ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-rxjp-mfm9-w4wr
Path Traversal in Django
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
{'CVE-2021-31542'}
2022-02-14T22:15:39Z
2021-06-04T21:15:56Z
HIGH
7.5
{'CWE-434', 'CWE-22'}
{'https://www.djangoproject.com/weblog/2021/may/04/security-releases/', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31542', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/', 'https://security.netapp.com/advisory/ntap-20210618-0001/', 'https://github.com/advisories/GHSA-rxjp-mfm9-w4wr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'http://www.openwall.com/lists/oss-security/2021/05/04/3', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-wp2p-q35g-3rjj
Malicious Package in soket.io
All versions of `soket.io` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:29:21Z
2020-09-01T21:13:01Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/686', 'https://github.com/advisories/GHSA-wp2p-q35g-3rjj'}
null
GHSA
GHSA-m647-5wf9-3jp3
OS Command Injection in closure-compiler-stream
closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument "options" of the exports function in "index.js" can be controlled by users without any sanitization.
{'CVE-2020-7603'}
2021-07-28T18:53:04Z
2021-05-07T16:16:06Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-m647-5wf9-3jp3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7603', 'https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123'}
null
GHSA
GHSA-7h8v-2v8x-h264
SQL Injection in moodle
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25700'}
2021-03-29T20:42:19Z
2021-03-29T20:42:19Z
MODERATE
6.5
{'CWE-89'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25700', 'https://moodle.org/mod/forum/discuss.php?d=413938', 'https://github.com/advisories/GHSA-7h8v-2v8x-h264', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895427'}
null
GHSA
GHSA-6fh5-8wq8-w3wr
Prototype Pollution in unflatten
All versions of `unflatten` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:09:09Z
2020-09-04T15:09:55Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-6fh5-8wq8-w3wr', 'https://www.npmjs.com/advisories/1329'}
null
GHSA
GHSA-6v73-fgf6-w5j7
Code Injection in Spring Cloud Function
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
{'CVE-2022-22963'}
2022-05-03T17:41:55Z
2022-04-03T00:00:59Z
CRITICAL
9.8
{'CWE-94'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://tanzu.vmware.com/security/cve-2022-22963', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005', 'https://github.com/advisories/GHSA-6v73-fgf6-w5j7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22963', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH'}
null
GHSA
GHSA-6xxj-gcjq-wgf4
SQL injection in prestashop/prestashop
### Impact Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters ### Patches The problem is fixed in 1.7.8.2
{'CVE-2021-43789'}
2022-04-19T19:03:16Z
2021-12-07T21:23:17Z
HIGH
7.5
{'CWE-89'}
{'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6', 'https://github.com/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.com/PrestaShop/PrestaShop/issues/26623', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://cwe.mitre.org/data/definitions/89.html', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2'}
null
GHSA
GHSA-fqwf-pjwf-7vqv
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
{'CVE-2020-10673'}
2021-10-21T21:12:27Z
2020-05-15T18:59:04Z
MODERATE
0
null
{'https://github.com/FasterXML/jackson-databind/issues/2660', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10673', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-fqwf-pjwf-7vqv'}
null
GHSA
GHSA-4whc-pp4x-9pf3
Moderate severity vulnerability that affects jquery-rails and jquery-ujs
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
{'CVE-2015-1840'}
2021-09-01T18:38:28Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-200'}
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html', 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md', 'http://openwall.com/lists/oss-security/2015/06/16/15', 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3', 'http://www.securityfocus.com/bid/75239', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html', 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html'}
null
GHSA
GHSA-2p3x-qw9c-25hh
XStream can cause a Denial of Service.
### Impact The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21341](https://x-stream.github.io/CVE-2021-21341.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21341'}
2022-04-19T19:02:49Z
2021-03-22T23:27:51Z
HIGH
7.5
{'CWE-835', 'CWE-400', 'CWE-502'}
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-2p3x-qw9c-25hh', 'http://x-stream.github.io/changes.html#1.4.16', 'https://x-stream.github.io/CVE-2021-21341.html', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21341', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-9p9m-jm8w-94p2
Improper Handling of Highly Compressed Data (Data Amplification) and Memory Allocation with Excessive Size Value in eventlet
### Impact A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. ### Patches Version 0.31.0 restricts websocket frame to reasonable limits. ### Workarounds Restricting memory usage via OS limits would help against overall machine exhaustion. No workaround to protect Eventlet process. ### For more information If you have any questions or comments about this advisory: * Open an issue in [eventlet](https://github.com/eventlet/eventlet/issues) * Contact current maintainers. At 2021-03: temotor@gmail.com or https://t.me/temotor
{'CVE-2021-21419'}
2021-09-29T18:51:38Z
2021-05-07T15:50:36Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21419', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/', 'https://github.com/advisories/GHSA-9p9m-jm8w-94p2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/', 'https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2'}
null
GHSA
GHSA-w8cj-mvf9-mpc9
OS Command injection in Bolt
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
{'CVE-2020-28925'}
2021-05-06T18:53:29Z
2021-05-06T18:53:29Z
MODERATE
5.3
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/compare/3.7.1...3.7.2', 'https://github.com/advisories/GHSA-w8cj-mvf9-mpc9', 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
null
GHSA
GHSA-gm2x-6475-g9r8
XSS Injection in Media Collection Title was possible
### Impact A logged in admin user was possible to add a script injection (XSS) in the collection title which was executed. ### Workarounds Manual patching the js files. ### For more information If you have any questions or comments about this advisory:' - Email us at [security@sulu.io](mailto:security@sulu.io)
{'CVE-2021-32737'}
2022-04-19T19:03:02Z
2021-07-02T18:32:18Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-gm2x-6475-g9r8', 'https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32737', 'https://github.com/sulu/sulu/releases/tag/1.6.41'}
null
GHSA
GHSA-3q6g-vf58-7m4g
Regular Expression Denial of Service in flask-restx
Flask RESTX contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service) in `email_regex`.
{'CVE-2021-32838'}
2022-04-19T19:03:07Z
2021-09-08T15:41:15Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da', 'https://github.com/python-restx/flask-restx/issues/372', 'https://github.com/advisories/GHSA-3q6g-vf58-7m4g', 'https://github.com/python-restx/flask-restx/security/advisories/GHSA-3q6g-vf58-7m4g', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32838', 'https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51', 'https://pypi.org/project/flask-restx/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/'}
null
GHSA
GHSA-cwp7-92h5-82wx
Downloads Resources over HTTP in haxe-dev
Affected versions of `haxe-dev` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe-dev`. ## Recommendation This package is actively maintained, yet after 2 years, the maintainer has not provided a patch for the vulnerability. This likely means that the maintainer has decided to accept the risk, and this vulnerability will never be patched. Because of this, the best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10637'}
2021-01-08T18:55:36Z
2019-02-18T23:47:10Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10637', 'https://www.npmjs.com/advisories/237', 'https://github.com/advisories/GHSA-cwp7-92h5-82wx', 'https://nodesecurity.io/advisories/237'}
null
GHSA
GHSA-7pm4-g2qj-j85x
CSRF attack via CORS preflight requests with Spring MVC or Spring WebFlux
Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vulnerable because preflight requests should not include credentials and therefore requests should fail authentication. However a notable exception to this are Chrome based browsers when using client certificates for authentication since Chrome sends TLS client certificates in CORS preflight requests in violation of spec requirements. No HTTP body can be sent or received as a result of this attack.
{'CVE-2020-5397'}
2022-04-13T16:23:12Z
2020-01-21T20:59:33Z
MODERATE
5.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-7pm4-g2qj-j85x', 'https://github.com/spring-projects/spring-framework', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://pivotal.io/security/cve-2020-5397', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5397', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-r2v5-5vcr-h3vq
Cross-site Scripting in Apache Zeppelin
Apache Zeppelin prior to 0.8.0 had a stored XSS issue via Note permissions. Issue reported by "Josna Joseph".
{'CVE-2018-1328'}
2021-08-03T17:54:46Z
2019-04-24T16:07:36Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://github.com/advisories/GHSA-r2v5-5vcr-h3vq', 'https://zeppelin.apache.org/releases/zeppelin-release-0.8.0.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1328'}
null
GHSA
GHSA-725f-3pw7-rq6x
Malicious Package in 8.9.4
Versions 1.0.2, 1.0.3, 1.0.4 and 1.0.5 of `8.9.4` contain malicious code as a preinstall script. The package reads the system's SSH keys but does not upload it to a remote server. ## Recommendation Remove the package from your environment. There is no evidence of further compromise at the moment.
null
2021-09-29T20:46:53Z
2020-09-03T21:09:47Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1201', 'https://github.com/advisories/GHSA-725f-3pw7-rq6x'}
null
GHSA
GHSA-vwqq-5vrc-xw9h
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.
{'CVE-2020-9488'}
2022-04-22T18:27:13Z
2020-06-05T14:15:51Z
LOW
3.7
{'CWE-295'}
{'https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.debian.org/security/2021/dsa-5020', 'https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E', 'https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9488', 'https://security.netapp.com/advisory/ntap-20200504-0003/', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'https://github.com/advisories/GHSA-vwqq-5vrc-xw9h', 'https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4J2-2819', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html', 'https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E'}
null
GHSA
GHSA-q4qq-fm7q-cwp5
Multiple XSS Filter Bypasses in validator
Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter. ## Proof of Concept Various inputs that could bypass the filter were discovered: Improper parsing of nested tags: ``` <s <onmouseover="alert(1)"> <;s onmouseover="alert(1)">This is a test</s> ``` Incomplete filtering of javascript: URIs: ``` <a href="javascriptJ a V a S c R iPt::alert(1)" "<s>">test</a> ``` UI Redressing: ``` <div style="z-index: 9999999; background-color: green; width: 100%; height: 100%"> <h1>You have won</h1>Please click the link and enter your login details: <a href="http://example.com/">http://good.com</a> </div> ``` Bypass via Nested Forbidden Strings: ``` <scrRedirecRedirect 302t 302ipt type="text/javascript">prompt(1);</scrRedirecRedirect 302t 302ipt> ``` Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of. ## Recommendation If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed.
{'CVE-2013-7454'}
2021-09-16T19:30:37Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5', 'https://www.npmjs.com/advisories/41', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454', 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html', 'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/', 'https://nodesecurity.io/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
GHSA
GHSA-32wx-4gxx-h48f
Users can edit the tags of any discussion
This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020. ### Impact This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API. Users were able to remove any existing tag, and add any tag in which they are allowed to create discussions. The chosen tags still had to match the configured Tags minimums and maximums. By moving the discussion to new tags, users were able to go around permissions applied to restricted tags. Depending on the setup, this can include publicly exposing content that was only visible to certain groups, or gain the ability to interact with content where such interaction was limited. The full impact varies depending on the configuration of permissions and restricted tags, and which community extensions are being used. All tag-scoped permissions offered by extensions are impacted by this ability to go around them. Forums that don't use restricted tags and don't use any extension that relies on tags for access control should not see any security impact. An update is still required to stop users from being able to change any discussion's tags. Forums that don't use the Tags extension are unaffected. ### Patches The fix will be available in version v0.1.0-beta.14 with Flarum beta 14. The fix has already been back-ported to Flarum beta 13 as version v0.1.0-beta.13.2 of the Tags extension. ### Workarounds Version v0.1.0-beta.13.2 of the Tags extension allows existing Flarum beta 13 forums to fix the issue without the need to update to beta 14. Forums that have not yet updated to Flarum beta 13 are encouraged to update as soon as possible. ### References - [Release announcement](https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132) - [GitHub issue](https://github.com/flarum/core/issues/2355) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
null
2022-04-19T19:02:36Z
2021-01-29T18:13:32Z
MODERATE
0
{'CWE-639'}
{'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d', 'https://github.com/advisories/GHSA-32wx-4gxx-h48f', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132', 'https://packagist.org/packages/flarum/tags', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://github.com/flarum/core/issues/2355'}
null
GHSA
GHSA-4vr3-9v7h-5f8v
Low severity vulnerability that affects Gw2Sharp
## Leaking cached authenticated requests ### Impact If you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug. When using an instance of `MemoryCacheMethod` and using it with multiple instances of `Gw2WebApiClient`, there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint. The occurence of this is limited however. The Guild Wars 2 API doesn't use the `Expires` header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen. ### Patches This bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id. ### Workarounds For version 0.3.0 and lower, you can use one separate instance of `MemoryCacheMethod` per `Gw2WebApiClient` if you need to use it. ### For more information If you have any questions or comments about this advisory, you can open an issue in [the Gw2Sharp repository](https://github.com/Archomeda/Gw2Sharp) or contact me on [Discord](https://discord.gg/hNcpDT3).
null
2021-12-03T14:36:24Z
2019-06-18T15:38:41Z
LOW
0
null
{'https://github.com/advisories/GHSA-4vr3-9v7h-5f8v', 'https://github.com/Archomeda/Gw2Sharp/security/advisories/GHSA-4vr3-9v7h-5f8v'}
null
GHSA
GHSA-f545-vpwp-r9j7
showdoc is vulnerable to URL Redirection to Untrusted Site
showdoc is vulnerable to URL Redirection to Untrusted Site.
{'CVE-2021-3989'}
2021-12-03T20:41:35Z
2021-12-03T20:41:35Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989', 'https://github.com/advisories/GHSA-f545-vpwp-r9j7', 'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5'}
null
GHSA
GHSA-gcj7-j438-hjj2
Smokescreen SSRF via deny list bypass
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case. ### Recommendation Upgrade Smokescreen to version 0.0.3 or later. ### Acknowledgements Thanks to [Grzegorz Niedziela](https://twitter.com/gregxsunday) for reporting the issue. ### For more information Email us at security@stripe.com
{'CVE-2022-24825'}
2022-04-28T19:13:16Z
2022-04-07T22:10:22Z
MODERATE
5.8
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24825', 'https://github.com/advisories/GHSA-gcj7-j438-hjj2', 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b', 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2'}
null
GHSA
GHSA-8c89-2vwr-chcq
Heap buffer overflow in `QuantizedResizeBilinear`
### Impact An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization: ```python import tensorflow as tf images = tf.constant([], shape=[0], dtype=tf.qint32) size = tf.constant([], shape=[0], dtype=tf.int32) min = tf.constant([], dtype=tf.float32) max = tf.constant([], dtype=tf.float32) tf.raw_ops.QuantizedResizeBilinear(images=images, size=size, min=min, max=max, align_corners=False, half_pixel_centers=False) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/50711818d2e61ccce012591eeb4fdf93a8496726/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L705-L706) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly: ```cc const float in_min = context->input(2).flat<float>()(0); const float in_max = context->input(3).flat<float>()(0); ``` However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. ### Patches We have patched the issue in GitHub commit [f6c40f0c6cbf00d46c7717a26419f2062f2f8694](https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29537'}
2021-05-21T14:22:35Z
2021-05-21T14:22:35Z
LOW
2.5
{'CWE-131', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq', 'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29537', 'https://github.com/advisories/GHSA-8c89-2vwr-chcq'}
null
GHSA
GHSA-7638-r9r3-rmjj
chroot isolation: environment value leakage to intermediate processes
### Impact When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original `buildah` process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during `buildah run`. The commands that `buildah` is instructed to run can read that information if they choose to. ### Patches Users should upgrade packages, or images which contain packages, to include version 1.21.3 or later. ### Workarounds As a workaround, invoking `buildah` in a container under `env -i` to have it started with a reinitialized environment should prevent the leakage. ### For more information If you have any questions or comments about this advisory: * Open an issue in [buildah](https://github.com/containers/buildah/issues) * Email us at [the buildah general mailing list](mailto:buildah@lists.buildah.io), or [the podman security mailing list](mailto:security@lists.podman.io) if it's sensitive.
{'CVE-2021-3602'}
2022-03-18T21:03:35Z
2021-07-19T15:19:09Z
MODERATE
5.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-7638-r9r3-rmjj', 'https://ubuntu.com/security/CVE-2021-3602', 'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264', 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj'}
null
GHSA
GHSA-4pwq-fj89-6rjc
Cross-site Scripting in Apache Airflow
In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit.
{'CVE-2020-13944'}
2021-06-18T18:29:54Z
2021-06-18T18:29:54Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/11/2', 'https://github.com/advisories/GHSA-4pwq-fj89-6rjc', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/05/01/2', 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-jjjr-3jcw-f8v6
Potential Observable Timing Discrepancy in Wagtail
### Impact A potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's "Privacy" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. (This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).) Privacy settings that restrict access to pages / documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability. ### Patches Patched versions have been released as Wagtail 2.7.3 (for the LTS 2.7 branch), Wagtail 2.8.2 and Wagtail 2.9. ### Workarounds Site owners who are unable to upgrade to the new versions can use [user- or group-based privacy restrictions](https://docs.wagtail.io/en/stable/advanced_topics/privacy.html) to restrict access to sensitive information; these are unaffected by this vulnerability.
{'CVE-2020-11037'}
2022-04-19T19:02:25Z
2020-05-07T18:04:53Z
MODERATE
6.1
{'CWE-208'}
{'https://github.com/advisories/GHSA-jjjr-3jcw-f8v6', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11037'}
null
GHSA
GHSA-f8h4-7rgh-q2gm
Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord`
### Impact The implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault: ```python import tensorflow as tf dataset = tf.data.Dataset.range(3) dataset = tf.data.experimental.to_variant(dataset) tf.raw_ops.ExperimentalDatasetToTFRecord( input_dataset=dataset, filename='/tmp/output', compression_type='') ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/to_tf_record_op.cc#L93-L102) assumes that all records in the dataset are of string type. However, there is no check for that, and the example given above uses numeric types. ### Patches We have patched the issue in GitHub commit [e0b6e58c328059829c3eb968136f17aa72b6c876](https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37650'}
2021-08-25T14:43:24Z
2021-08-25T14:43:24Z
HIGH
7.8
{'CWE-787', 'CWE-120'}
{'https://github.com/advisories/GHSA-f8h4-7rgh-q2gm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37650', 'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}
null
GHSA
GHSA-gf8q-jrpm-jvxq
URL parsing in node-forge could lead to undesired behavior.
### Impact The regex used for the `forge.util.parseUrl` API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior. ### Patches `forge.util.parseUrl` and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API. ### Workarounds Ensure code does not directly or indirectly call `forge.util.parseUrl` with untrusted input. ### References - https://www.huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at support@digitalbazaar.com
null
2022-01-08T00:22:02Z
2022-01-08T00:22:02Z
LOW
0
null
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq', 'https://github.com/advisories/GHSA-gf8q-jrpm-jvxq'}
null
GHSA
GHSA-j89m-gcjf-6ghp
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0825'}
2021-07-28T18:57:02Z
2021-07-28T18:57:02Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825', 'https://github.com/advisories/GHSA-j89m-gcjf-6ghp'}
null
GHSA
GHSA-49h4-g8p5-jgq6
Moderate severity vulnerability that affects org.apache.juddi:juddi-client
After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.
{'CVE-2015-5241'}
2021-09-01T14:11:51Z
2018-10-16T19:49:32Z
MODERATE
6.1
{'CWE-601'}
{'http://juddi.apache.org/security.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5241', 'https://github.com/advisories/GHSA-49h4-g8p5-jgq6'}
null
GHSA
GHSA-vxf5-wxwp-m7g9
Open Redirect in Next.js
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when `pages/_error.js` was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain. ### Impact - **Affected:** Users of Next.js between `10.0.5` and `10.2.0` - **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` without `getInitialProps` - **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` and `next export` - **Not affected**: Deployments on Vercel ([vercel.com](https://vercel.com)) are not affected - **Not affected:** Deployments **with** `pages/404.js` - Note that versions prior to 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions. We recommend upgrading to the latest version of Next.js to improve the overall security of your application. ### Patches https://github.com/vercel/next.js/releases/tag/v11.1.0
{'CVE-2021-37699'}
2022-04-28T20:32:19Z
2021-08-12T14:51:14Z
MODERATE
6.9
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37699', 'https://github.com/vercel/next.js/releases/tag/v11.1.0', 'https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9', 'https://github.com/advisories/GHSA-vxf5-wxwp-m7g9'}
null
GHSA
GHSA-pmcr-2rhp-36hr
SQL injection in github.com/navidrome/navidrome
model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords).
{'CVE-2022-23857'}
2022-01-27T16:23:02Z
2022-01-27T16:23:02Z
MODERATE
0
{'CWE-89'}
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857', 'https://github.com/advisories/GHSA-pmcr-2rhp-36hr', 'https://github.com/navidrome/navidrome/releases/tag/v0.47.5'}
null
GHSA
GHSA-gfv4-2vhm-486m
Hijacked Environment Variables in node-fabric
The `node-fabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16052'}
2021-01-08T18:47:31Z
2018-07-23T20:50:10Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-gfv4-2vhm-486m', 'https://nodesecurity.io/advisories/489', 'https://www.npmjs.com/advisories/489', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16052'}
null
GHSA
GHSA-8fvr-5rqf-3wwh
Information Exposure in Docker Engine
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
{'CVE-2015-3630'}
2022-04-12T22:39:05Z
2022-02-15T01:57:18Z
HIGH
8.4
{'CWE-285'}
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://github.com/advisories/GHSA-8fvr-5rqf-3wwh', 'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660', 'https://seclists.org/fulldisclosure/2015/May/28', 'https://www.securityfocus.com/bid/74566', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3630', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html'}
null
GHSA
GHSA-vj88-5667-w56p
Singleton lacks bounds on Send and Sync.
`Singleton<T>` is meant to be a static object that can be initialized lazily. In order to satisfy the requirement that `static` items must implement `Sync`, `Singleton` implemented both `Sync` and `Send` unconditionally. This allows for a bug where non-`Sync` types such as `Cell` can be used in singletons and cause data races in concurrent programs. The flaw was corrected in commit `b0d2bd20e` by adding trait bounds, requiring the contaiend type to implement `Sync`.
null
2021-08-25T21:00:11Z
2021-08-25T21:00:11Z
MODERATE
0
{'CWE-362'}
{'https://github.com/advisories/GHSA-vj88-5667-w56p', 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html', 'https://github.com/RusPiRo/ruspiro-singleton/issues/10'}
null
GHSA
GHSA-jqfh-8hw5-fqjr
Improper Handling of Exceptional Conditions in detect-character-encoding
### Impact In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. ### Patches The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C) Base Score: 7.5 (High) Temporal Score: 7.2 (High) Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to detect-character-encoding. Depending on your specific implementation, the vulnerability’s severity in your program may be different. ### Proof of concept ```js const express = require("express"); const bodyParser = require("body-parser"); const detectCharacterEncoding = require("detect-character-encoding"); const app = express(); app.use(bodyParser.raw()); app.post("/", (req, res) => { const charsetMatch = detectCharacterEncoding(req.body); res.end(charsetMatch.encoding); }); app.listen(3000); ``` `printf "\xAA" | curl --request POST --header "Content-Type: application/octet-stream" --data-binary @- http://localhost:3000` crashes the server.
{'CVE-2021-39157'}
2022-04-19T19:03:06Z
2021-08-25T14:44:48Z
HIGH
7.5
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39157', 'https://github.com/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0', 'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a', 'https://github.com/sonicdoe/detect-character-encoding/issues/15'}
null
GHSA
GHSA-p979-4mfw-53vg
HTTP Request Smuggling in Netty
Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
{'CVE-2019-16869'}
2022-04-11T20:49:20Z
2019-10-11T18:41:23Z
HIGH
7.5
{'CWE-444'}
{'https://lists.apache.org/thread.html/cbf6e6a04cb37e9320ad20e437df63beeab1755fc0761918ed5c5a6e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/0acadfb96176768caac79b404110df62d14d30aa9d53b6dbdb1407ac@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/35961d1ae00849974353a932b4fef12ebce074541552eceefa04f1fd@%3Cdev.olingo.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/6e1e34c0d5635a987d595df9e532edac212307243bb1b49eead6d55b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bdf7a5e597346a75d2d884ca48c767525e35137ad59d8f10b8fc943c@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/3e6d7aae1cca10257e3caf2d69b22f74c875f12a1314155af422569d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/799eb85d67cbddc1851a3e63a07b55e95b2f44f1685225d38570ce89@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/e192fe8797c192679759ffa6b15e4d0806546945a41d8ebfbc6ee3ac@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/af6e9c2d716868606523857a4cd7a5ee506e6d1710f5fb0d567ec030@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/64b10f49c68333aaecf00348c5670fe182e49fd60d45c4a3ab241f8b@%3Cissues.spark.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/76540c8b0ed761bfa6c81fa28c13057f13a5448aed079d656f6a3c79@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/d7d530599dc7813056c712213e367b68cdf56fb5c9b73f864870bc4c@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/cf5aa087632ead838f8ac3a42e9837684e7afe6e0fcb7704e0c73bc0@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/d14f721e0099b914daebe29bca199fde85d8354253be9d6d3d46507a@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/19fed892608db1efe5a5ce14372137669ff639df0205323959af7de3@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r3225f7dfe6b8a37e800ecb8e31abd7ac6c4312dbd3223dd8139c37bb@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/2e1cf538b502713c2c42ffa46d81f4688edb5676eb55bd9fc4b4fed7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r831e0548fad736a98140d0b3b7dc575af0c50faea0b266434ba813cc@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/9128111213b7b734ffc85db08d8f789b00a85a7f241b708e55debbd0@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/380f6d2730603a2cd6b0a8bea9bcb21a86c199147e77e448c5f7390b@%3Ccommits.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16869', 'https://seclists.org/bugtraq/2020/Jan/6', 'https://www.debian.org/security/2020/dsa-4597', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://github.com/netty/netty/compare/netty-4.1.41.Final...netty-4.1.42.Final', 'https://lists.apache.org/thread.html/2494a2ac7f66af6e4646a4937b17972a4ec7cd3c7333c66ffd6c639d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/e39931d7cdd17241e69a0a09a89d99d7435bcc59afee8a9628d67769@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/d3eb0dbea75ef5c400bd49dfa1901ad50be606cca3cb29e0d01b6a54@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00035.html', 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/b3dda6399a0ea2b647624b899fd330fca81834e41b13e3e11e1002d8@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/rcddf723a4b4117f8ed6042e9ac25e8c5110a617bab77694b61b14833@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/51923a9ba513b2e816e02a9d1fd8aa6f12e3e4e99bbd9dc884bccbbe@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/681493a2f9b63f5b468f741d88d1aa51b2cfcf7a1c5b74ea8c4343fb@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/37ed432b8eb35d8bd757f53783ec3e334bd51f514534432bea7f1c3d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r73c400ab66d79821dec9e3472f0e2c048d528672bdb0f8bf44d7cb1f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/f6c5ebfb018787c764f000362d59e4b231c0a36b6253aa866de8c64e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://github.com/advisories/GHSA-p979-4mfw-53vg', 'https://lists.apache.org/thread.html/b264fa5801e87698e9f43f2b5585fbc5ebdc26c6f4aad861b258fb69@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://github.com/netty/netty/issues/9571', 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/a0f77c73af32cbe4ff0968bfcbbe80ae6361f3dccdd46f3177547266@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/6063699b87b501ecca8dd3b0e82251bfc85f29363a9b46ac5ace80cf@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/rb25b42f666d2cac5e6e6b3f771faf60d1f1aa58073dcdd8db14edf8a@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/860acce024d79837e963a51a42bab2cef8e8d017aad2b455ecd1dcf0@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ee6faea9e542c0b90afd70297a9daa203e20d41aa2ac7fca6703662f@%3Cissues.spark.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://lists.apache.org/thread.html/b2cd51795f938632c6f60a4c59d9e587fbacd7f7d0e0a3684850a30f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/b3ddeebbfaf8a288d7de8ab2611cf2609ab76b9809f0633248546b7c@%3Cissues.spark.apache.org%3E'}
null
GHSA
GHSA-7c6q-jqwc-4423
Path Traversal in Crafter CMS Crafter Studio
In Crafter CMS Crafter Studio 3.0.1 a directory traversal vulnerability exists which allows unauthenticated attackers to overwrite files from the operating system which can lead to RCE.
{'CVE-2017-15681'}
2022-02-09T23:07:59Z
2022-02-09T23:07:59Z
CRITICAL
9.8
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15681', 'https://github.com/advisories/GHSA-7c6q-jqwc-4423', 'http://crafter.com', 'https://docs.craftercms.org/en/3.0/security/advisory.html'}
null
GHSA
GHSA-5j5w-g665-5m35
Ambiguous OCI manifest parsing
### Impact In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of containerd prior to 1.4.12 and 1.5.8 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image. ### Patches This issue has been fixed in containerd 1.4.12 and 1.5.8. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected. ### Workarounds Ensure you only pull images from trusted sources. ### References https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io)
null
2021-11-18T16:08:58Z
2021-11-18T16:08:58Z
LOW
3
{'CWE-843'}
{'https://github.com/advisories/GHSA-5j5w-g665-5m35', 'https://github.com/containerd/containerd/releases/tag/v1.5.8', 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh', 'https://github.com/containerd/containerd/releases/tag/v1.4.12', 'https://github.com/containerd/containerd/security/advisories/GHSA-5j5w-g665-5m35', 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}
null
GHSA
GHSA-28xx-8j99-m32j
Malicious Package in nginxbeautifier
Version 1.0.14 of `nginxbeautifier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.14 of this module is found installed you will want to replace it with a version before or after 1.0.14. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-10-01T13:11:55Z
2020-09-01T20:37:25Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-28xx-8j99-m32j', 'https://www.npmjs.com/advisories/639'}
null
GHSA
GHSA-gc67-crq6-hgh5
Improper Input Validation in Parquet-MR
Improper Input Validation vulnerability in Parquet-MR of Apache Parquet allows an attacker to DoS by malicious Parquet files. This issue affects Apache Parquet-MR version 1.9.0 and later versions.
{'CVE-2021-41561'}
2022-01-06T23:59:25Z
2022-01-06T23:59:25Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41561', 'https://github.com/advisories/GHSA-gc67-crq6-hgh5', 'https://lists.apache.org/thread/1bjlscbqtfzl160hrm9lnpjpppp5z3zr', 'http://www.openwall.com/lists/oss-security/2021/12/20/1'}
null
GHSA
GHSA-h72c-w3q3-55qq
OS Command Injection in jw.util
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
{'CVE-2020-13388'}
2021-06-02T21:45:13Z
2021-06-02T21:45:12Z
HIGH
9.8
{'CWE-78'}
{'https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13388', 'https://github.com/advisories/GHSA-h72c-w3q3-55qq', 'https://security.netapp.com/advisory/ntap-20200528-0002/', 'https://joel-malwarebenchmark.github.io'}
null
GHSA
GHSA-29f8-q7mf-7cqj
Logic error in Apache Pinot
In 0.9.3 or older versions of Apache Pinot segment upload path allowed segment directories to be imported into pinot tables. In pinot installations that allow open access to the controller a specially crafted request can potentially be exploited to cause disruption in pinot service. Pinot release 0.10.0 fixes this. See https://docs.pinot.apache.org/basics/releases/0.10.0
{'CVE-2022-23974'}
2022-04-17T15:34:43Z
2022-04-06T00:01:28Z
HIGH
7.5
{'CWE-674'}
{'https://docs.pinot.apache.org/basics/releases/0.10.0', 'https://github.com/advisories/GHSA-29f8-q7mf-7cqj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23974', 'https://lists.apache.org/thread/3dk8pf1n02p8oj2j3czbtchyjsf8khwr', 'https://github.com/apache/pinot/pull/7969'}
null
GHSA
GHSA-56hp-xqp3-w2jf
Repository credentials passed to alternate domain
While working on the Helm source, a Helm core maintainer discovered a situation where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. ### Impact The `index.yaml` within a Helm chart repository contains a reference where to get the chart archive for each version of a chart. The reference can be relative to the `index.yaml` file or a URL to location. The URL can point to any domain and this is a feature leveraged by Helm users. For example, an `index.yaml` file can be hosted on GitHub pages while the chart archives are hosted as GitHub releases. These are on different domain names and the `index.yaml` file points to the other domain. When a username and password were associated with a Helm repository the username and password were also passed on to other domains referenced in the `index.yaml` file. This occurred when Helm went to retrieve a specific chart archive on the other domain. ### Patches This issue has been resolved in 3.6.1. There is a slight behavior change to credential handling with regard to repositories. Usernames and passwords are only passed to the URL location of the Helm repository by default. The username and password are scoped to the scheme, host, and port of the Helm repository. To pass the username and password to other domains Helm may encounter when it goes to retrieve a chart, the new `--pass-credentials` flag can be used. This flag restores the old behavior for a single repository as an opt-in behavior. ### Workarounds If you use a username and password for a Helm repository you can audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed the credentials would have been passed on. ### For more information Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
null
2021-06-23T18:14:15Z
2021-06-23T18:14:15Z
MODERATE
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-56hp-xqp3-w2jf', 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}
null
GHSA
GHSA-j34v-3552-5r7j
Multiple security issues in Pomerium's embedded envoy
Envoy, which Pomerium is based on, has issued multiple CVEs impacting stability and security. Though Pomerium may not be vulnerable to all of the issues, it is recommended that all users upgrade to Pomerium v0.16.4 as soon as possible to minimize risk. ### Impact - Possible DoS or crash - Resources available to unauthorized users - Pomerium may trust upstream certificates that should not be trusted ### Patches Patched in v0.16.4 ### Workarounds No ### References [Envoy Security Announcement](https://groups.google.com/g/envoy-security-announce/c/QBGxoqZdTR4) * [CVE-2021-43824](https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p) (CVSS Score 6.5, Medium): Envoy 1.21.0 and earlier - Potential null pointer dereference when using JWT filter safe_regex match * [CVE-2021-43825](https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when response filters increase response data, and increased data exceeds downstream buffer limits. * [CVE-2021-43826](https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream connection establishment * [CVE-2022-21654](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283) (CVSS Score 7.3, High): Envoy 1.7.0 and later - Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed. * [CVE-2022-21655](https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg) (CVSS Score 7.5, High): Envoy 1.21 and earlier - Incorrect handling of internal redirects to routes with a direct response entry * [CVE-2022-21657](https://github.com/envoyproxy/envoy/security/advisories/GHSA-837m-wjrv-vm5g) (CVSS Score 3.1, Low): Envoy 1.20.1 and earlier - X.509 Extended Key Usage and Trust Purposes bypass ### For more information If you have any questions or comments about this advisory: Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) Email us at [security@pomerium.com](mailto:security@pomerium.com)
null
2022-03-02T14:45:17Z
2022-03-01T22:04:17Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-j34v-3552-5r7j', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j34v-3552-5r7j'}
null
GHSA
GHSA-5fvx-5p2r-4mvp
Open Redirect in firefly-iii
firefly-iii is vulnerable to URL Redirection to Untrusted Site
{'CVE-2021-3851'}
2021-10-25T20:08:27Z
2021-10-21T17:48:41Z
MODERATE
5
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3851', 'https://github.com/advisories/GHSA-5fvx-5p2r-4mvp', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
null
GHSA
GHSA-5pq8-2q24-mj3p
Downloads Resources over HTTP in fis-parser-sass-bin
Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10660'}
2021-01-08T19:48:53Z
2019-02-18T23:45:03Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/269', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660', 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p', 'https://www.npmjs.com/advisories/269'}
null
GHSA
GHSA-qgmg-gppg-76g5
Inefficient Regular Expression Complexity in validator.js
validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3765'}
2021-11-03T17:34:45Z
2021-11-03T17:34:45Z
MODERATE
5.3
{'CWE-1333'}
{'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/advisories/GHSA-qgmg-gppg-76g5', 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}
null
GHSA
GHSA-4pv3-63jw-4jw2
Missing Release of Memory after Effective Lifetime in Apache Tika
A carefully crafted or corrupt file may trigger a System.exit in Tika's OneNote Parser. Crafted or corrupted files can also cause out of memory errors and/or infinite loops in Tika's ICNSParser, MP3Parser, MP4Parser, SAS7BDATParser, OneNoteParser and ImageParser. Apache Tika users should upgrade to 1.24.1 or later. The vulnerabilities in the MP4Parser were partially fixed by upgrading the com.googlecode:isoparser:1.1.22 dependency to org.tallison:isoparser:1.9.41.2. For unrelated security reasons, we upgraded org.apache.cxf to 3.3.6 as part of the 1.24.1 release.
{'CVE-2020-9489'}
2021-06-15T17:32:28Z
2021-05-07T15:53:40Z
MODERATE
5.5
{'CWE-401'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9489', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-4pv3-63jw-4jw2', 'https://lists.apache.org/thread.html/r4d943777e36ca3aa6305a45da5acccc54ad894f2d5a07186cfa2442c%40%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}
null
GHSA
GHSA-446m-mv8f-q348
Regular Expression Denial of Service in moment
Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings. ## Recommendation Update to version 2.19.3 or later.
{'CVE-2017-18214'}
2021-08-31T21:44:16Z
2018-03-05T18:35:09Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-446m-mv8f-q348', 'https://nodesecurity.io/advisories/532', 'https://www.npmjs.com/advisories/532', 'https://www.tenable.com/security/tns-2019-02', 'https://github.com/moment/moment/pull/4326', 'https://github.com/moment/moment/issues/4163', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18214'}
null
GHSA
GHSA-qgcg-p3v2-9h4p
Externally Controlled Reference to a Resource in Another Sphere and Confused Deputy in Spring Cloud Netflix
Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly.
{'CVE-2020-5412'}
2021-04-30T17:29:42Z
2021-04-30T17:29:42Z
MODERATE
6.5
{'CWE-610', 'CWE-441'}
{'https://tanzu.vmware.com/security/cve-2020-5412', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5412', 'https://github.com/advisories/GHSA-qgcg-p3v2-9h4p'}
null
GHSA
GHSA-c4fm-46gm-4469
Malicious Package in sparkies
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:28:30Z
2020-09-03T20:00:05Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-c4fm-46gm-4469', 'https://www.npmjs.com/advisories/1141'}
null
GHSA
GHSA-hgwm-pv9h-q5m7
Potential XSS in jQuery dependency in Mirador
### Impact Mirador users less than v3.0.0 (alpha-rc) versions that have an unpatched jQuery. When adopters update jQuery they will find some of Mirador functionality to be broken. ### Patches Mirador adopters should update to v3.0.0, no updates exist for v2.x releases. ### Workarounds Yes, Mirador users could fork and create their own custom build of Mirador and make the bug fixes themselves. ### References https://github.com/advisories/GHSA-gxr4-xjj5-5px2 https://github.com/advisories/GHSA-jpcq-cgw6-v4j6 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/
null
2021-10-04T21:19:57Z
2020-09-18T18:03:29Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-hgwm-pv9h-q5m7', 'https://github.com/ProjectMirador/mirador/security/advisories/GHSA-hgwm-pv9h-q5m7'}
null
GHSA
GHSA-5f2r-qp73-37mr
`CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow
### Impact The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger `CHECK` failures. ### Patches We have patched the issue in GitHub commit [92dba16749fae36c246bec3f9ba474d9ddeb7662](https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23579'}
2022-02-11T20:39:08Z
2022-02-10T00:33:29Z
MODERATE
6.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23579', 'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662', 'https://github.com/advisories/GHSA-5f2r-qp73-37mr', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr'}
null
GHSA
GHSA-fgmr-vx7c-5wj6
Timing attack on HMAC signature comparison in Apache Tapestry
The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison should be done with a constant time algorithm instead.
{'CVE-2019-10071'}
2021-07-27T21:51:15Z
2019-09-26T21:30:34Z
CRITICAL
9.8
{'CWE-697', 'CWE-203'}
{'https://lists.apache.org/thread.html/6e8f42c88da7be3c60aafe3f6a85eb00b4f8b444de26b38d36233a43@%3Cusers.tapestry.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10071', 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/7a437dad5af7309aba4d01bfc2463b3ac34e6aafaa565381d3a36460@%3Cusers.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-fgmr-vx7c-5wj6'}
null
GHSA
GHSA-j586-cj67-vg4p
Cross-Site Request Forgery in Drupal core
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
{'CVE-2020-13674'}
2022-02-26T00:28:02Z
2022-02-12T00:00:47Z
MODERATE
6.5
{'CWE-352'}
{'https://www.drupal.org/sa-core-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13674', 'https://github.com/advisories/GHSA-j586-cj67-vg4p'}
null
GHSA
GHSA-wr2c-ppj9-f2fv
Downloads Resources over HTTP in webdrvr
Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10601'}
2021-01-08T01:16:15Z
2019-02-18T23:33:54Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv', 'https://www.npmjs.com/advisories/193', 'https://nodesecurity.io/advisories/193', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601'}
null
GHSA
GHSA-h372-w3xp-2jg3
Directory Traversal in section2.madisonjbrooks12
Affected versions of `section2.madisonjbrooks12` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16172'}
2021-01-14T15:35:27Z
2020-09-01T18:54:34Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/468', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16172', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12', 'https://github.com/advisories/GHSA-h372-w3xp-2jg3', 'https://nodesecurity.io/advisories/468'}
null
GHSA
GHSA-hv9c-qwqg-qj3v
Remote Code Execution in electron
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code execution. More information to determine if you are impacted can be found on the [electron blog](https://electronjs.org/blog/web-preferences-fix). ## Recommendation Upgrade Electron to >=3.0.0-beta.7, >=2.0.8, >=1.8.8, or >=1.7.16."
{'CVE-2018-15685'}
2021-09-14T17:29:35Z
2018-08-23T19:12:08Z
HIGH
8.1
{'CWE-1188'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-15685', 'https://www.npmjs.com/advisories/732', 'https://github.com/advisories/GHSA-hv9c-qwqg-qj3v', 'https://www.exploit-db.com/exploits/45272/', 'https://www.contrastsecurity.com/security-influencers/cve-2018-15685', 'https://electronjs.org/blog/web-preferences-fix'}
null
GHSA
GHSA-mvg9-xffr-p774
Out of bounds read in Pillow
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
{'CVE-2021-25291'}
2021-12-02T15:31:14Z
2021-03-29T16:35:57Z
HIGH
7.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-mvg9-xffr-p774', 'https://security.gentoo.org/glsa/202107-33', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25291'}
null
GHSA
GHSA-5v7r-jg9r-vq44
Insecure Cryptography Algorithm in simple-crypto-js
Versions of `simple-crypto-js` prior to 2.3.0 use AES-CBC with PKCS#7 padding, which is vulnerable to padding oracle attacks. This may allow attackers to break the encryption and access sensitive data. ## Recommendation Upgrade to version 2.3.0 or later.
null
2021-09-29T20:08:02Z
2020-09-03T21:19:46Z
MODERATE
5.9
{'CWE-327'}
{'https://www.npmjs.com/advisories/1220', 'https://robertheaton.com/2013/07/29/padding-oracle-attack/', 'https://github.com/advisories/GHSA-5v7r-jg9r-vq44', 'https://github.com/danang-id/simple-crypto-js/issues/12', 'https://snyk.io/vuln/SNYK-JS-SIMPLECRYPTOJS-544027'}
null
GHSA
GHSA-2wrq-wmqf-8vcc
Downloads Resources over HTTP in operadriver
operadriver is a Opera Driver for Selenium. operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. ## Recommendation Update to version 0.2.3 or later.
{'CVE-2016-10565'}
2021-01-08T20:05:54Z
2019-02-18T23:35:48Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10565', 'https://www.npmjs.com/advisories/196', 'https://nodesecurity.io/advisories/196', 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc'}
null
GHSA
GHSA-7ph8-f946-q5r7
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0592.
{'CVE-2019-0611'}
2021-09-03T21:01:09Z
2019-04-09T19:43:54Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0611', 'https://github.com/advisories/GHSA-7ph8-f946-q5r7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611'}
null
GHSA
GHSA-qpp2-2mcp-2wm5
Unauthenticated user can list hidden document from multiple velocity templates in XWiki
### Impact A guest user without the right to view pages of the wiki can still list documents by rendering some velocity documents. ### Patches The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. ### Workarounds There is no known workaround for this problem. ### References https://jira.xwiki.org/browse/XWIKI-16544 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2022-24820'}
2022-04-19T18:26:56Z
2022-04-08T22:00:54Z
MODERATE
5.3
{'CWE-200', 'CWE-359'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24820', 'https://github.com/advisories/GHSA-qpp2-2mcp-2wm5', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qpp2-2mcp-2wm5', 'https://jira.xwiki.org/browse/XWIKI-16544'}
null
GHSA
GHSA-hh3j-x4mc-g48r
Insufficiently Protected Credentials in Apache Tomcat
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
{'CVE-2019-12418'}
2022-04-19T18:42:25Z
2019-12-26T18:22:36Z
HIGH
7
{'CWE-522'}
{'https://www.debian.org/security/2020/dsa-4680', 'https://security.netapp.com/advisory/ntap-20200107-0001/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E', 'https://security.gentoo.org/glsa/202003-43', 'https://github.com/advisories/GHSA-hh3j-x4mc-g48r', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K10107360?utm_source=f5support&amp;utm_medium=RSS', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418', 'https://usn.ubuntu.com/4251-1/'}
null
GHSA
GHSA-xj6f-x7jm-85ff
Downloads Resources over HTTP in openframe-ascii-image
Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10690'}
2021-01-08T00:00:46Z
2019-02-18T23:41:54Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10690', 'https://nodesecurity.io/advisories/298', 'https://github.com/advisories/GHSA-xj6f-x7jm-85ff', 'https://www.npmjs.com/advisories/298'}
null
GHSA
GHSA-5gqf-456p-4836
Reference binding to nullptr in `SdcaOptimizer`
### Impact The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer: ```python import tensorflow as tf sparse_example_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)] sparse_feature_indices = [tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), tf.constant((0), dtype=tf.int64)] sparse_feature_values = [] dense_features = [] dense_weights = [] example_weights = tf.constant((0.0), dtype=tf.float32) example_labels = tf.constant((0.0), dtype=tf.float32) sparse_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)] sparse_weights = [tf.constant((0.0), dtype=tf.float32), tf.constant((0.0), dtype=tf.float32)] example_state_data = tf.constant([0.0, 0.0, 0.0, 0.0], shape=[1, 4], dtype=tf.float32) tf.raw_ops.SdcaOptimizer( sparse_example_indices=sparse_example_indices, sparse_feature_indices=sparse_feature_indices, sparse_feature_values=sparse_feature_values, dense_features=dense_features, example_weights=example_weights, example_labels=example_labels, sparse_indices=sparse_indices, sparse_weights=sparse_weights, dense_weights=dense_weights, example_state_data=example_state_data, loss_type="logistic_loss", l1=0.0, l2=0.0, num_loss_partitions=1, num_inner_iterations=1, adaptative=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a751d435cc3/tensorflow/core/kernels/sdca_internal.cc) does not validate that the user supplied arguments satisfy all [constraints expected by the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/SdcaOptimizer). ### Patches We have patched the issue in GitHub commit [f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb](https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29572'}
2021-05-21T14:25:31Z
2021-05-21T14:25:31Z
LOW
2.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29572', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb', 'https://github.com/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836'}
null
GHSA
GHSA-34hv-f45p-4qfq
Open redirect in wwbn/avideo
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
{'CVE-2022-27463'}
2022-04-19T14:13:44Z
2022-04-06T00:01:29Z
MODERATE
6.1
{'CWE-601'}
{'https://avideo.tube/', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c', 'https://github.com/advisories/GHSA-34hv-f45p-4qfq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463'}
null
GHSA
GHSA-7p8f-8hjm-wm92
Lookup operations do not take into account wildcards in SpiceDB
### Impact Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion. For example, given schema: ```zed definition user {} definition resource { relation viewer: user relation banned: user | user:* permission view = viewer - banned } ``` If `user:*` is placed into the `banned` relation for a particular resource, `view` should return false for *all* resources. in `v1.3.0`, the wildcard is ignored entirely in lookup's dispatch, resulting in the `banned` wildcard being ignored in the exclusion. ### Workarounds Don't make use of wildcards on the right side of intersections or within exclusions. ### References https://github.com/authzed/spicedb/issues/358 ### For more information If you have any questions or comments about this advisory: * Open an issue in [SpiceDB](https://github.com/authzed/spicedb) * Ask a question in the [SpiceDB Discord](https://authzed.com/discord)
{'CVE-2022-21646'}
2022-04-19T19:03:19Z
2022-01-13T15:05:41Z
HIGH
8.1
{'CWE-155', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21646', 'https://github.com/authzed/spicedb/releases/tag/v1.4.0', 'https://github.com/advisories/GHSA-7p8f-8hjm-wm92', 'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970', 'https://github.com/authzed/spicedb/issues/358', 'https://github.com/authzed/spicedb/security/advisories/GHSA-7p8f-8hjm-wm92'}
null
GHSA
GHSA-gx5w-rrhp-f436
XSS in mdBook
> This is a cross-post of [the official security advisory][ml]. The official post contains a signed version with our PGP key, as well. [ml]: https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0 The Rust Security Response Working Group was recently notified of a security issue affecting the search feature of mdBook, which could allow an attacker to execute arbitrary JavaScript code on the page. The CVE for this vulnerability is [CVE-2020-26297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26297). ## Overview The search feature of mdBook (introduced in version 0.1.4) was affected by a cross site scripting vulnerability that allowed an attacker to execute arbitrary JavaScript code on an user's browser by tricking the user into typing a malicious search query, or tricking the user into clicking a link to the search page with the malicious search query prefilled. mdBook 0.4.5 fixes the vulnerability by properly escaping the search query. ## Mitigations Owners of websites built with mdBook have to upgrade to mdBook 0.4.5 or greater and rebuild their website contents with it. It's possible to install mdBook 0.4.5 on the local system with: ``` cargo install mdbook --version 0.4.5 --force ``` ## Acknowledgements Thanks to Kamil Vavra for responsibly disclosing the vulnerability to us according to [our security policy](https://www.rust-lang.org/policies/security). ## Timeline of events All times are listed in UTC. - 2020-12-30 20:14 - The issue is reported to the Rust Security Response WG - 2020-12-30 20:32 - The issue is acknowledged and the investigation began - 2020-12-30 21:21 - Found the cause of the vulnerability and prepared the patch - 2021-01-04 15:00 - Patched version released and vulnerability disclosed
{'CVE-2020-26297'}
2022-04-19T19:02:44Z
2021-08-25T20:56:20Z
HIGH
8.2
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26297', 'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b', 'https://rustsec.org/advisories/RUSTSEC-2021-0001.html', 'https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045', 'https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436', 'https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0', 'https://github.com/advisories/GHSA-gx5w-rrhp-f436'}
null
GHSA
GHSA-pqm6-cgwr-x6pf
Signature validation bypass in XmlSecLibs
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
{'CVE-2019-3465'}
2021-08-18T22:14:39Z
2019-11-08T20:06:46Z
HIGH
8.8
{'CWE-347'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBKVDUZ7G5ZOUO4BFJWLNJ6VOKBQJX5U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESKJTWLE7QZBQ3EKMYXKMBQG3JDEJWM6/', 'https://github.com/advisories/GHSA-pqm6-cgwr-x6pf', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBSSRV5Q7JFCYO46A3EN624UZ4KXFQ2M/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3465', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBE2SJSXG7J4XYLJ2H6HC2VPPOG2OMUN/', 'https://seclists.org/bugtraq/2019/Nov/8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAWOVYLZKYDCQBLQEJCFAAD3KQTBPHXE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KID7C4AZPYYIZQIPSLANP4R2RQR6YK3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AB34ILMJ67CUROBOR6YPKB46VHXLOAJ4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNFMY5RRLU63P25HEBVDO5KAVI7TX7JV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://www.tenable.com/security/tns-2019-09', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://www.debian.org/security/2019/dsa-4560', 'https://simplesamlphp.org/security/201911-01'}
null
GHSA
GHSA-6r3p-fcvm-xh7c
SSRF vulnerability in Arache Airflow
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.
{'CVE-2020-17513'}
2020-12-17T21:00:58Z
2020-12-17T21:00:58Z
MODERATE
0
{'CWE-918'}
{'https://github.com/advisories/GHSA-6r3p-fcvm-xh7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17513', 'https://lists.apache.org/thread.html/rb3647269f07cc2775ca6568cbfd4994d862c842a58120d2aba9c658a%40%3Cusers.airflow.apache.org%3E'}
null
GHSA
GHSA-ph58-4vrj-w6hr
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
{'CVE-2018-20677'}
2021-07-26T21:49:19Z
2019-01-17T13:57:56Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://github.com/advisories/GHSA-ph58-4vrj-w6hr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/issues/27045', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/pull/27047', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}
null
GHSA
GHSA-255r-pghp-r5wh
Malicious Package in hdeky
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:02:18Z
2020-09-03T17:05:34Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-255r-pghp-r5wh', 'https://www.npmjs.com/advisories/1398'}
null
GHSA
GHSA-4hq8-gmxx-h6w9
XML Processing error in github.com/crewjam/saml
### Impact There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator) ### Patches In version 0.4.3, all XML input is validated prior to being parsed.
{'CVE-2020-27846'}
2021-06-23T17:29:42Z
2021-06-23T17:29:42Z
HIGH
9.8
{'CWE-287', 'CWE-115'}
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053', 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9', 'https://bugzilla.redhat.com/show_bug.cgi?id=1907670', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI/', 'https://github.com/advisories/GHSA-4hq8-gmxx-h6w9', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM/', 'https://security.netapp.com/advisory/ntap-20210205-0002/'}
null
GHSA
GHSA-pqhq-xx62-2v2p
Cross-site scripting in Apache NiFi
A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. Did not appear to occur in other browsers.
{'CVE-2020-1933'}
2022-01-06T20:35:39Z
2022-01-06T20:35:39Z
MODERATE
6.1
{'CWE-79'}
{'https://nifi.apache.org/security.html#CVE-2020-1933', 'https://github.com/advisories/GHSA-pqhq-xx62-2v2p', 'https://github.com/apache/nifi/pull/3991', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1933'}
null
GHSA
GHSA-735c-r4vc-6gm9
Downloads Resources over HTTP in bionode-sra
Affected versions of `bionode-sra` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync). Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10613'}
2021-09-16T20:41:22Z
2019-02-18T23:56:45Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://www.npmjs.com/advisories/211', 'https://github.com/advisories/GHSA-735c-r4vc-6gm9', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10613', 'https://nodesecurity.io/advisories/211'}
null
GHSA
GHSA-6h88-qjpv-p32m
OpenSSL gem for Ruby using inadequate encryption strength
The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
{'CVE-2016-7798'}
2022-04-25T16:33:58Z
2017-10-24T18:33:35Z
HIGH
7.5
{'CWE-326'}
{'http://www.openwall.com/lists/oss-security/2016/09/19/9', 'http://www.openwall.com/lists/oss-security/2016/09/30/6', 'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062', 'http://www.openwall.com/lists/oss-security/2016/10/01/2', 'https://github.com/ruby/openssl/issues/49', 'https://www.debian.org/security/2017/dsa-3966', 'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'http://www.securityfocus.com/bid/93031', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798'}
null
GHSA
GHSA-8w3x-457r-wg53
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to opencv-python and opencv-contrib-python through 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.
{'CVE-2017-12597'}
2021-11-18T00:08:10Z
2021-10-12T22:00:41Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-8w3x-457r-wg53', 'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/opencv/opencv-python/releases/tag/11', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12597', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
null
GHSA
GHSA-4gw3-8f77-f72c
Regular expression denial of service in codemirror
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
{'CVE-2020-7760'}
2022-04-22T17:20:51Z
2021-05-10T18:46:27Z
MODERATE
5.3
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449', 'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760', 'https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937', 'https://www.debian.org/security/2020/dsa-4789', 'https://github.com/advisories/GHSA-4gw3-8f77-f72c', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445', 'https://www.npmjs.com/package/codemirror', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-6m4r-cgm3-6q7q
Cross-Site Scripting in status-board
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderJsDashboard()` function concatenates the `safeDashboard` variable to the HTTP response message with insufficient sanitization. If this variable is controlled by user input it may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15478'}
2021-08-17T22:30:45Z
2019-09-23T18:32:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jameswlane/status-board/pull/949', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15478', 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460293', 'https://github.com/jameswlane/status-board/pull/949/files', 'https://www.npmjs.com/advisories/1151', 'https://github.com/advisories/GHSA-6m4r-cgm3-6q7q'}
null
GHSA
GHSA-6x2m-w449-qwx7
Code Injection in CRI-O
### Impact A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve container escape and arbitrary code execution as root on any node in the cluster. ### Patches The patches will be present in 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0 ### Workarounds - Users can set manage_ns_lifecycle to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option. - An admission webhook could be created to deny pods that specify a `+` in the sysctl value of a pod. - A [PodSecurityPolicy](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#podsecuritypolicy) [deprecated] could be created, specifying all sysctls as forbidden like so: ``` apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: sysctl-psp spec: forbiddenSysctls: - "*" ``` However, this option will not work if any sysctls are required by any pods in the cluster. ### Credits Credit for finding this vulnerability goes to John Walker and Manoj Ahuje of Crowdstrike. The CRI-O community deeply thanks them for the report. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues) * To make a report, email your vulnerability to the private [cncf-crio-security@lists.cncf.io](mailto:cncf-crio-security@lists.cncf.io) list with the security details and the details expected for [all CRI-O bug reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
{'CVE-2022-0811'}
2022-03-18T17:53:33Z
2022-03-15T20:13:38Z
HIGH
8.8
{'CWE-94'}
{'https://access.redhat.com/security/cve/CVE-2022-0811', 'https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7', 'https://bugs.gentoo.org/835336', 'https://bugzilla.redhat.com/show_bug.cgi?id=2059475', 'https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0811', 'https://github.com/advisories/GHSA-6x2m-w449-qwx7'}
null
GHSA
GHSA-vqhp-cxgc-6wmm
regular expression denial-of-service (ReDoS) in Bleach
### Impact `bleach.clean` behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to ``bleach.clean`` with an allowed tag with an allowed ``style`` attribute are vulnerable to ReDoS. For example, ``bleach.clean(..., attributes={'a': ['style']})``. ### Patches 3.1.4 ### Workarounds * do not whitelist the style attribute in `bleach.clean` calls * limit input string length ### References * https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 * https://www.regular-expressions.info/redos.html * https://blog.r2c.dev/posts/finding-python-redos-bugs-at-scale-using-dlint-and-r2c/ * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6817 ### Credits * Reported by schwag09 of r2c ### For more information If you have any questions or comments about this advisory: * Open an issue at https://github.com/mozilla/bleach/issues * Email us at security@mozilla.org
{'CVE-2020-6817'}
2021-08-23T14:43:19Z
2020-03-30T19:45:56Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-6817', 'https://github.com/advisories/GHSA-vqhp-cxgc-6wmm', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1623633', 'https://snyk.io/vuln/SNYK-PYTHON-BLEACH-561754', 'https://github.com/mozilla/bleach/security/advisories/GHSA-vqhp-cxgc-6wmm', 'https://github.com/mozilla/bleach/releases/tag/v3.1.4'}
null
GHSA
GHSA-vmjw-c2vp-p33c
Crash in NMS ops caused by integer conversion to unsigned
### Impact An attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0: ```python import tensorflow as tf tf.raw_ops.NonMaxSuppressionV5( boxes=[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]], scores=[1.0,2.0,3.0], max_output_size=-1, iou_threshold=0.5, score_threshold=0.5, soft_nms_sigma=1.0, pad_to_max_output_size=True) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/image/non_max_suppression_op.cc#L170-L271) uses a user controlled argument to resize a `std::vector`: ```cc const int output_size = max_output_size.scalar<int>()(); // ... std::vector<int> selected; // ... if (pad_to_max_output_size) { selected.resize(output_size, 0); // ... } ``` However, as `std::vector::resize` takes the size argument as a `size_t` and `output_size` is an `int`, there is an implicit conversion to usigned. If the attacker supplies a negative value, this conversion results in a crash. A similar issue occurs in `CombinedNonMaxSuppression`: ```python import tensorflow as tf tf.raw_ops.NonMaxSuppressionV5( boxes=[[[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]]]], scores=[[[1.0,2.0,3.0],[1.0,2.0,3.0],[1.0,2.0,3.0]]], max_output_size_per_class=-1, max_total_size=10, iou_threshold=score_threshold=0.5, pad_per_class=True, clip_boxes=True) ``` ### Patches We have patched the issue in GitHub commit [3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d](https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d) and commit [b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58](https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37669'}
2021-08-25T14:42:03Z
2021-08-25T14:42:03Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37669', 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58', 'https://github.com/advisories/GHSA-vmjw-c2vp-p33c', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'}
null
GHSA
GHSA-wm2m-xrrp-j74c
HTTP Request Smuggling in netius
netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks.
{'CVE-2020-7655'}
2021-06-18T18:31:40Z
2021-06-18T18:31:40Z
MODERATE
6.1
{'CWE-444'}
{'https://github.com/advisories/GHSA-wm2m-xrrp-j74c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7655', 'https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141'}
null
GHSA
GHSA-c9h5-hf8r-m97x
Dangling reference in flatbuffers
An issue was discovered in the flatbuffers crate through 2020-04-11 for Rust. read_scalar (and read_scalar_at) can transmute values without unsafe blocks.
{'CVE-2020-35864'}
2021-08-25T20:47:36Z
2021-08-25T20:47:36Z
HIGH
7.5
{'CWE-704'}
{'https://github.com/google/flatbuffers/issues/5825', 'https://github.com/advisories/GHSA-c9h5-hf8r-m97x', 'https://rustsec.org/advisories/RUSTSEC-2020-0009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35864'}
null
GHSA
GHSA-hg2p-2cvq-4ppv
Cross-site scripting in lazysizes
lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: data-vimeo, data-vimeoparams, data-youtube and data-ytparams which can be abused to inject malicious JavaScript.
{'CVE-2020-7642'}
2021-12-10T20:06:23Z
2021-12-10T20:06:23Z
LOW
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-hg2p-2cvq-4ppv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642', 'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144', 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
null
GHSA
GHSA-w749-p3v6-hccq
Possible code injection vulnerability in Rails / Active Storage
The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue.
{'CVE-2022-21831'}
2022-04-19T19:03:27Z
2022-03-08T21:25:54Z
HIGH
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://github.com/advisories/GHSA-w749-p3v6-hccq', 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI', 'https://rubysec.com/advisories/CVE-2022-21831/'}
null
GHSA
GHSA-6q3p-36f4-cwxv
Server-Side Request Forgery in UReport
UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.
{'CVE-2020-21122'}
2021-09-20T20:45:21Z
2021-09-20T20:45:21Z
HIGH
0
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21122', 'https://github.com/advisories/GHSA-6q3p-36f4-cwxv', 'https://github.com/youseries/ureport/issues/483'}
null
GHSA
GHSA-f89g-whpf-6q9m
Cross-Site Scripting in i18next
Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability. ## Proof of Concept ``` var init = i18n.init({debug: true}, function(){ var test = i18n.t('__firstName__ __lastName__', { escapeInterpolation: true, firstName: '__lastNameHTML__', lastName: '<script>', }); console.log(test); }); // equals "<script> &lt;script&gt;" ``` ## Recommendation Update to version 1.10.3 or later.
{'CVE-2017-16008'}
2021-01-08T18:53:47Z
2018-11-09T17:46:56Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16008', 'https://github.com/advisories/GHSA-f89g-whpf-6q9m', 'https://nodesecurity.io/advisories/325', 'https://www.npmjs.com/advisories/325', 'https://github.com/i18next/i18next/pull/443'}
null
GHSA
GHSA-qcj6-jqrg-4wp2
Template injection in thymeleaf-spring5
In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution.
{'CVE-2021-43466'}
2022-03-30T21:14:10Z
2021-11-10T19:52:33Z
CRITICAL
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43466', 'https://vuldb.com/?id.186365', 'https://github.com/thymeleaf/thymeleaf-spring/issues/263#issuecomment-977199524', 'https://gitee.com/wayne_wwang/wayne_wwang/blob/master/2021/10/31/ruoyi+thymeleaf-rce/index.html', 'https://github.com/advisories/GHSA-qcj6-jqrg-4wp2'}
null
GHSA
GHSA-3fw8-66wf-pr7m
methodOverride Middleware Reflected Cross-Site Scripting in connect
Connect is a stack of middleware that is executed in order in each request. The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override". Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser. ###Example: ``` ~ curl "localhost:3000" -d "_method=<script src=http://nodesecurity.io/xss.js></script>" Cannot <SCRIPT SRC=HTTP://NODESECURITY.IO/XSS.JS></SCRIPT> / ``` ## Recommendation Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.
{'CVE-2013-7370'}
2021-04-07T19:56:51Z
2020-08-31T22:41:27Z
LOW
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7370', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370', 'http://www.openwall.com/lists/oss-security/2014/04/21/2', 'https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting', 'https://www.npmjs.com/advisories/3', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370', 'https://security-tracker.debian.org/tracker/CVE-2013-7370', 'https://github.com/senchalabs/connect/issues/831', 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://access.redhat.com/security/cve/cve-2013-7370', 'https://github.com/advisories/GHSA-3fw8-66wf-pr7m', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-7c82-mp33-r854
Cross-site scripting in bootstrap-select
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
{'CVE-2019-20921'}
2021-05-07T16:47:54Z
2021-05-07T16:47:54Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457', 'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767', 'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://github.com/advisories/GHSA-7c82-mp33-r854', 'https://www.npmjs.com/advisories/1522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921'}
null
GHSA
GHSA-4mv4-gmmf-q382
Cross-Site Scripting in datatables
Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php. ## Recommendation Update to a version greater than 1.10.8.
{'CVE-2015-6584'}
2021-09-23T19:26:59Z
2020-08-31T22:42:29Z
HIGH
0
{'CWE-79'}
{'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6584', 'https://github.com/DataTables/DataTables/issues/602', 'https://github.com/advisories/GHSA-4mv4-gmmf-q382', 'https://www.npmjs.com/advisories/5', 'http://www.securityfocus.com/archive/1/archive/1/536437/100/0/threaded', 'http://www.securityfocus.com/archive/1/536437/100/0/threaded', 'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/', 'http://seclists.org/fulldisclosure/2015/Sep/37', 'http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html'}
null
GHSA
GHSA-5cp4-xmrw-59wf
XSS via JQLite DOM manipulation functions in AngularJS
### Summary XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`. ### Description JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`. One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218). If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM. This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/). ### Proof of concept ```javascript const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`  ``` Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is. As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute. ```javascript angular.element(document).append(inertPayload); ``` This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`. ### Patches The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2). ### Workarounds Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended. ### References https://github.com/advisories/GHSA-mhp6-pxh8-r675 https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://snyk.io/vuln/SNYK-JS-ANGULAR-570058
null
2022-04-19T19:02:31Z
2020-08-05T21:47:02Z
MODERATE
5
{'CWE-79'}
{'https://github.com/advisories/GHSA-5cp4-xmrw-59wf', 'https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf', 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2', 'https://github.com/advisories/GHSA-mhp6-pxh8-r675', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}
null
GHSA
GHSA-hvwm-2624-rp9x
Moderate severity vulnerability that affects org.apache.activemq:activemq-web-console
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.
{'CVE-2018-8006'}
2021-09-14T17:31:43Z
2018-10-30T20:48:58Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8006', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-hvwm-2624-rp9x', 'http://www.securityfocus.com/bid/105156', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt'}
null
GHSA
GHSA-68v9-3jjq-rvp4
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
{'CVE-2021-32716'}
2021-09-08T18:00:40Z
2021-09-08T18:00:40Z
MODERATE
4.4
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb', 'https://github.com/advisories/GHSA-68v9-3jjq-rvp4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}
null
GHSA
GHSA-q7fr-vqhq-v5xr
Improper Access Control in Apache ActiveMQ Artemis
While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.
{'CVE-2021-26118'}
2021-08-30T22:14:01Z
2021-06-16T17:39:05Z
HIGH
7.5
{'CWE-287', 'CWE-284'}
{'https://security.netapp.com/advisory/ntap-20210827-0002/', 'https://lists.apache.org/thread.html/rafd5d7cf303772a0118865262946586921a65ebd98fc24f56c812574@%3Cannounce.apache.org%3E', 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3CCAH%2BvQmMUNnkiXv2-d3ucdErWOsdnLi6CgnK%2BVfixyJvTgTuYig%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26118', 'https://github.com/advisories/GHSA-q7fr-vqhq-v5xr'}
null