'https://www.npmjs.com/advisories/64', 'https://github.com/advisories/GHSA-vwjc-q9px-r9vq'}
| null |
GHSA
|
GHSA-fm35-jgg3-3grx
|
NaN/INF in serverbound movement packets can crash clients and servers
|
### Impact
A malicious client may send a `MovePlayerPacket` to the server whose position or rotation contains NaN or INF. Since neither the server nor vanilla client handles this properly, a number of interesting side effects come into play.
- The server may crash in various ways if this exploit is used, because some mathematical operations on NaN/INF generate PHP warnings, which are converted into exceptions.
- Clients may not be able to see other clients who have a NaN/INF rotation.
- Clients may also crash in such cases.
### Patches
A patch for this was included in the 3.18.1 release: https://github.com/pmmp/PocketMine-MP/commit/fb20bb38327b4c08ee3976640cd0dd547388a638
### Workarounds
Workarounds could be implemented as plugins using `DataPacketReceiveEvent` to block any inbound movement packets containing bogus values.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [pmmp/PocketMine-MP](https://github.com/pmmp/PocketMine-MP)
- Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-03-21T20:45:05Z
|
2022-03-18T17:54:38Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fm35-jgg3-3grx', 'https://github.com/advisories/GHSA-fm35-jgg3-3grx'}
| null |
GHSA
|
GHSA-q7q9-w24q-cpgh
|
Cross-site Scripting (XSS) in Apache Ambari Views
|
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
|
{'CVE-2020-1936'}
|
2022-01-06T20:35:22Z
|
2022-01-06T20:35:22Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1936', 'https://github.com/advisories/GHSA-q7q9-w24q-cpgh', 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210', 'https://lists.apache.org/thread.html/946a9d72e664ad8bc592168d9a2fed88100c6e9f1bdfea08e91a3184%40%3Cuser.ambari.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/02/1', 'https://github.com/apache/ambari/pull/3040', 'https://issues.apache.org/jira/browse/AMBARI-25329'}
| null |
GHSA
|
GHSA-j8j8-348v-wfm3
|
High severity vulnerability that affects python-saml
|
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
|
{'CVE-2017-11427'}
|
2021-01-14T21:22:53Z
|
2019-07-05T21:11:26Z
|
HIGH
| 7.7
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-j8j8-348v-wfm3', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11427'}
| null |
GHSA
|
GHSA-j7qv-pgf6-hvh4
|
XSS in `*Text` options of the Datepicker widget in jquery-ui
|
### Impact
Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
```js
$( "#datepicker" ).datepicker( {
showButtonPanel: true,
showOn: "both",
closeText: "<script>doEvilThing( 'closeText XSS' )</script>",
currentText: "<script>doEvilThing( 'currentText XSS' )</script>",
prevText: "<script>doEvilThing( 'prevText XSS' )</script>",
nextText: "<script>doEvilThing( 'nextText XSS' )</script>",
buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>",
appendText: "<script>doEvilThing( 'appendText XSS' )</script>",
} );
```
will call `doEvilThing` with 6 different parameters coming from all `*Text` options.
### Patches
The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML.
### Workarounds
A workaround is to not accept the value of the `*Text` options from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
|
{'CVE-2021-41183'}
|
2022-04-22T15:40:46Z
|
2021-10-26T14:55:21Z
|
MODERATE
| 6.5
|
{'CWE-79'}
|
{'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://bugs.jqueryui.com/ticket/15284', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-core-2022-001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://github.com/jquery/jquery-ui/pull/1953', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://github.com/advisories/GHSA-j7qv-pgf6-hvh4', 'https://www.drupal.org/sa-contrib-2022-004', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183', 'https://www.drupal.org/sa-core-2022-002'}
| null |
GHSA
|
GHSA-4rq4-32rv-6wp6
|
Improper Privilege Management in shelljs
|
shelljs is vulnerable to Improper Privilege Management
|
{'CVE-2022-0144'}
|
2022-01-21T23:37:28Z
|
2022-01-21T23:37:28Z
|
HIGH
| 7.1
|
{'CWE-269'}
|
{'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c', 'https://github.com/advisories/GHSA-4rq4-32rv-6wp6'}
| null |
GHSA
|
GHSA-mj87-8xf8-fp4w
|
Cross-Site Scripting in yui
|
Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url.
## Recommendation
YUI has published their recommendation to fix this issue.
Their recommendation is to:
- Delete self-hosted copies of these files if you are not using them
- Use the Yahoo! CDN hosted files
- Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution).
|
{'CVE-2013-4939'}
|
2021-09-23T21:39:45Z
|
2020-09-01T16:42:51Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/332', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678', 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-mj87-8xf8-fp4w', 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E', 'https://moodle.org/mod/forum/discuss.php?d=232496', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939', 'https://yuilibrary.com/support/20130515-vulnerability/', 'http://yuilibrary.com/support/20130515-vulnerability/'}
| null |
GHSA
|
GHSA-gwr8-5j83-483c
|
OS Command Injection and Improper Input Validation in ansible
|
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
|
{'CVE-2019-14904'}
|
2022-04-26T17:59:52Z
|
2021-04-20T16:44:22Z
|
MODERATE
| 7.3
|
{'CWE-20', 'CWE-78'}
|
{'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/advisories/GHSA-gwr8-5j83-483c', 'https://github.com/ansible/ansible/pull/65686', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14904', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'}
| null |
GHSA
|
GHSA-jpjp-vxv6-59hm
|
Directory Traversal in open-device
|
Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16187'}
|
2021-01-08T18:33:22Z
|
2018-07-23T20:41:11Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device', 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm', 'https://nodesecurity.io/advisories/447', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187', 'https://www.npmjs.com/advisories/447'}
| null |
GHSA
|
GHSA-cch6-5x4h-6qc5
|
Directory Traversal in tiny-http
|
Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16097'}
|
2021-01-14T15:55:23Z
|
2020-09-01T16:46:04Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/342', 'https://github.com/advisories/GHSA-cch6-5x4h-6qc5', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097', 'https://www.npmjs.com/advisories/342'}
| null |
GHSA
|
GHSA-wf43-55jj-vwq8
|
DNS Rebinding in etcd
|
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
|
{'CVE-2018-1099'}
|
2022-04-12T22:12:47Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 5.5
|
{'CWE-350', 'CWE-20'}
|
{'https://github.com/advisories/GHSA-wf43-55jj-vwq8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552717', 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56', 'https://github.com/coreos/etcd/issues/9353'}
| null |
GHSA
|
GHSA-j3jp-gvr5-7hwq
|
Low severity vulnerability that affects python-engineio
|
## WebSocket cross-origin vulnerability
### Impact
This is a Cross-Site Request Forgery (CSRF) vulnerability. It affects Socket.IO and Engine.IO web servers that authenticate clients using cookies.
### Patches
python-engineio version 3.9.0 patches this vulnerability by adding server-side Origin header checks.
### Workarounds
Do not use cookies for client authentication, or else add a CSRF token to the connection URL.
### References
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
https://www.christian-schneider.net/CrossSiteWebSocketHijacking.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [python-engineio](http://github.com/miguelgrinberg/python-engineio)
|
{'CVE-2019-13611'}
|
2021-09-14T18:17:04Z
|
2019-07-30T20:47:25Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/miguelgrinberg/python-engineio/issues/128', 'https://github.com/advisories/GHSA-j3jp-gvr5-7hwq', 'https://github.com/miguelgrinberg/python-engineio/security/advisories/GHSA-j3jp-gvr5-7hwq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13611'}
| null |
GHSA
|
GHSA-mpww-j7xj-cj35
|
Downloads Resources over HTTP in native-opencv
|
Affected versions of `native-opencv` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `native-opencv`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10658'}
|
2021-01-08T18:26:49Z
|
2019-02-18T23:45:07Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/263', 'https://nodesecurity.io/advisories/263', 'https://github.com/advisories/GHSA-mpww-j7xj-cj35', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10658'}
| null |
GHSA
|
GHSA-cmj2-m9m2-6726
|
Downloads Resources over HTTP in grunt-ccompiler
|
Affected versions of `grunt-ccompiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-ccompiler`.
## Recommendation
No patch is currently available for this vulnerability, and the repository has been deleted from the owner's github account.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10636'}
|
2021-01-08T18:57:40Z
|
2019-02-18T23:47:11Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-cmj2-m9m2-6726', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10636', 'https://nodesecurity.io/advisories/239', 'https://www.npmjs.com/advisories/239'}
| null |
GHSA
|
GHSA-frxj-5j27-f8rf
|
Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible
|
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
|
{'CVE-2019-14905'}
|
2021-11-03T14:53:14Z
|
2021-04-20T16:44:49Z
|
MODERATE
| 5.6
|
{'CWE-668', 'CWE-20', 'CWE-73', 'CWE-610'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14905', 'https://access.redhat.com/errata/RHSA-2020:0216', 'https://access.redhat.com/errata/RHSA-2020:0218', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905', 'https://github.com/advisories/GHSA-frxj-5j27-f8rf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}
| null |
GHSA
|
GHSA-3p3g-vpw6-4w66
|
Authentication Bypass in hydra
|
### Impact
"When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:"
> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties
"Hydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens:"
```
$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \
--data-urlencode 'scope=application openid' \
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
--data-urlencode 'client_assertion=eyJhb [...] jTw'
{"access_token":"zeG0NoqOtlACl8q5J6A-TIsNegQRRUzqLZaYrQtoBZQ.VR6iUcJQYp3u_j7pwvL7YtPqGhtyQe5OhnBE2KCp5pM","expires_in":3599,"scope":"application openid","token_type":"bearer"}⏎ ~$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \
--data-urlencode 'scope=application openid' \
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
--data-urlencode 'client_assertion=eyJhb [...] jTw'
{"access_token":"wOYtgCLxLXlELORrwZlmeiqqMQ4kRzV-STU2_Sollas.mwlQGCZWXN7G2IoegUe1P0Vw5iGoKrkOzOaplhMSjm4","expires_in":3599,"scope":"application openid","token_type":"bearer"}
```
### Severity
"We rate the severity as medium because the following reasons make it hard to replay tokens without the patch:"
- TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks
- The expiry time of the JWT gives only a short window of opportunity where it could be replayed
### Patches
This will be patched with v1.4.0+oryOS.17
### Workarounds
Two workarounds have been identified:
- Do not allow clients to use `private_key_jwt`
- Use short expiry times for the JWTs
### Upstream
This issue will be resolved in the upstream repository https://github.com/ory/fosite
|
{'CVE-2020-5300'}
|
2021-05-27T18:43:22Z
|
2021-05-27T18:43:22Z
|
MODERATE
| 5.8
|
{'CWE-294'}
|
{'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication', 'https://github.com/ory/hydra/security/advisories/GHSA-3p3g-vpw6-4w66', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5300', 'https://github.com/advisories/GHSA-3p3g-vpw6-4w66', 'https://github.com/ory/hydra/releases/tag/v1.4.0', 'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}
| null |
GHSA
|
GHSA-hx83-rpqf-m267
|
user/group information can be corrupted across storing in fsimage and reading back from fsimage
|
In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.
|
{'CVE-2018-11768'}
|
2021-08-18T22:42:34Z
|
2019-11-20T01:38:00Z
|
HIGH
| 7.5
|
{'CWE-119'}
|
{'https://lists.apache.org/thread.html/f20bb4e055d8394fc525cc7772fb84096f706389043e76220c8a29a4@%3Chdfs-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ea6d2dfbefab8ebe46be18b05136b83ae53b7866f1bc60c680a2b600@%3Chdfs-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/2c9cc65864be0058a5d5ed2025dfb9c700bf23d352b0c826c36ff96a@%3Chdfs-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/72ca514e01cd5f08151e74f9929799b4cbe1b6e9e6cd24faa72ffcc6@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/9b609d4392d886711e694cf40d86f770022baf42a1b1aa97e8244c87@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/caacbbba2dcc1105163f76f3dfee5fbd22e0417e0783212787086378@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ceb16af9139ab0fea24aef935b6321581976887df7ad632e9a515dda@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11768', 'https://github.com/advisories/GHSA-hx83-rpqf-m267', 'https://hadoop.apache.org/cve_list.html'}
| null |
GHSA
|
GHSA-gcv9-6737-pjqw
|
SSRF vulnerability in jupyter-server-proxy
|
### Impact
**What kind of vulnerability is it?** Server-Side Request Forgery ( SSRF )
**Who is impacted?** Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled.
A lack of input validation allowed authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Upgrade to 3.2.1, or apply the patch https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch
### For more information
If you have any questions or comments about this advisory:
* Open a topic [on our forum](https://discourse.jupyter.org)
* Email the Jupyter security team at [security@ipython.org](mailto:security@ipython.org)
|
{'CVE-2022-21697'}
|
2022-04-19T19:03:20Z
|
2022-01-27T16:24:26Z
|
MODERATE
| 6.3
|
{'CWE-918'}
|
{'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb', 'https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch', 'https://github.com/advisories/GHSA-gcv9-6737-pjqw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21697'}
| null |
GHSA
|
GHSA-9vh6-qfv6-vcqp
|
snipe-IT vulnerable to host header injection
|
Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This can lead to account take over.
|
{'CVE-2022-23064'}
|
2022-05-03T06:29:50Z
|
2022-05-03T00:00:43Z
|
HIGH
| 8.8
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-9vh6-qfv6-vcqp', 'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064'}
| null |
GHSA
|
GHSA-6494-v9fq-fgq2
|
Keystone is vulnerable to CSV injection
|
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
|
{'CVE-2017-15879'}
|
2022-04-25T22:05:05Z
|
2017-11-16T01:46:50Z
|
HIGH
| 8.8
|
{'CWE-20'}
|
{'https://www.exploit-db.com/exploits/43053/', 'https://github.com/advisories/GHSA-6494-v9fq-fgq2', 'https://github.com/keystonejs/keystone/pull/4478', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879', 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}
| null |
GHSA
|
GHSA-9v3m-8fp8-mj99
|
Cross-Site Scripting in bootstrap
|
Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript.
## Recommendation
For `bootstrap` 4.x upgrade to 4.3.1 or later.
For `bootstrap` 3.x upgrade to 3.4.1 or later.
|
{'CVE-2019-8331'}
|
2021-06-15T16:39:39Z
|
2019-02-22T20:54:47Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://github.com/twbs/bootstrap/pull/28236', 'http://seclists.org/fulldisclosure/2019/May/10', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.npmjs.com/advisories/891', 'http://www.securityfocus.com/bid/107375', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331', 'https://support.f5.com/csp/article/K24383845', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://github.com/advisories/GHSA-9v3m-8fp8-mj99', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}
| null |
GHSA
|
GHSA-gh8j-2pgf-x458
|
Infinite Loop in rencode
|
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
|
{'CVE-2021-40839'}
|
2022-02-16T22:03:02Z
|
2021-09-13T20:05:51Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://seclists.org/fulldisclosure/2021/Sep/16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40839', 'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/', 'https://github.com/aresch/rencode/pull/29', 'https://security.netapp.com/advisory/ntap-20211008-0001/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/', 'https://github.com/advisories/GHSA-gh8j-2pgf-x458', 'https://pypi.org/project/rencode/#history'}
| null |
GHSA
|
GHSA-c3xm-pvg7-gh7r
|
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
|
### Summary
runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby
an attacker can request a seemingly-innocuous container configuration that
actually results in the host filesystem being bind-mounted into the container
(allowing for a container escape). CVE-2021-30465 has been assigned for this
issue.
An attacker must have the ability to start containers using some kind of custom
volume configuration, and while recommended container hardening mechanisms such
as LSMs (AppArmor/SELinux) and user namespaces will restrict the amount of
damage an attacker could do, they do not block this attack outright. We have a
reproducer using Kubernetes (and the below description mentions
Kubernetes-specific paths), but this is not a Kubernetes-specific issue.
The now-released [runc v1.0.0-rc95][release] contains a fix for this issue, we
recommend users update as soon as possible.
[release]: https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95
### Details
In circumstances where a container is being started, and runc is mounting
inside a volume shared with another container (which is conducting a
symlink-exchange attack), runc can be tricked into mounting outside of the
container rootfs by swapping the target of a mount with a symlink due to a
time-of-check-to-time-of-use (TOCTTOU) flaw. This is fairly similar in style to
previous TOCTTOU attacks (and is a problem we are working on solving with
libpathrs).
However, this alone is not useful because this happens inside a mount namespace
with `MS_SLAVE` propagation applied to `/` (meaning that the mount doesn't
appear on the host -- it's only a "host-side mount" inside the container's
namespace). To exploit this, you must have additional mount entries in the
configuration that use some subpath of the mounted-over host path as a source
for a subsequent mount.
However, it turns out with some container orchestrators (such as Kubernetes --
though it is very likely that other downstream users of runc could have similar
behaviour be accessible to untrusted users), the existence of additional volume
management infrastructure allows this attack to be applied to gain access to
the host filesystem without requiring the attacker to have completely arbitrary
control over container configuration.
In the case of Kubernetes, this is exploitable by creating a symlink in a
volume to the top-level (well-known) directory where volumes are sourced from
(for instance,
`/var/lib/kubelet/pods/$MY_POD_UID/volumes/kubernetes.io~empty-dir`), and then
using that symlink as the target of a mount. The source of the mount is an
attacker controlled directory, and thus the source directory from which
subsequent mounts will occur is an attacker-controlled directory. Thus the
attacker can first place a symlink to `/` in their malicious source directory
with the name of a volume, and a subsequent mount in the container will
bind-mount `/` into the container.
Applying this attack requires the attacker to start containers with a slightly
peculiar volume configuration (though not explicitly malicious-looking such as
bind-mounting `/` into the container explicitly), and be able to run malicious
code in a container that shares volumes with said volume configuration. It
helps the attacker if the host paths used for volume management are well known,
though this is not a hard requirement.
### Patches
This has been patched in runc 1.0.0-rc95, and users should upgrade as soon as
possible. The patch itself can be found [here](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f).
### Workarounds
There are no known workarounds for this issue.
However, users who enforce running containers with more confined security
profiles (such as reduced capabilities, not running code as root in the
container, user namespaces, AppArmor/SELinux, and seccomp) will restrict what
an attacker can do in the case of a container breakout -- we recommend users
make use of strict security profiles if possible (most notably user namespaces
-- which can massively restrict the impact a container breakout can have on the
host system).
### References
* [commit](https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f)
* [seclists public disclosure](https://www.openwall.com/lists/oss-security/2021/05/19/2)
### Credit
Thanks to Etienne Champetier for discovering and disclosing this vulnerability,
to Noah Meyerhans for writing the first draft of this patch, and to Samuel Karp
for testing it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencontainers/runc/issues).
* Email us at <security@opencontainers.org>.
|
{'CVE-2021-30465'}
|
2022-04-19T19:02:53Z
|
2021-05-25T18:44:42Z
|
HIGH
| 7.6
|
{'CWE-367', 'CWE-22'}
|
{'http://www.openwall.com/lists/oss-security/2021/05/19/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/', 'https://github.com/advisories/GHSA-c3xm-pvg7-gh7r', 'https://security.netapp.com/advisory/ntap-20210708-0003/', 'https://github.com/opencontainers/runc/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30465', 'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f', 'https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r', 'https://bugzilla.opensuse.org/show_bug.cgi?id=1185405', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35ZW6NBZSBH5PWIT7JU4HXOXGFVDCOHH/'}
| null |
GHSA
|
GHSA-wv83-jrfh-rp33
|
Cross site scripting in kindeditor
|
Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).
|
{'CVE-2021-42227'}
|
2021-10-21T14:56:28Z
|
2021-10-18T19:44:32Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42227', 'https://github.com/advisories/GHSA-wv83-jrfh-rp33', 'https://github.com/kindsoft/kindeditor/issues/336'}
| null |
GHSA
|
GHSA-7xc4-793x-25jp
|
Malicious Package in bpi66
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:49:13Z
|
2020-09-04T16:48:38Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1374', 'https://github.com/advisories/GHSA-7xc4-793x-25jp'}
| null |
GHSA
|
GHSA-78cj-fxph-m83p
|
Regular Expression Denial of Service (ReDoS) in ua-parser-js
|
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
|
{'CVE-2021-27292'}
|
2021-05-06T16:11:13Z
|
2021-05-06T16:11:13Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27292', 'https://github.com/advisories/GHSA-78cj-fxph-m83p'}
| null |
GHSA
|
GHSA-4jwp-vfvf-657p
|
Deserialization of Untrusted Data in bson
|
Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure.
|
{'CVE-2019-2391'}
|
2022-02-10T23:30:20Z
|
2022-02-10T23:30:20Z
|
MODERATE
| 5.4
|
{'CWE-502'}
|
{'https://github.com/advisories/GHSA-4jwp-vfvf-657p', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2391', 'https://github.com/mongodb/js-bson/releases/tag/v1.1.4'}
| null |
GHSA
|
GHSA-p5ch-w78f-xh44
|
Cross-site scripting in @atlaskit/editor-core
|
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
|
{'CVE-2019-20903'}
|
2022-02-10T20:34:24Z
|
2022-02-10T20:34:24Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://atlaskit.atlassian.com/packages/editor/editor-core/changelog/113.1.5', 'https://www.npmjs.com/package/@atlaskit/editor-core', 'https://bitbucket.org/atlassian/atlaskit-mk-2/commits/ca88f616e4', 'https://github.com/advisories/GHSA-p5ch-w78f-xh44', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20903', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1021244735'}
| null |
GHSA
|
GHSA-rp28-29ch-gh92
|
Directory Traversal in elding
|
Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability only affects files that have file extensions - i.e. `/etc/passwd` will be treated as a directory, and a read attempt on `/etc/passwd/index.js` will be made and subsequently fail.
Example request:
```
GET /../../../../../../../../../../some_app_dir/secrets.json HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16222'}
|
2021-09-17T18:59:08Z
|
2018-08-06T21:30:15Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16222', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding', 'https://www.npmjs.com/advisories/415', 'https://github.com/advisories/GHSA-rp28-29ch-gh92'}
| null |
GHSA
|
GHSA-68cm-mgv7-vg5c
|
Directory Traversal in utahcityfinder
|
Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16173'}
|
2021-01-08T19:46:25Z
|
2018-07-23T20:45:11Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16173', 'https://nodesecurity.io/advisories/467', 'https://www.npmjs.com/advisories/467', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder', 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c'}
| null |
GHSA
|
GHSA-6jg8-7333-554w
|
Sandbox Breakout in realms-shim
|
Versions of `realms-shim` prior to 1.2.0 are vulnerable to a Sandbox Breakout. `Reflect.construct` can be used on the sandboxed Function constructor to reach the prototypes of the primal Realm, which may allow an attacker to escape the sandbox and execute arbitrary code.
## Recommendation
Upgrade to version 1.2.0 or later.
| null |
2021-09-02T16:40:48Z
|
2019-10-04T17:56:12Z
|
CRITICAL
| 9.8
| null |
{'https://www.npmjs.com/advisories/1181', 'https://www.npmjs.com/advisories/1190', 'https://www.npmjs.com/advisories/1191', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-6jg8-7333-554w', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-471680', 'https://github.com/advisories/GHSA-6jg8-7333-554w', 'https://www.npmjs.com/advisories/1182', 'https://www.npmjs.com/advisories/1180'}
| null |
GHSA
|
GHSA-hxxp-6546-wv6r
|
Improper Restriction of XML External Entity Reference
|
Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
{'CVE-2021-21672'}
|
2022-04-19T18:25:32Z
|
2021-07-02T18:36:13Z
|
MODERATE
| 4.3
|
{'CWE-611'}
|
{'http://www.openwall.com/lists/oss-security/2021/06/30/1', 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21672', 'http://www.openwall.com/lists/oss-security/2022/04/14/2', 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1', 'https://github.com/advisories/GHSA-hxxp-6546-wv6r'}
| null |
GHSA
|
GHSA-8vh3-29mr-m9xg
|
Inadequate Encryption Strength in showdoc
|
showdoc makes use of a hardcoded salt in its user password hash function
|
{'CVE-2021-3680'}
|
2021-09-01T18:31:23Z
|
2021-09-01T18:31:23Z
|
MODERATE
| 4.9
|
{'CWE-326'}
|
{'https://github.com/advisories/GHSA-8vh3-29mr-m9xg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3680', 'https://huntr.dev/bounties/76b49607-fba9-4100-9be7-cb459fe6cfe2', 'https://github.com/star7th/showdoc/blob/fd1740234a12804b45af9cac3563567d83ba414d/server/Application/Home/Model/UserModel.class.php#L20'}
| null |
GHSA
|
GHSA-ph76-rhqq-xj7j
|
Cross-site scripting in Crafter CMS Crafter Studio
|
Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal users’ cookies.
|
{'CVE-2017-15686'}
|
2022-02-09T23:08:06Z
|
2022-02-09T23:08:06Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://docs.craftercms.org/en/3.0/security/advisory.html', 'https://github.com/advisories/GHSA-ph76-rhqq-xj7j', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15686'}
| null |
GHSA
|
GHSA-hwrr-rhmm-vcvf
|
NULL Pointer Dereference in Kubernetes CSI snapshot-controller
|
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when:
- The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass.
- The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop.
Only the volume snapshot feature is affected by this vulnerability. When exploited, users can’t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected.
|
{'CVE-2020-8569'}
|
2022-04-20T20:56:26Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 6.5
|
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8569', 'https://github.com/advisories/GHSA-hwrr-rhmm-vcvf', 'https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU', 'https://github.com/kubernetes-csi/external-snapshotter/issues/380'}
| null |
GHSA
|
GHSA-5m9c-634g-47vq
|
Downloads Resources over HTTP in steroids
|
Affected versions of `steroids` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `steroids`.
## Recommendation
This vulnerability was discovered and reported in 2016, yet has not seen a patch issued as of 3/2018.
The best path forward for mitigating this issue is to attempt to use an alternative module that is actively maintained and which provides similar functionality, such as the native PhoneGap API.
|
{'CVE-2016-10581'}
|
2021-01-08T19:50:09Z
|
2019-02-18T23:35:01Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-5m9c-634g-47vq', 'https://github.com/AppGyver/steroids/blob/master/package.json#L101', 'https://nodesecurity.io/advisories/168', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10581', 'https://www.npmjs.com/advisories/168', 'https://github.com/AppGyver/steroids/blob/master/package.json#L74', 'https://github.com/AppGyver/steroids/blob/master/package.json#L103-L104'}
| null |
GHSA
|
GHSA-p3w3-4ppm-c3f6
|
Cross site scripting in FacturaScripts
|
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
|
{'CVE-2022-1514'}
|
2022-04-29T21:02:50Z
|
2022-04-29T00:00:23Z
|
CRITICAL
| 9
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-p3w3-4ppm-c3f6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c'}
| null |
GHSA
|
GHSA-gjh4-fcv3-whpq
|
Cross-Site Scripting in webtorrent
|
Versions of `webtorrent` prior to 0.107.6 are vulnerable to Cross-Site Scripting. `webtorrent` servers started with `torrent.createServer()` lists a torrent's title and files in the index page without sanitization. This allows attackers to execute arbitrary JavaScript in the victim's browser through files with names containing the malicious payload. The issue is mitigated due to the fact that the server only allows fetching data pieces from the torrent.
## Recommendation
Upgrade to version 0.107.6 or later.
|
{'CVE-2019-15782'}
|
2021-08-17T22:20:22Z
|
2019-09-04T10:02:50Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://hackerone.com/reports/681617', 'https://github.com/webtorrent/webtorrent/compare/v0.107.5...v0.107.6', 'https://www.npmjs.com/advisories/1158', 'https://github.com/advisories/GHSA-gjh4-fcv3-whpq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15782', 'https://snyk.io/vuln/SNYK-JS-WEBTORRENT-460351', 'https://github.com/webtorrent/webtorrent/pull/1714'}
| null |
GHSA
|
GHSA-cg3q-j54f-5p7p
|
Uncontrolled Resource Consumption in promhttp
|
This is the Go client library for Prometheus. It has two separate parts, one for instrumenting application code, and one for creating clients that talk to the Prometheus HTTP API. client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients.
### Impact
HTTP server susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods.
### Affected Configuration
In order to be affected, an instrumented software must
* Use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`.
* Do not filter any specific methods (e.g GET) before middleware.
* Pass metric with `method` label name to our middleware.
* Not have any firewall/LB/proxy that filters away requests with unknown `method`.
### Patches
* https://github.com/prometheus/client_golang/pull/962
* https://github.com/prometheus/client_golang/pull/987
### Workarounds
If you cannot upgrade to [v1.11.1 or above](https://github.com/prometheus/client_golang/releases/tag/v1.11.1), in order to stop being affected you can:
* Remove `method` label name from counter/gauge you use in the InstrumentHandler.
* Turn off affected promhttp handlers.
* Add custom middleware before promhttp handler that will sanitize the request method given by Go http.Request.
* Use a reverse proxy or web application firewall, configured to only allow a limited set of methods.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/prometheus/client_golang
* Email us at `prometheus-team@googlegroups.com`
|
{'CVE-2022-21698'}
|
2022-05-03T03:48:19Z
|
2022-02-16T22:26:35Z
|
HIGH
| 7.5
|
{'CWE-772', 'CWE-400'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBMVIQFKQDSSTHVVJWJ4QH6TW3JVB7XZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKORFJTRRDJCWBTJPISKKCVMMMJBIRLG/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21698', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SASRKYHT5ZFSVMJUQUG3UAEQRJYGJKAR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AK7CJBCGERCRXYUR2EWDSSDVAQMTAZGX/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V7I72LSQ3IET3QJR6QPAVGJZ4CBDLN5/', 'https://github.com/prometheus/client_golang/releases/tag/v1.11.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FY3N7H6VSDZM37B4SKM2PFFCUWU7QYWN/', 'https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p', 'https://github.com/prometheus/client_golang/pull/987', 'https://github.com/prometheus/client_golang/pull/962', 'https://github.com/advisories/GHSA-cg3q-j54f-5p7p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/'}
| null |
GHSA
|
GHSA-rwvj-jgc4-fqq5
|
Downloads Resources over HTTP in cobalt-cli
|
Affected versions of `cobalt-cli` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cobalt-cli`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10597'}
|
2021-09-16T20:42:21Z
|
2019-02-18T23:34:05Z
|
HIGH
| 0
|
{'CWE-311', 'CWE-269'}
|
{'https://github.com/advisories/GHSA-rwvj-jgc4-fqq5', 'https://www.npmjs.com/advisories/197', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10597', 'https://nodesecurity.io/advisories/197'}
| null |
GHSA
|
GHSA-h56g-v4vp-q9q6
|
Cross-site Scripting in calibreweb
|
calibreweb prior to version 0.6.16 contains a cross-site scripting vulnerability.
|
{'CVE-2022-0352'}
|
2022-02-10T22:40:43Z
|
2022-01-29T00:00:41Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717', 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1', 'https://github.com/advisories/GHSA-h56g-v4vp-q9q6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0352'}
| null |
GHSA
|
GHSA-qrpm-p2h7-hrv2
|
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
|
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
|
{'CVE-2021-23566'}
|
2022-03-18T13:15:56Z
|
2022-01-21T23:57:06Z
|
MODERATE
| 5.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-qrpm-p2h7-hrv2', 'https://github.com/ai/nanoid/pull/328', 'https://snyk.io/vuln/SNYK-JS-NANOID-2332193', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566', 'https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550', 'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'}
| null |
GHSA
|
GHSA-44c6-4v22-4mhx
|
Regular Expression Denial of Service (ReDOS)
|
npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3795'}
|
2021-09-20T20:42:25Z
|
2021-09-20T20:42:25Z
|
MODERATE
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-44c6-4v22-4mhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795', 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28', 'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.