ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-hjgm-f7vx-m5g7
Deserialization of Untrusted Data in Apache Heron
It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data).
{'CVE-2020-1964'}
2022-03-03T05:14:02.165439Z
2022-01-06T19:44:49Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1964', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r16dd39f4180e4443ef4ca774a3a5a3d7ac69f91812c183ed2a99e959%40%3Cdev.heron.apache.org%3E', 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E'}
null
Maven
GHSA-x825-rjww-2245
Apache Storm it is possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user
It was found that under some situations and configurations of Apache Storm 1.x before 1.0.4 and 1.1.x before 1.1.1, it is theoretically possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user. In the worst case this could lead to secure credentials of the other user being compromised.
{'CVE-2017-9799'}
2022-04-27T14:30:06.076667Z
2018-10-17T18:30:01Z
HIGH
null
null
{'https://github.com/advisories/GHSA-x825-rjww-2245', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9799', 'http://www.securityfocus.com/bid/100235', 'https://lists.apache.org/thread.html/b9125bf507ed6f2ca6e85ba1a4b44e232aa70eeddfba2a9d8a954127@%3Cdev.storm.apache.org%3E', 'http://www.securitytracker.com/id/1039116'}
null
Maven
GHSA-c265-37vj-cwcc
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{'CVE-2020-14062'}
2022-03-03T05:12:57.915830Z
2020-06-18T14:44:48Z
HIGH
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14062', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-570625', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/FasterXML/jackson-databind/commit/99001cdb6807b5c7b170ec6a9092ecbb618ae79c', 'https://github.com/FasterXML/jackson-databind/issues/2704'}
null
Maven
GHSA-rjx9-2936-9ffx
Improper Input Validation in Apache Sanselan
Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
{'CVE-2018-17201'}
2022-03-03T05:13:43.489511Z
2019-05-14T04:01:06Z
HIGH
null
{'CWE-20'}
{'https://lists.apache.org/thread.html/cd37861963aa6d2694c8947d464c99614d3e1a9db6c1a2a8b7b5840a@%3Cdev.commons.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17201'}
null
Maven
GHSA-hwvm-vfw8-93mw
Vulnerable dependency in XTDB connector
### Impact The impacted portion of the XTDB connector is its connectivity to S3 as a backing store: this is the only portion of the connector that uses this vulnerable `httpclient` dependency. Per the description, the vulnerability regards URIs that may be misinterpreted, which given the area of impact within the connector we understand to be any URI used to configure connectivity to S3. Note therefore that if you do not use or configure S3 as a backing store in your use of the connector, you should not be exposed to any vulnerability from this component. ### Patches The problem has been addressed in version 4.5.13 of the httpclient library, which is included as a replacement dependency version for the build of the XTDB connector from release 3.5 onwards. Therefore, using release 3.5 (or newer) of the connector will include the fixes to address this CVE. ### Workarounds We have not investigated specific workarounds, but per the description of the issue it seems likely that ensuring the proper URIs are used for any S3 connectivity used by the connector (and ensuring there are appropriate controls around modifying such URIs in the connector's configuration) would be the first point of investigation. ### References https://nvd.nist.gov/vuln/detail/CVE-2020-13956
null
2022-03-03T05:13:41.782282Z
2021-12-16T18:53:32Z
MODERATE
null
null
{'https://github.com/odpi/egeria-connector-xtdb/commit/7b2dcc9fc6c5ce509cf72a275a2f2b8b1870dc15', 'https://github.com/odpi/egeria-connector-xtdb', 'https://github.com/odpi/egeria-connector-xtdb/security/advisories/GHSA-hwvm-vfw8-93mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13956'}
null
Maven
GHSA-xf46-8vvp-4hxx
Missing authentication for critical function
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
{'CVE-2021-20262'}
2022-03-03T05:12:48.782948Z
2021-03-12T21:33:42Z
MODERATE
null
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20262', 'https://bugzilla.redhat.com/show_bug.cgi?id=1933639'}
null
Maven
GHSA-w4r4-65mg-45x2
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use this or any other authentication mechanism, and this is not adequately documented. In this case, a user would be able to run a driver program without authenticating, but not launch executors, using the REST API. This REST API is also used by Mesos, when set up to run in cluster mode (i.e., when also running MesosClusterDispatcher), for job submission. Future versions of Spark will improve documentation on these points, and prohibit setting 'spark.authenticate.secret' when running the REST APIs, to make this clear. Future 2.4.x versions will also disable the REST API by default in the standalone master by changing the default value of 'spark.master.rest.enabled' to 'false'.
{'CVE-2018-11770'}
2022-03-03T05:13:21.976190Z
2018-11-09T17:41:46Z
MODERATE
null
{'CWE-287'}
{'http://www.securityfocus.com/bid/105097', 'https://github.com/advisories/GHSA-w4r4-65mg-45x2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11770', 'https://spark.apache.org/security.html#CVE-2018-11770', 'https://lists.apache.org/thread.html/bd8e51314041451a2acd720e9223fc1c15a263ccacb396a75b1fc485@%3Cdev.spark.apache.org%3E'}
null
Maven
GHSA-26vr-8j45-3r4w
Uncontrolled Resource Consumption in Jetty
### Impact When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. ### Workarounds The problem can be worked around by compiling the following class: ```java package org.eclipse.jetty.server.ssl.fix6072; import java.nio.ByteBuffer; import javax.net.ssl.SSLEngine; import javax.net.ssl.SSLEngineResult; import javax.net.ssl.SSLException; import javax.net.ssl.SSLHandshakeException; import org.eclipse.jetty.io.EndPoint; import org.eclipse.jetty.io.ssl.SslConnection; import org.eclipse.jetty.server.Connector; import org.eclipse.jetty.server.SslConnectionFactory; import org.eclipse.jetty.util.BufferUtil; import org.eclipse.jetty.util.annotation.Name; import org.eclipse.jetty.util.ssl.SslContextFactory; public class SpaceCheckingSslConnectionFactory extends SslConnectionFactory { public SpaceCheckingSslConnectionFactory(@Name("sslContextFactory") SslContextFactory factory, @Name("next") String nextProtocol) { super(factory, nextProtocol); } @Override protected SslConnection newSslConnection(Connector connector, EndPoint endPoint, SSLEngine engine) { return new SslConnection(connector.getByteBufferPool(), connector.getExecutor(), endPoint, engine, isDirectBuffersForEncryption(), isDirectBuffersForDecryption()) { @Override protected SSLEngineResult unwrap(SSLEngine sslEngine, ByteBuffer input, ByteBuffer output) throws SSLException { SSLEngineResult results = super.unwrap(sslEngine, input, output); if ((results.getStatus() == SSLEngineResult.Status.BUFFER_UNDERFLOW || results.getStatus() == SSLEngineResult.Status.OK && results.bytesConsumed() == 0 && results.bytesProduced() == 0) && BufferUtil.space(input) == 0) { BufferUtil.clear(input); throw new SSLHandshakeException("Encrypted buffer max length exceeded"); } return results; } }; } } ``` This class can be deployed by: + The resulting class file should be put into a jar file (eg sslfix6072.jar) + The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/lib + Copy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules` + Edit the `${jetty.base}/modules/ssl.mod` file to have the following section: ``` [lib] lib/sslfix6072.jar ``` + Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc` + Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example: ```xml <Call name="addIfAbsentConnectionFactory"> <Arg> <New class="org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory"> <Arg name="next">http/1.1</Arg> <Arg name="sslContextFactory"><Ref refid="sslContextFactory"/></Arg> </New> </Arg> </Call> ``` + Restart Jetty
{'CVE-2021-28165'}
2022-04-22T17:02:01.616630Z
2021-04-06T17:31:30Z
HIGH
null
{'CWE-551', 'CWE-400'}
{'https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w', 'https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165', 'https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/04/20/3', 'https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E'}
null
Maven
GHSA-344f-f5vg-2jfj
Potential remote code execution in Apache Tomcat
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
{'CVE-2020-9484'}
2022-03-03T05:13:24.596242Z
2020-05-21T18:52:29Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html', 'https://security.gentoo.org/glsa/202006-21', 'http://seclists.org/fulldisclosure/2020/Jun/6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html', 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.openwall.com/lists/oss-security/2021/03/01/2', 'https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E', 'https://usn.ubuntu.com/4596-1/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9484', 'https://www.debian.org/security/2020/dsa-4727', 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E', 'https://usn.ubuntu.com/4448-1/', 'http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://security.netapp.com/advisory/ntap-20200528-0005/', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-37g7-8vjj-pjpj
Hash flooding
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.
{'CVE-2020-14326'}
2022-03-18T18:02:41.451093Z
2022-03-18T17:58:59Z
HIGH
null
{'CWE-400'}
{'https://github.com/resteasy/Resteasy/pull/2471', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14326', 'https://bugzilla.redhat.com/show_bug.cgi?id=1855826'}
null
Maven
GHSA-2hjr-fg6c-v2h6
Unauthorized access to Class instance in Jinjava
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
{'CVE-2020-12668'}
2022-03-03T05:13:11.121868Z
2022-02-09T00:33:56Z
MODERATE
null
{'CWE-200'}
{'https://github.com/HubSpot/jinjava/releases/tag/jinjava-2.5.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12668', 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165', 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b', 'https://securitylab.github.com/advisories/GHSL-2020-072-hubspot_jinjava', 'https://github.com/HubSpot/jinjava/compare/jinjava-2.5.3...jinjava-2.5.4'}
null
Maven
GHSA-ffm7-7r8g-77xm
Exposure of Sensitive Information to an Unauthorized Actor in Apache CXF
Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory’ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX.
{'CVE-2020-1954'}
2022-03-03T05:12:58.995435Z
2022-02-10T22:38:50Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1954', 'http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2', 'https://security.netapp.com/advisory/ntap-20220210-0001/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-fg2v-w576-w4v3
Out of bounds read in json-smart
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.4.5 which causes a denial of service (DOS) via a crafted web request.
{'CVE-2021-31684'}
2022-03-25T21:30:21.800367Z
2022-02-10T22:46:22Z
HIGH
null
{'CWE-125', 'CWE-787'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netplex/json-smart-v1/pull/11', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31684', 'https://github.com/netplex/json-smart-v2/issues/67', 'https://github.com/netplex/json-smart-v2/pull/68', 'https://github.com/netplex/json-smart-v1', 'https://github.com/netplex/json-smart-v1/issues/10'}
null
Maven
GHSA-w29m-fjp4-qhmq
Unsafe Identifiers in Opencast
### Impact Opencast allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. ### Patches This issue is fixed in Opencast 7.6 and 8.1. ### Workarounds There is no workaround for this. ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5230'}
2022-03-03T05:13:16.934758Z
2020-01-30T21:21:50Z
MODERATE
null
{'CWE-99'}
{'https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5230', 'https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq'}
null
Maven
GHSA-jpj4-5xwp-cv23
Remote code execution in DolphinScheduler
In DolphinScheduler 1.2.0 and 1.2.1, with mysql connectorj a remote code execution vulnerability exists when choosing mysql as database.
{'CVE-2020-11974'}
2022-03-03T05:13:40.073137Z
2022-02-09T22:44:54Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r33452d7b99a293bcf8f3e4bd664943847e2602e03a9e45d09d3f508a@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r9fbe24539a873032b3e41243d44a730d6a2aae26335ac1e3271ea47d@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/rcbe4c248ef0c566e99fd19388a6c92aeef88167286546b675e9b1769%40%3Cdev.dolphinscheduler.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11974', 'https://lists.apache.org/thread.html/ra81adacbfdd6f166f9cf155340674ffd4179386b8b75068639547c11@%3Ccommits.dolphinscheduler.apache.org%3E'}
null
Maven
GHSA-3w5h-x4rh-hc28
Exposure of sensitive information in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
{'CVE-2021-39231'}
2021-11-22T18:38:38Z
2021-11-23T18:18:25Z
CRITICAL
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39231', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/2'}
null
Maven
GHSA-v9mf-jgq3-c28h
Data Amplification in Play Framework
An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.
{'CVE-2020-28923'}
2021-04-09T22:29:34Z
2022-02-09T22:54:21Z
LOW
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28923', 'https://www.playframework.com/security/vulnerability/CVE-2020-28923-ImproperRemovalofSensitiveInformationBeforeStorageorTransfer', 'https://www.playframework.com/security/vulnerability'}
null
Maven
GHSA-h353-hc43-95vc
Script injection without script or programming rights through Gadget titles
### Impact A user without Script or Programming right is able to execute script requiring privileges by editing gadget titles in the dashboard. ### Patches The issue has been patched in XWiki 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for this issue, it is recommended to upgrade XWiki. ### References https://jira.xwiki.org/browse/XWIKI-17794 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki security mailing-list](mailto:security@xwiki.org)
{'CVE-2021-32621'}
2022-03-03T05:14:13.346640Z
2021-05-18T18:36:16Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32621', 'https://jira.xwiki.org/browse/XWIKI-17794', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h353-hc43-95vc', 'https://jay-from-future.github.io/cve/2021/06/17/xwiki-rce-cve.html', 'https://github.com/xwiki/xwiki-platform/commit/bb7068bd911f91e5511f3cfb03276c7ac81100bc'}
null
Maven
GHSA-mhx2-r3jx-g94c
Moderate severity vulnerability that affects org.apache.camel:camel-core
Multiple XML external entity (XXE) vulnerabilities in builder/xml/XPathBuilder.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allow remote attackers to read arbitrary files via an external entity in an invalid XML (1) String or (2) GenericFile object in an XPath query.
{'CVE-2015-0264'}
2022-03-03T05:13:53.263833Z
2018-10-16T23:09:15Z
MODERATE
null
null
{'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=1df559649a96a1ca0368373387e542f46e4820da', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'https://github.com/advisories/GHSA-mhx2-r3jx-g94c', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'http://securitytracker.com/id/1032442', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0264', 'https://camel.apache.org/security-advisories.data/CVE-2015-0264.txt.asc'}
null
Maven
GHSA-w285-wf9q-5w69
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000352'}
2022-04-27T13:45:07.939306Z
2018-10-17T16:27:38Z
HIGH
null
{'CWE-326'}
{'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://github.com/advisories/GHSA-w285-wf9q-5w69', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000352', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-6pmv-7pr9-cgrj
Predictable password in Keycloak
A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.
{'CVE-2020-1731'}
2022-03-03T05:13:48.959507Z
2020-04-15T21:09:27Z
CRITICAL
null
{'CWE-330', 'CWE-341'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1731'}
null
Maven
GHSA-m5wp-p3gj-7q5g
Missing Authorization in Jenkins dbCharts Plugin
A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials.
{'CVE-2022-25206'}
2022-02-24T17:37:00Z
2022-02-16T00:01:16Z
HIGH
null
{'CWE-862'}
{'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25206', 'https://github.com/jenkinsci/dbCharts-plugin'}
null
Maven
GHSA-mx3x-rmrh-9wf6
SQL injection in net.mingsoft:ms-mcms
Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability via /cms/content/list.
{'CVE-2022-26585'}
2022-04-07T15:46:51.631471Z
2022-04-06T00:01:35Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26585', 'https://gitee.com/mingSoft/MCMS/issues/I4W1S9'}
null
Maven
GHSA-mmf6-6597-3v6m
Open Redirect in Spring Security OAuth
Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.
{'CVE-2019-11269'}
2022-03-03T05:13:26.501926Z
2019-06-13T20:18:28Z
MODERATE
null
{'CWE-601'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://pivotal.io/security/cve-2019-11269', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11269', 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html'}
null
Maven
GHSA-7c2r-3jqf-c9rw
Moderate severity vulnerability that affects com.fasterxml.jackson.dataformat:jackson-dataformat-xml
XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.
{'CVE-2016-7051'}
2022-03-03T05:14:12.851105Z
2018-10-18T17:43:28Z
HIGH
null
{'CWE-918', 'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-7051', 'https://github.com/advisories/GHSA-7c2r-3jqf-c9rw', 'http://www.securityfocus.com/bid/97688', 'https://bugzilla.redhat.com/show_bug.cgi?id=1378673', 'https://github.com/FasterXML/jackson-dataformat-xml/issues/211', 'https://github.com/FasterXML/jackson-dataformat-xml'}
null
Maven
GHSA-xvch-r4wf-h8w9
Moderate severity vulnerability that affects org.apache.qpid:proton-j
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.
{'CVE-2018-17187'}
2022-03-03T05:11:00.710275Z
2018-11-21T22:22:21Z
HIGH
null
{'CWE-295'}
{'http://www.securityfocus.com/bid/105935', 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187', 'https://issues.apache.org/jira/browse/PROTON-1962', 'https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E', 'https://qpid.apache.org/cves/CVE-2018-17187.html'}
null
Maven
GHSA-4x49-w62v-76q7
Path Traversal in Spring Cloud Config
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
{'CVE-2019-3799'}
2022-04-21T18:16:55.203097Z
2019-05-23T08:39:23Z
MODERATE
null
{'CWE-22'}
{'https://github.com/mpgn/CVE-2019-3799', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3799', 'https://pivotal.io/security/cve-2019-3799', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-3x9f-74h4-2fqr
Denial of Service in SheetJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).
{'CVE-2021-32012'}
2022-03-03T05:14:20.253129Z
2021-07-22T19:48:17Z
MODERATE
null
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://sheetjs.com/pro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32012'}
null
Maven
GHSA-rv39-3qh7-9v7w
Improper Input Validation in Spring Framework
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
{'CVE-2020-5421'}
2022-04-22T17:30:22.587686Z
2021-04-30T17:29:51Z
MODERATE
null
{'CWE-35'}
{'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2020-5421', 'https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421', 'https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074@%3Cdev.hive.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210513-0009/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb@%3Cuser.ignite.apache.org%3E'}
null
Maven
GHSA-5q99-f34m-67gc
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
{'CVE-2018-11784'}
2022-03-03T05:14:14.032298Z
2018-10-17T16:31:02Z
MODERATE
null
{'CWE-601'}
{'https://seclists.org/bugtraq/2019/Dec/43', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html', 'https://usn.ubuntu.com/3787-1/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/advisories/GHSA-5q99-f34m-67gc', 'https://www.debian.org/security/2019/dsa-4596', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11784', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/105524', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0002/', 'https://access.redhat.com/errata/RHSA-2019:0131', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:0485', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0130', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/'}
null
Maven
GHSA-2rmm-87v7-34rj
Improper Restriction of XML External Entity Reference in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7.
{'CVE-2022-25312'}
2022-03-15T21:45:05.770948Z
2022-03-06T00:00:17Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/apache/any23', 'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23', 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312', 'http://www.openwall.com/lists/oss-security/2022/03/04/2'}
null
Maven
GHSA-jj4f-p7vv-j4v9
Arbitrary code execution in Apache Druid
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
{'CVE-2021-26919'}
2022-03-03T05:14:09.525699Z
2021-06-16T17:51:58Z
HIGH
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/rf3ea2a4018e87e6c45d36cf8479af7727dcc276edabd2f7cf59e0c5f@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re0910cf4c784897774427fecd95912fb565a6bd06d924a55e70bbbfc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra85fa7d31f9bec1148ffd2e4030934927caa8bff89bca9f61f75e697@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E', 'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678', 'https://lists.apache.org/thread.html/r6bc68264170046448f823d12c17fd1fd875251d97d60869f58709872@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/releases/tag/druid-0.20.2', 'https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r470f8c92eb5df45f41b3ae609b6315b6c5ff51b3ceb2f09f00ca620f@%3Cdev.druid.apache.org%3E'}
null
Maven
GHSA-q4hm-fwc9-hmv6
Insecure temporary file used in com.squareup:connect
This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version.
{'CVE-2021-23331'}
2022-04-18T22:01:58.143908Z
2021-06-16T17:53:20Z
LOW
null
{'CWE-377'}
{'https://github.com/square/connect-java-sdk', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23331', 'https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613', 'https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988'}
null
Maven
GHSA-f6jp-j6w3-w9hm
Improper Authentication in Apache Shiro
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
{'CVE-2021-41303'}
2022-03-03T05:11:12.711004Z
2021-09-20T20:18:11Z
MODERATE
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41303', 'https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E'}
null
Maven
GHSA-vfqx-33qm-g869
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.
{'CVE-2020-36189'}
2022-04-22T18:30:25.049537Z
2021-12-09T19:16:59Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36189', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/FasterXML/jackson-databind/issues/2996', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-64gv-3pqv-299h
Exposure of Sensitive Information to an Unauthorized Actor in Apache Wicket
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
{'CVE-2020-11976'}
2022-03-03T05:13:55.438484Z
2021-05-07T15:54:15Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11976', 'https://lists.apache.org/thread.html/r05340178680eb6b9d4d40d56b5621dd4ae9715e6f41f12ae2288ec49@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r982c626dbce5c995223c4a6ddd7685de3592f8d65ba8372da1f3ce19@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r104eeefeb1e9da51f7ef79cef0f9ff12e21ef8559b77801e86b21e16%40%3Cusers.wicket.apache.org%3E', 'https://lists.apache.org/thread.html/rd0f36b83cc9f28b016ec552f023fb5a59a9ea8db56f2b9dcc6a2f6b7@%3Ccommits.directory.apache.org%3E', 'https://lists.apache.org/thread.html/reb7ea8141c713b5b19eaf34c00f43aaebf5a1c116130f763c42bdad1@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rdec0a43afdca59c10416889e07267f3d2fdf4ab929a6e22a2659b6ff@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rd26cae6e30b205e09e4b511d3d962d4f677c0c604f737997ce1b2f22@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/re4af65851bf69605cfb68be215eba36d4cdc1a90b95fbc894799d923@%3Cdev.directory.apache.org%3E'}
null
Maven
GHSA-2vgm-wxr3-6w2j
Authentication bypass in Apache Shiro
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
{'CVE-2020-13933'}
2022-04-01T20:31:55.916492Z
2021-05-07T15:54:23Z
HIGH
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/r4506cedc401d6b8de83787f8436aac83956e411d66848c84785db46d@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://lists.apache.org/thread.html/rb5edf49cd1451475dbcf53826ba6ef1bb7872dd6493d6112eb0c2bad@%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/r8097b81905f2a113ebdf925bcbc6d8c9d6863c807c9ee42e1e7c9293@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r18b45d560d76c4260813c802771cc9678aa651fb8340e09366bfa198@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6ea0224c1971a91dc6ade1f22508119a9c3bd56cef656f0c44bbfabb@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13933', 'https://lists.apache.org/thread.html/r9ea6d8560d6354d41433ad006069904f0ed083527aa348b5999261a7@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r4c1e1249e9e1acb868db0c80728c13f448d07333da06a0f1603c0a33@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'}
null
Maven
GHSA-q77q-vx4q-xx6q
Cross-site Scripting in org.owasp.esapi:esapi
### Impact There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details. ### Patches Patched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below. ### Workarounds Manually edit your **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression as per remediation instructions in the reference below. ### References [Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf) ### For more information If you have any questions or comments about this advisory: * Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders". * Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
{'CVE-2022-24891'}
2022-04-28T20:15:07.666289Z
2022-04-27T21:09:46Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf', 'https://github.com/ESAPI/esapi-java-legacy', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'}
null
Maven
GHSA-3qp6-m7hp-jrwf
Cross-site Scripting in Apache Pluto
The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
{'CVE-2021-36739'}
2022-03-03T05:12:47.615006Z
2022-01-08T00:46:21Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36739', 'https://github.com/apache/portals-pluto'}
null
Maven
GHSA-gfhx-jjwq-63gv
Cross-site Scripting in Apereo CAS
Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.
{'CVE-2021-42567'}
2022-03-03T05:14:04.852764Z
2021-12-10T20:24:11Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42567', 'https://github.com/apereo/cas', 'https://github.com/apereo/cas/releases', 'https://apereo.github.io/2021/10/18/restvuln/'}
null
Maven
GHSA-2pqj-h3vj-pqgw
Cross-Site Scripting in jquery
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution. ## Proof of Concept ``` $("#log").html( $("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html() ); ``` ## Recommendation Update to version 1.9.0 or later.
{'CVE-2012-6708'}
2022-03-03T05:13:33.982770Z
2020-09-01T16:41:46Z
HIGH
null
{'CWE-64', 'CWE-79'}
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://bugs.jquery.com/ticket/11290', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6708', 'https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0', 'https://bugs.jquery.com/ticket/9521', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'http://www.securityfocus.com/bid/102792', 'https://bugs.jquery.com/ticket/12531', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16011', 'https://bugs.jquery.com/ticket/6429', 'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://snyk.io/vuln/npm:jquery:20120206', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.npmjs.com/advisories/329'}
null
Maven
GHSA-cggj-fvv3-cqwv
FasterXML jackson-databind allows unauthenticated remote code execution
FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
{'CVE-2018-7489'}
2022-04-26T19:00:07.317970Z
2018-10-16T17:45:18Z
CRITICAL
null
{'CWE-502', 'CWE-184'}
{'https://access.redhat.com/errata/RHSA-2018:2089', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'http://www.securitytracker.com/id/1040693', 'https://access.redhat.com/errata/RHSA-2018:1448', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.securitytracker.com/id/1041890', 'https://access.redhat.com/errata/RHSA-2018:2090', 'https://access.redhat.com/errata/RHSA-2018:2938', 'https://access.redhat.com/errata/RHSA-2018:1786', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://www.debian.org/security/2018/dsa-4190', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/103203', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2018:2088', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/advisories/GHSA-cggj-fvv3-cqwv', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://github.com/FasterXML/jackson-databind/issues/1931', 'https://security.netapp.com/advisory/ntap-20180328-0001/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7489'}
null
Maven
GHSA-cj6j-32rg-45r2
Cross-site Scripting in JSPWiki
A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
{'CVE-2019-10077'}
2022-03-03T05:14:11.027936Z
2019-06-06T15:29:25Z
MODERATE
null
{'CWE-79'}
{'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10077'}
null
Maven
GHSA-q62h-jw38-24vh
Uncaught Exception in zip4j
zip4j up to 2.9.1 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
{'CVE-2022-24615'}
2022-04-15T17:00:08.884506Z
2022-02-25T00:01:04Z
MODERATE
null
{'CWE-755', 'CWE-248'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24615', 'https://github.com/srikanth-lingala/zip4j/issues/418', 'https://github.com/srikanth-lingala/zip4j/issues/377', 'https://github.com/srikanth-lingala/zip4j'}
null
Maven
GHSA-jwhm-9cjm-4493
Cross-site Scripting in Jenkins Dashboard View Plugin
Jenkins Dashboard View Plugin 2.15 and earlier does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
{'CVE-2021-21649'}
2021-05-19T19:16:07Z
2021-06-16T17:24:41Z
MODERATE
null
{'CWE-79'}
{'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21649'}
null
Maven
GHSA-43gc-mjxg-gvrq
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21350](https://x-stream.github.io/CVE-2021-21350.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21350'}
2022-03-03T05:13:18.748601Z
2021-03-22T23:29:28Z
MODERATE
null
{'CWE-502', 'CWE-434'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21350', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq', 'https://www.debian.org/security/2021/dsa-5004', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-21350.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}
null
Maven
GHSA-75p6-52g3-rqc8
Privilege escalation vulnerability on Token Exchange feature
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
{'CVE-2022-1245'}
2022-05-02T20:02:19.743635Z
2022-04-26T21:21:00Z
MODERATE
null
{'CWE-284'}
{'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak'}
null
Maven
GHSA-mg53-xr8m-86hw
Open Redirect in Liferay Portal
The redirect module in Liferay Portal before 7.3.3 does not limit the number of URLs resulting in a 404 error that is recorded, which allows remote attackers to perform a denial of service attack by making repeated requests for pages that do not exist.
{'CVE-2020-24554'}
2022-03-03T05:13:03.098198Z
2021-05-07T15:54:54Z
HIGH
null
{'CWE-601'}
{'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784956', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24554', 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}
null
Maven
GHSA-378p-hrq3-x4p3
Cross-site scripting in Shopizer
A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.
{'CVE-2021-33562'}
2022-03-03T05:13:53.531451Z
2021-06-08T23:08:20Z
MODERATE
null
{'CWE-79'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33562', 'https://www.exploit-db.com/exploits/49901'}
null
Maven
GHSA-g37q-26qx-8v2m
Denial of service in Apache OpenMeetings
Attackers can use public NetTest web service of Apache OpenMeetings 4.0.0-5.0.0 to organize denial of service attack.
{'CVE-2020-13951'}
2022-03-03T05:13:24.463779Z
2022-02-10T20:36:45Z
HIGH
null
{'CWE-400'}
{'https://lists.apache.org/thread.html/re2aed827cd24ae73cbc320e5808020c8d12c7b687ee861b27d728bbc%40%3Cuser.openmeetings.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13951', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html'}
null
Maven
GHSA-35fg-hjcr-j65f
Information exposure in xwiki-platform
### Impact It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. ### Patches The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. ### Workarounds There's no easy workaround other than applying the upgrade. ### References https://jira.xwiki.org/browse/XWIKI-18787 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security Mailing list](mailto:security@xwiki.org)
{'CVE-2022-23619'}
2022-02-09T21:51:19Z
2022-02-09T21:51:19Z
MODERATE
null
{'CWE-200', 'CWE-640'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f', 'https://jira.xwiki.org/browse/XWIKI-18787', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619'}
null
Maven
GHSA-wjxj-f8rg-99wx
Moderate severity vulnerability that affects org.apache.thrift:libthrift
Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.
{'CVE-2018-1320'}
2022-04-01T18:17:01.481761Z
2019-01-17T13:56:40Z
HIGH
null
{'CWE-20', 'CWE-295'}
{'https://github.com/apache/thrift', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://support.f5.com/csp/article/K36361684', 'https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E', 'https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2413', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320', 'https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E', 'https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/07/24/3', 'https://github.com/advisories/GHSA-wjxj-f8rg-99wx', 'https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html', 'https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E', 'http://www.securityfocus.com/bid/106551', 'https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E'}
null
Maven
GHSA-cqqj-4p63-rrmm
HTTP Request Smuggling in Netty
HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
{'CVE-2019-20444'}
2022-03-03T05:14:19.209039Z
2020-02-21T18:55:24Z
CRITICAL
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r91e0fa345c86c128b75a4a791b4b503b53173ff4c13049ac7129d319@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://github.com/netty/netty', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/netty/netty/issues/9866', 'https://lists.apache.org/thread.html/r4c675b2d0cc2a5e506b11ee10d60a378859ee340aca052e4c7ef4749@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20444', 'https://github.com/netty/netty/pull/9871', 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r34912a9b1a5c269a77b8be94ef6fb6d1e9b3c69129719dc00f01cf0b@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r0f5e72d5f69b4720dfe64fcbc2da9afae949ed1e9cbffa84bb7d92d7@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://lists.apache.org/thread.html/r059b042bca47be53ff8a51fd04d95eb01bb683f1afa209db136e8cb7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://lists.apache.org/thread.html/r489886fe72a98768eed665474cba13bad8d6fe0654f24987706636c5@%3Cdev.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0601'}
null
Maven
GHSA-mcfm-h73v-635m
High severity vulnerability that affects io.undertow:undertow-core
It was discovered in Undertow that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other than their own.
{'CVE-2017-2666'}
2022-03-03T05:13:51.913561Z
2018-10-19T16:55:14Z
MODERATE
null
{'CWE-444'}
{'https://github.com/advisories/GHSA-mcfm-h73v-635m', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2666'}
null
Maven
GHSA-r695-7vr9-jgc2
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.
{'CVE-2020-36187'}
2022-04-22T18:30:55.315347Z
2021-12-09T19:16:51Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2997', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36187'}
null
Maven
GHSA-cghx-9gcr-r42x
Path Traversal in the Java Kubernetes Client
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code.
{'CVE-2020-8570'}
2022-03-03T05:13:41.235117Z
2021-01-29T18:12:54Z
MODERATE
null
{'CWE-22'}
{'https://github.com/kubernetes-client/java/issues/1491', 'https://lists.apache.org/thread.html/r1975078e44d96f2a199aa90aa874b57a202eaf7f25f2fde6d1c44942@%3Ccommits.druid.apache.org%3E', 'https://github.com/kubernetes-client/java/commit/858316ae8bc1145005a0310e1f65f95d2389a589', 'https://lists.apache.org/thread.html/r0c76b3d0be348f788cd947054141de0229af00c540564711e828fd40@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdb223e1b82e3d7d8e4eaddce8dd1ab87252e3935cc41c859f49767b6@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8570', 'https://lists.apache.org/thread.html/rcafa485d63550657f068775801aeb706b7a07140a8ebbdef822b3bb3@%3Ccommits.druid.apache.org%3E', 'https://github.com/kubernetes-client/java/pull/1450', 'https://groups.google.com/g/kubernetes-security-announce/c/sd5h73sFPrg'}
null
Maven
GHSA-5ww9-j83m-q7qx
Information exposure in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.
{'CVE-2019-12086'}
2022-04-21T18:03:51.397873Z
2019-05-23T09:32:24Z
HIGH
null
{'CWE-502'}
{'http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12086', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2326', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b9604c1b8d806dccbad2@%3Creviews.spark.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:2858', 'http://www.securityfocus.com/bid/109227', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://www.debian.org/security/2019/dsa-4452'}
null
Maven
GHSA-7rpj-hg47-cx62
Improper Restriction of XML External Entity Reference in com.h2database:h2.
H2 is an embeddable RDBMS written in Java. The package com.h2database:h2 from 0 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
{'CVE-2021-23463'}
2022-04-22T15:47:00.309584Z
2021-12-16T14:29:57Z
HIGH
null
{'CWE-611'}
{'https://github.com/h2database/h2database/issues/3195', 'https://github.com/h2database/h2database/pull/3199', 'https://github.com/h2database/h2database/', 'https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3', 'https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23463'}
null
Maven
GHSA-mph4-vhrx-mv67
Deserialization of Untrusted Data in FasterXML jackson-databind
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
{'CVE-2019-12384'}
2022-03-03T05:13:32.761888Z
2019-07-05T21:07:27Z
MODERATE
null
{'CWE-502'}
{'https://doyensec.com/research.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12384', 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://access.redhat.com/errata/RHSA-2019:3297', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190703-0002/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2019:3292', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://blog.doyensec.com/2019/07/22/jackson-gadgets.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1820', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/', 'https://access.redhat.com/errata/RHSA-2019:2720', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2936'}
null
Maven
GHSA-44qp-qhfv-c7f6
Improper Handling of Exceptional Conditions in Apache Tomcat
A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
{'CVE-2021-30639'}
2022-03-03T05:13:06.694366Z
2021-08-13T15:21:02Z
HIGH
null
{'CWE-755'}
{'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30639', 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cdev.tomcat.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366', 'https://lists.apache.org/thread.html/rd84fae1f474597bdf358f5bdc0a5c453c507bd527b83e8be6b5ea3f4%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r79a7c019712b39aedf7cf4da9276d80610f04441b2a4f6506cb2daaf@%3Cusers.tomcat.apache.org%3E'}
null
Maven
GHSA-vw83-h3mq-3qwj
Path Traversal in Spring-integration-zip
Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.
{'CVE-2021-22114'}
2022-03-18T17:45:09.697711Z
2022-03-18T17:40:44Z
MODERATE
null
{'CWE-22'}
{'https://tanzu.vmware.com/security/cve-2021-22114', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22114'}
null
Maven
GHSA-8rf5-92jh-3vc9
Uncaught Exception leading to Denial of Service in json-sanitizer
OWASP json-sanitizer before 1.2.2 can output invalid JSON or throw an undeclared exception for crafted input. This may lead to denial of service if the application is not prepared to handle these situations.
{'CVE-2021-23900'}
2022-03-03T05:12:57.380645Z
2021-05-13T22:31:32Z
HIGH
null
{'CWE-248'}
{'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23900', 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
null
Maven
GHSA-6x3v-rw2q-9gx7
Improper implementation of the session fixation protection in Infinispan
A flaw was found in Infinispan through version 9.4.14.Final. An improper implementation of the session fixation protection in the Spring Session integration can result in incorrect session handling.
{'CVE-2019-10158'}
2022-03-03T05:12:57.542880Z
2020-01-21T21:18:44Z
CRITICAL
null
{'CWE-384'}
{'https://github.com/infinispan/infinispan/pull/7025', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10158', 'https://github.com/infinispan/infinispan/commit/4b381c5910265972ccaabefbdbd16a2b929f6b72', 'https://github.com/infinispan/infinispan/pull/6960', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10158'}
null
Maven
GHSA-3264-3fm9-fg44
Infinite Loop in Apache Tika
A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23.
{'CVE-2020-1951'}
2022-03-03T05:13:35.022893Z
2021-05-07T15:54:00Z
MODERATE
null
{'CWE-835'}
{'https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://usn.ubuntu.com/4564-1/', 'https://lists.apache.org/thread.html/rd8c1b42bd0e31870d804890b3f00b13d837c528f7ebaf77031323172%40%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1951', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-w6g3-v46q-5p28
Moderate severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 0.9 to 1.18, in a rare edge case where a user does not specify an extract directory on the commandline (--extract-dir=) and the input file has an embedded file with an absolute path, such as "C:/evil.bat", tika-app would overwrite that file.
{'CVE-2018-11762'}
2022-03-03T05:12:49.898946Z
2018-10-17T15:49:58Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-11762', 'https://github.com/advisories/GHSA-w6g3-v46q-5p28', 'http://www.securityfocus.com/bid/105515', 'https://lists.apache.org/thread.html/ab2e1af38975f5fc462ba89b517971ef892ec3d06bee12ea2258895b@%3Cdev.tika.apache.org%3E'}
null
Maven
GHSA-45r8-3495-x6rm
High severity vulnerability that affects com.hubspot.jinjava:jinjava
Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.
{'CVE-2018-18893'}
2022-03-03T05:13:06.572667Z
2019-01-04T17:43:36Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-45r8-3495-x6rm', 'https://github.com/HubSpot/jinjava/pull/230', 'https://github.com/HubSpot/jinjava', 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893'}
null
Maven
GHSA-95m6-mjh3-58gm
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
{'CVE-2016-8609'}
2022-03-03T05:14:20.549289Z
2018-10-18T16:48:41Z
HIGH
null
{'CWE-287', 'CWE-384'}
{'https://github.com/advisories/GHSA-95m6-mjh3-58gm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8609'}
null
Maven
GHSA-6vwp-35w3-xph8
Insecure Deserialization in Apache XML-RPC
An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.
{'CVE-2019-17570'}
2022-04-26T18:01:58.833049Z
2020-06-10T20:02:39Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00033.html', 'http://www.openwall.com/lists/oss-security/2020/01/24/2', 'https://www.debian.org/security/2020/dsa-4619', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17570', 'https://seclists.org/bugtraq/2020/Feb/8', 'https://usn.ubuntu.com/4496-1/', 'https://access.redhat.com/errata/RHSA-2020:0310', 'https://lists.apache.org/thread.html/846551673bbb7ec8d691008215384bcef03a3fb004d2da845cfe88ee%401390230951%40%3Cdev.ws.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3QCRLJYQRGVTIYF4BXYRFSF3ONP3TBF/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-17570;'}
null
Maven
GHSA-87p2-cvhq-q4mv
Authentication bypass in Apache Zeppelin
Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
{'CVE-2020-13929'}
2022-03-03T05:13:20.090625Z
2021-09-07T22:56:56Z
HIGH
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/r99529e175a7c1c9a26bd41a02802c8af7aa97319fe561874627eb999@%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/02/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13929', 'https://github.com/apache/zeppelin', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028@%3Cusers.zeppelin.apache.org%3E', 'https://lists.apache.org/thread.html/r768800925d6407a6a87ccae0ec98776b7bda50c0e3ed3d0130dad028%40%3Cusers.zeppelin.apache.org%3E'}
null
Maven
GHSA-27xj-rqx5-2255
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
{'CVE-2020-11619'}
2022-03-03T05:13:18.846013Z
2020-05-15T18:58:44Z
HIGH
null
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200511-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11619', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://github.com/FasterXML/jackson-databind/issues/2680', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-9699-gm7f-cmjv
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
{'CVE-2020-25724'}
2022-03-03T05:13:45.954066Z
2021-06-08T22:29:46Z
MODERATE
null
{'CWE-567'}
{'https://access.redhat.com/security/cve/cve-2020-25724', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25724', 'https://bugzilla.redhat.com/show_bug.cgi?id=1899354'}
null
Maven
GHSA-jc7r-v6fg-2gpf
High severity vulnerability that affects org.apache.cxf:apache-cxf, org.apache.cxf:apache-cxf , and org.apache.cxf:cxf
It is possible to configure Apache CXF to use the com.sun.net.ssl implementation via 'System.setProperty("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");'. When this system property is set, CXF uses some reflection to try to make the HostnameVerifier work with the old com.sun.net.ssl.HostnameVerifier interface. However, the default HostnameVerifier implementation in CXF does not implement the method in this interface, and an exception is thrown. However, in Apache CXF prior to 3.2.5 and 3.1.16 the exception is caught in the reflection code and not properly propagated. What this means is that if you are using the com.sun.net.ssl stack with CXF, an error with TLS hostname verification will not be thrown, leaving a CXF client subject to man-in-the-middle attacks.
{'CVE-2018-8039'}
2022-03-03T05:13:29.834590Z
2018-10-19T16:40:01Z
HIGH
null
{'CWE-755'}
{'https://access.redhat.com/errata/RHSA-2018:2277', 'https://access.redhat.com/errata/RHSA-2018:2279', 'https://github.com/advisories/GHSA-jc7r-v6fg-2gpf', 'http://cxf.apache.org/security-advisories.data/CVE-2018-8039.txt.asc?version=1&modificationDate=1530184663000&api=v2', 'https://github.com/apache/cxf', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2423', 'http://www.securityfocus.com/bid/106357', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'http://www.securitytracker.com/id/1041199', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8039', 'https://access.redhat.com/errata/RHSA-2018:3817', 'https://github.com/apache/cxf/commit/fae6fabf9bd7647f5e9cb68897a7d72b545b741b', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://lists.apache.org/thread.html/1f8ff31df204ad0374ab26ad333169e0387a5e7ec92422f337431866@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2276', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-c9x9-xv66-xp3v
Improper privilege management in Keycloak
A flaw was found in Keycloak, where it would permit a user with a view-profile role to manage the resources in the new account console. This flaw allows a user with a view-profile role to access and modify data for which the user does not have adequate permission.
{'CVE-2020-14389'}
2022-03-03T05:13:09.191324Z
2021-11-10T15:30:36Z
HIGH
null
{'CWE-269', 'CWE-916'}
{'https://access.redhat.com/security/cve/cve-2020-14389', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14389'}
null
Maven
GHSA-m6gg-86c6-gfr9
Cross-site Scripting in elasticsearch
A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary JavaScript to be executed in a victim’s browser.
{'CVE-2022-23710'}
2022-03-19T00:30:15.135234Z
2022-03-04T00:00:15Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23710', 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}
null
Maven
GHSA-25xc-jwfq-39jw
Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19
Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request. - https://vaadin.com/security/cve-2021-31407
{'CVE-2021-31407'}
2022-03-03T05:14:16.082084Z
2021-04-19T14:50:49Z
HIGH
null
{'CWE-402', 'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31407', 'https://github.com/vaadin/flow/pull/10269', 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw', 'https://github.com/vaadin/osgi/issues/50', 'https://vaadin.com/security/cve-2021-31407', 'https://github.com/vaadin/flow/pull/10229'}
null
Maven
GHSA-v662-xpcc-9xf6
It's possible to execute anything with the rights of the author of a macro which uses the {{wikimacrocontent}} macro
### Impact The `{{wikimacrocontent}}` executes the content with the rights of the wiki macro author instead of the caller of that wiki macro. This makes possible to inject scripts through it and they will be executed with the rights of the wiki macro (very often a user which has Programming rights). Fortunately, no such macro exists by default in XWiki Standard but one could have been created or installed with an extension. ### Patches It has been patched in versions XWiki 12.6.3, 11.10.11 and 12.8-rc-1. ### Workarounds There is no easy workaround other than disabling the affected macros. Inserting content in a safe way or knowing what is the user who called the wiki macro is not easy. ### References https://jira.xwiki.org/browse/XWIKI-17759 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2021-21379'}
2021-03-23T22:24:20Z
2021-03-23T22:47:26Z
LOW
null
{'CWE-281'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21379', 'https://jira.xwiki.org/browse/XWIKI-17759', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v662-xpcc-9xf6'}
null
Maven
GHSA-p43x-xfjf-5jhr
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
{'CVE-2020-9548'}
2022-03-03T05:13:37.352244Z
2020-05-15T18:59:01Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9548', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}
null
Maven
GHSA-vh5c-jqfg-mhrh
Cross-Site Request Forgery in xwiki-platform
### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Patches This issue has been patched in XWiki 12.10.5 and 13.2RC1. Two different patches are provided: - a first one to fix the CSRF problem - a more complex one that now relies on sending an email for the Forgot username process. ### Workarounds It's possible to fix the problem without uprading by editing the ForgotUsername page in version below 13.x, to use the following code: https://github.com/xwiki/xwiki-platform/blob/69548c0320cbd772540cf4668743e69f879812cf/xwiki-platform-core/xwiki-platform-administration/xwiki-platform-administration-ui/src/main/resources/XWiki/ForgotUsername.xml#L39-L123 In version after 13.x it's also possible to edit manually the forgotusername.vm file, but it's really encouraged to upgrade the version here. ### References * https://jira.xwiki.org/browse/XWIKI-18384 * https://jira.xwiki.org/browse/XWIKI-18408 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
{'CVE-2021-32732'}
2022-02-11T21:08:09Z
2022-02-10T22:42:46Z
HIGH
null
{'CWE-352'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh', 'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf', 'https://github.com/xwiki/xwiki-platform/', 'https://jira.xwiki.org/browse/XWIKI-18408', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732', 'https://jira.xwiki.org/browse/XWIKI-18384', 'https://github.com/xwiki/xwiki-platform/commit/f0440dfcbba705e03f7565cd88893dde57ca3fa8'}
null
Maven
GHSA-c2h6-7gm8-cv4w
XSS in MITREid Connect
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
{'CVE-2020-5497'}
2022-03-03T05:13:03.442823Z
2020-04-01T16:35:44Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1527', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5497', 'http://packetstormsecurity.com/files/156574/MITREid-1.3.3-Cross-Site-Scripting.html', 'http://seclists.org/fulldisclosure/2020/Feb/25', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1526', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521', 'https://www.securitymetrics.com/blog/MITREid-Connect-cross-site-scripting-CVE-2020-5497'}
null
Maven
GHSA-99qr-9cc9-fv2x
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop versions 2.6.1 to 2.6.5, 2.7.0 to 2.7.3, and 3.0.0-alpha1, if a file in an encryption zone with access permissions that make it world readable is localized via YARN's localization mechanism, that file will be stored in a world-readable location and can be shared freely with any application that requests to localize that file.
{'CVE-2017-3166'}
2022-03-03T05:13:34.305821Z
2018-12-21T17:50:03Z
MODERATE
null
{'CWE-732'}
{'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3166', 'https://github.com/advisories/GHSA-99qr-9cc9-fv2x', 'https://lists.apache.org/thread.html/2e16689b44bdd1976b6368c143a4017fc7159d1f2d02a5d54fe9310f@%3Cgeneral.hadoop.apache.org%3E'}
null
Maven
GHSA-rq96-qhc5-vm4r
Exposure of Sensitive Information to an Unauthorized Actor in Apache NiFi
In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.
{'CVE-2021-44145'}
2022-03-03T05:14:08.740533Z
2022-01-05T17:33:32Z
MODERATE
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2021/12/17/1', 'https://nifi.apache.org/security.html#1.15.1-vulnerabilities', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44145'}
null
Maven
GHSA-ghq2-m3pq-qf3p
Stored XSS in Jenkins CVS Plugin
Jenkins CVS Plugin 2.19 and earlier does not escape the name and description of CVS Symbolic Name parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29037'}
2022-05-03T21:07:01.626408Z
2022-04-13T00:00:18Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jenkinsci/cvs-plugin/commit/043ef8801a7b3fbbf778245c3c7174d21e42efe2', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29037', 'https://github.com/jenkinsci/cvs-plugin'}
null
Maven
GHSA-r679-m633-g7wc
Improper input validation in Apache Shiro
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
{'CVE-2019-12422'}
2022-03-03T05:12:42.260533Z
2020-02-04T22:36:36Z
MODERATE
null
null
{'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12422'}
null
Maven
GHSA-vq9j-jh62-5hmp
Apache Camel using an outdated vulnerable JSON-lib library
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.
{'CVE-2017-5643'}
2022-04-26T21:45:06.368581Z
2018-10-16T23:13:11Z
HIGH
null
{'CWE-918'}
{'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-vq9j-jh62-5hmp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5643', 'http://www.securityfocus.com/bid/97226', 'http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2'}
null
Maven
GHSA-hmq6-frv3-4727
High severity vulnerability that affects com.fasterxml.jackson.dataformat:jackson-dataformat-xml
XML external entity (XXE) vulnerability in XmlMapper in the Data format extension for Jackson (aka jackson-dataformat-xml) allows attackers to have unspecified impact via unknown vectors.
{'CVE-2016-3720'}
2022-03-03T05:13:37.602338Z
2018-10-18T17:43:16Z
CRITICAL
null
{'CWE-611'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184561.html', 'https://github.com/advisories/GHSA-hmq6-frv3-4727', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3720'}
null
Maven
GHSA-v62j-fcxq-j239
Stored XSS in Apache Atlas
Apache Atlas versions 0.8.3 and 1.1.0 were found vulnerable to Stored Cross-Site Scripting in the search functionality
{'CVE-2019-10070'}
2022-03-03T05:13:03.597517Z
2020-01-08T17:26:53Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/cc21437c4c5053a13e13332d614d5172f39da03491fe17ae260be221@%3Cdev.atlas.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10070'}
null
Maven
GHSA-f554-x222-wgf7
Command Injection in Xstream
Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
{'CVE-2013-7285'}
2022-04-26T21:00:20.777413Z
2019-05-29T18:05:03Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'http://seclists.org/oss-sec/2014/q1/69', 'https://x-stream.github.io/CVE-2013-7285.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7285', 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html', 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E', 'http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html', 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html'}
null
Maven
GHSA-mfwh-gqx8-c787
Allocation of Resources Without Limits or Throttling in Apache Tika
A carefully crafted or corrupt zip file can cause an OOM in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Users should upgrade to 1.22 or later.
{'CVE-2019-10088'}
2022-03-03T05:13:12.451486Z
2019-08-06T01:43:40Z
HIGH
null
{'CWE-770'}
{'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20190828-0004/', 'https://lists.apache.org/thread.html/1c63555609b737c20d1bbfa4a3e73ec488e3408a84e2f5e47e1b7e08@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10088', 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html'}
null
Maven
GHSA-53hp-jpwq-2jgq
Uncontrolled Resource Consumption in Apache Tomcat
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
{'CVE-2020-11996'}
2022-03-03T05:13:34.385245Z
2022-02-09T23:01:22Z
HIGH
null
{'CWE-400'}
{'https://lists.apache.org/thread.html/rb820f1a2a02bf07414be12c653c2ab5321fd87b9bf6c5e635c53ff4b@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rc80b96b4b96618b2b7461cb90664a428cfd6605eea9f74e51b792542@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ref0339792ac6dac1dba83c071a727ad72380899bde60f6aaad4031b9@%3Cnotifications.ofbiz.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00072.html', 'https://lists.apache.org/thread.html/rea65d6ef2e45dd1c45faae83922042732866c7b88fa109b76c83db52@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5a4f80a6acc6607d61dae424b643b594c6188dd4e1eff04705c10db2@%3Cnotifications.ofbiz.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200709-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r74f5a8204efe574cbfcd95b2a16236fe95beb45c4d9fee3dc789dca9@%3Ccommits.ofbiz.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00064.html', 'https://lists.apache.org/thread.html/r93ca628ef3a4530dfe5ac49fddc795f0920a4b2a408b57a30926a42b@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html', 'https://lists.apache.org/thread.html/r9ad911fe49450ed9405827af0e7a74104041081ff91864b1f2546bbd@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb4ee49ecc4c59620ffd5e66e84a17e526c2c3cfa95d0cd682d90d338@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5541ef6b6b68b49f76fc4c45695940116da2bcbe0312ef204a00a2e0%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8aeb22a9e807d6c13ca9c5dec72f872cd@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r8f3d416c193bc9384a8a7dd368623d441f5fcaff1057115008100561@%3Ccommits.ofbiz.apache.org%3E', 'https://usn.ubuntu.com/4596-1/', 'https://www.debian.org/security/2020/dsa-4727', 'https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6c29801370a36c1a5159679269777ad0c73276d3015b8bbefea66e5c@%3Cnotifications.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11996', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E'}
null
Maven
GHSA-hqqv-9x3v-mp7w
Privilege Escalation Flaw in Elasticsearch
The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
{'CVE-2020-7014'}
2022-03-03T05:14:15.061209Z
2021-03-18T19:27:20Z
MODERATE
null
{'CWE-269', 'CWE-266'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7014', 'https://www.elastic.co/community/security/', 'https://security.netapp.com/advisory/ntap-20200619-0003/'}
null
Maven
GHSA-xmw9-q7x9-j5qc
Unbounded connection acceptance leads to file handle exhaustion
### Impact All servers running blaze-core <= 0.14.14, including blaze-http and http4s-blaze-server users, are affected. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. ### Patches The issue is fixed in version 0.14.15 for `NIO1SocketServerGroup`. A `maxConnections` parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The `NIO2SocketServerGroup` has no such setting and is now deprecated. ### Workarounds * An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure. * A similar sidecar strategy is viable for other non-HTTP services running on blaze-core. * http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake. * http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. * http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s/blaze](http://github.com/http4s/blaze) * Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-21293'}
2022-03-03T05:09:41.293433Z
2021-02-02T21:42:49Z
HIGH
null
{'CWE-400'}
{'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21293', 'https://github.com/http4s/blaze/commit/4f786177f9fb71ab272f3a5f6c80bca3e5662aa1'}
null
Maven
GHSA-vwpg-f6gw-rjvf
Incorrect Authorization in Spring Cloud Netflix Zuul
Applications using the “Sensitive Headers” functionality in Spring Cloud Netflix Zuul 2.2.6.RELEASE and below may be vulnerable to bypassing the “Sensitive Headers” restriction when executing requests with specially constructed URLs. Applications that use Spring Security's StrictHttpFirewall (enabled by default for all URLs) are not affected by the vulnerability, as they reject requests that allow bypassing.
{'CVE-2021-22113'}
2022-03-03T05:12:50.802161Z
2021-05-10T15:18:50Z
MODERATE
null
{'CWE-863'}
{'https://tanzu.vmware.com/security/cve-2021-22113', 'https://github.com/spring-cloud/spring-cloud-netflix/commit/8ecb3dca511c3ce0454e42ac31ee2331d7318c07', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22113'}
null
Maven
GHSA-h77f-xxx7-4858
User impersonation due to incorrect handling of the login JWT
### Impact <!--_What kind of vulnerability is it? Who is impacted?_--> This allows anyone that can connect to the server to forge a LoginPacket with manipulated JWT token allowing impersonation as any Bedrock user. Unless credentials are saved in your configuration, online mode is not affected as users are still required to log in separately. If your credentials are saved, there is no risk of exposing your email or password. ### Patches <!--_Has the problem been patched? What versions should users upgrade to?_--> This was patched as part of https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6 and https://github.com/GeyserMC/Geyser/commit/ab2f5b326fe590e09167e8b45b4b165ac06ecd13. if your Geyser version is `1.4.2-SNAPSHOT` or later, the issue has been addressed on your build. ### Workarounds <!--_Is there a way for users to fix or remediate the vulnerability without upgrading?_--> Geyser strongly recommends updating to fix this issue. If this isn't possible: - Use online mode and don't save credentials in your Geyser configuration - Use an additional authentication method on the Java server ### References <!--_Are there any links users can visit to find out more?_--> This was disclosed to us by a staff member over at Hive; you can read their disclosure here: https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY ### For more information If you have any questions or comments about this advisory: * Come talk to us over on our [Discord](https://discord.gg/geysermc) server in the [#development](https://discord.com/channels/613163671870242838/613170125696270357) channel
{'CVE-2021-39177'}
2021-09-07T14:04:02Z
2021-09-07T23:04:04Z
HIGH
null
{'CWE-287'}
{'https://github.com/GeyserMC/Geyser', 'https://updates.playhive.com/weekend-maintenance-disclosure-2kJMaY', 'https://github.com/GeyserMC/Geyser/security/advisories/GHSA-h77f-xxx7-4858', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39177', 'https://github.com/GeyserMC/Geyser/commit/b9541505af68ac7b7c093206ac7b1ba88957a5a6'}
null
Maven
GHSA-793h-6f7r-6qvm
Authenticated users can read data from other sources than intended
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource.
{'CVE-2021-26920'}
2022-03-03T05:13:06.462366Z
2021-08-13T15:21:50Z
MODERATE
null
{'CWE-863'}
{'https://lists.apache.org/thread.html/r61aab724cf97d80da7f02d50e9af6de5c7c40dd92dab7518746fbaa2@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26920', 'http://www.openwall.com/lists/oss-security/2021/07/02/1', 'http://www.openwall.com/lists/oss-security/2021/09/24/1', 'https://lists.apache.org/thread.html/r29e45561343cc5cf7d3290ee0b0e94e565faab19c20d022df9b5e29c%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r304dfe56a5dfe1b2d9166b24d2c74ad1c6730338b20aef77a00ed2be@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc9400a70d0ec5cdb8a3486fc5ddb0b5282961c0b63e764abfbcb9f5d@%3Cdev.druid.apache.org%3E'}
null
Maven
GHSA-xhv5-w9c5-2r2w
Unbounded connection acceptance in http4s-blaze-server
### Impact blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. http4s provides a general `MaxActiveRequests` middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. ### Patches In 0.21.18, 0.22.0-M3, and 1.0.0-M16, a new`maxConnections` property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended. The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22. The connections are bounded in 0.21.17, 0.22.0-M2, and 1.0.0-M14, but the `maxConnections` parameter was passed incorrectly, making it impossible to change the Blaze default of 512. ### Workarounds * An Nginx side-car acting as a reverse proxy for the local http4s-blaze-server instance would be able to apply a connection limiting semantic before the sockets reach blaze-core. Nginx’s connection bounding is both asynchronous and properly respects backpressure. * http4s-ember-server is an alternative to http4s-blaze-server, but does not yet have HTTP/2 or web socket support. Its performance in terms of RPS is appreciably behind Blaze’s, and as the newest backend, has substantially less industrial uptake. * http4s-jetty is an alternative to http4s-blaze-server, but does not yet have web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. * http4s-tomcat is an alternative to http4s-blaze-server, but does not yet have HTTP/2 web socket support. Its performance in terms of requests per second is somewhat behind Blaze’s, and despite Jetty's industrial adoption, the http4s integration has substantially less industrial uptake. ### References See [the Blaze GHSA](https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc) for more on the underlying issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [http4s/http4s](http://github.com/http4s/http4s) * Contact us according to the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-21294'}
2022-03-03T05:13:53.464823Z
2021-02-02T21:42:56Z
HIGH
null
{'CWE-400'}
{'https://github.com/http4s/blaze/security/advisories/GHSA-xmw9-q7x9-j5qc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21294', 'https://github.com/http4s/http4s/commit/987d6589ef79545b9bb2324ac4bdebf82d9a0171', 'https://github.com/http4s/http4s/security/advisories/GHSA-xhv5-w9c5-2r2w'}
null
Maven
GHSA-hph2-m3g5-xxv4
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39151](https://x-stream.github.io/CVE-2021-39151.html). ### Credits Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39151'}
2022-04-22T15:47:17.262435Z
2021-08-25T14:47:09Z
HIGH
null
{'CWE-502', 'CWE-434'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39151', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream', 'https://x-stream.github.io/CVE-2021-39151.html'}
null
Maven
GHSA-jj9h-mwhq-8vhm
Moderate severity vulnerability that affects org.apache.qpid:qpid-broker
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
{'CVE-2016-3094'}
2022-03-03T05:12:58.048809Z
2018-10-16T19:50:13Z
MODERATE
null
{'CWE-287', 'CWE-20'}
{'http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3094', 'https://svn.apache.org/viewvc?view=revision&revision=1744403', 'http://www.securityfocus.com/archive/1/538507/100/0/threaded', 'http://www.securitytracker.com/id/1035982', 'https://issues.apache.org/jira/browse/QPID-7271', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E', 'http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html', 'https://github.com/advisories/GHSA-jj9h-mwhq-8vhm'}
null
Maven
GHSA-4rm3-4mq4-mfwr
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.
{'CVE-2018-20595'}
2022-03-03T05:13:34.121093Z
2019-01-04T17:43:22Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20595', 'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2', 'https://github.com/hs-web/hsweb-framework'}
null
Maven
GHSA-rf6r-2c4q-2vwg
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
{'CVE-2020-10968'}
2022-03-03T05:14:04.326851Z
2020-05-15T18:58:54Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2662', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10968', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://github.com/FasterXML/jackson-databind/', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-5vcm-3xc3-w7x3
Response Splitting from unsanitized headers
### Impact http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: * Header names (`Header.name`å * Header values (`Header.value`) * Status reason phrases (`Status.reason`) * URI paths (`Uri.Path`) * URI authority registered names (`URI.RegName`) (through 0.21) The following backends render invalid carriage return, newline, or null characters in an unsafe fashion. | | blaze-server | ember-server | blaze-client | ember-client | jetty-client | |:---------------|:-------------|:-------------|:-------------|--------------|--------------| | header names | ⚠ | ⚠ | ⚠ | ⚠ | ⚠ | | header values | ⚠ | ⚠ | ⚠ | ⚠ | | | status reasons | ⚠ | ⚠ | | | | | URI paths | | | ⚠ | ⚠ | | | URI regnames | | | ⚠ < 0.22 | ⚠ < 0.22 | | For example, given the following service: ```scala import cats.effect._ import org.http4s._ import org.http4s.dsl.io._ import org.http4s.server.blaze.BlazeServerBuilder import scala.concurrent.ExecutionContext.global object ResponseSplit extends IOApp { override def run(args: List[String]): IO[ExitCode] = BlazeServerBuilder[IO](global) .bindHttp(8080) .withHttpApp(httpApp) .resource .use(_ => IO.never) val httpApp: HttpApp[IO] = HttpApp[IO] { req => req.params.get("author") match { case Some(author) => Ok("The real content") .map(_.putHeaders(Header("Set-Cookie", s"author=${author}"))) case None => BadRequest("No author parameter") } } } ``` A clean `author` parameter returns a clean response: ```sh curl -i 'http://localhost:8080/?author=Ross' ``` ```http HTTP/1.1 200 OK Content-Type: text/plain; charset=UTF-8 Set-Cookie: author=Ross Date: Mon, 20 Sep 2021 04:12:10 GMT Content-Length: 16 The real content ``` A malicious `author` parameter allows a user-agent to hijack the response from our server and return different content: ```sh curl -i 'http://localhost:8080/?author=hax0r%0d%0aContent-Length:+13%0d%0a%0aI+hacked+you' ``` ```http HTTP/1.1 200 OK Content-Type: text/plain; charset=UTF-8 Set-Cookie: author=hax0r Content-Length: 13 I hacked you ``` ### Patches Versions 0.21.29, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following: * If a status reasoon phrase is invalid, it is dropped. Rendering is optional per spec. * If a header name is invalid in a request or response, the header is dropped. There is no way to generically sanitize a header without potentially shadowing a correct one. * If a header value is invalid in a request or response, it is sanitized by replacing null (`\u0000`), carriage return (`\r`), and newline (`\n`) with space (` `) characters per spec. * If a URI path or registered name is invalid in a request line, the client raises an `IllegalArgumentException`. * If a URI registered name is invalid in a host header, the client raises an `IllegalArgumentException`. ### Workarounds http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening. Not all backends were affected: jetty-server, tomcat-server, armeria, and netty on the server; async-http-client, okhttp-client, armeria, and netty as clients. ### References * https://owasp.org/www-community/attacks/HTTP_Response_Splitting * https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](http://github.com/http4s/http4s) * Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-41084'}
2021-10-21T14:31:24Z
2021-09-22T19:18:41Z
HIGH
null
{'CWE-918'}
{'https://github.com/http4s/http4s/commit/d02007db1da4f8f3df2dbf11f1db9ac7afc3f9d8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41084', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/http4s/http4s/security/advisories/GHSA-5vcm-3xc3-w7x3', 'https://github.com/http4s/http4s', 'https://httpwg.org/http-core/draft-ietf-httpbis-semantics-latest.html#fields.values'}
null