ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-rxjp-mfm9-w4wr
|
Path Traversal in Django
|
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
|
{'CVE-2021-31542'}
|
2022-02-14T22:15:39Z
|
2021-06-04T21:15:56Z
|
HIGH
| 7.5
|
{'CWE-434', 'CWE-22'}
|
{'https://www.djangoproject.com/weblog/2021/may/04/security-releases/', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00005.html', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31542', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/', 'https://security.netapp.com/advisory/ntap-20210618-0001/', 'https://github.com/advisories/GHSA-rxjp-mfm9-w4wr', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'http://www.openwall.com/lists/oss-security/2021/05/04/3', 'https://groups.google.com/forum/#!forum/django-announce'}
| null |
GHSA
|
GHSA-wp2p-q35g-3rjj
|
Malicious Package in soket.io
|
All versions of `soket.io` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:29:21Z
|
2020-09-01T21:13:01Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/686', 'https://github.com/advisories/GHSA-wp2p-q35g-3rjj'}
| null |
GHSA
|
GHSA-m647-5wf9-3jp3
|
OS Command Injection in closure-compiler-stream
|
closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument "options" of the exports function in "index.js" can be controlled by users without any sanitization.
|
{'CVE-2020-7603'}
|
2021-07-28T18:53:04Z
|
2021-05-07T16:16:06Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-m647-5wf9-3jp3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7603', 'https://snyk.io/vuln/SNYK-JS-CLOSURECOMPILERSTREAM-560123'}
| null |
GHSA
|
GHSA-7h8v-2v8x-h264
|
SQL Injection in moodle
|
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
|
{'CVE-2020-25700'}
|
2021-03-29T20:42:19Z
|
2021-03-29T20:42:19Z
|
MODERATE
| 6.5
|
{'CWE-89'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25700', 'https://moodle.org/mod/forum/discuss.php?d=413938', 'https://github.com/advisories/GHSA-7h8v-2v8x-h264', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895427'}
| null |
GHSA
|
GHSA-6fh5-8wq8-w3wr
|
Prototype Pollution in unflatten
|
All versions of `unflatten` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-01T20:09:09Z
|
2020-09-04T15:09:55Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-6fh5-8wq8-w3wr', 'https://www.npmjs.com/advisories/1329'}
| null |
GHSA
|
GHSA-6v73-fgf6-w5j7
|
Code Injection in Spring Cloud Function
|
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
|
{'CVE-2022-22963'}
|
2022-05-03T17:41:55Z
|
2022-04-03T00:00:59Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://tanzu.vmware.com/security/cve-2022-22963', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005', 'https://github.com/advisories/GHSA-6v73-fgf6-w5j7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22963', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH'}
| null |
GHSA
|
GHSA-6xxj-gcjq-wgf4
|
SQL injection in prestashop/prestashop
|
### Impact
Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters
### Patches
The problem is fixed in 1.7.8.2
|
{'CVE-2021-43789'}
|
2022-04-19T19:03:16Z
|
2021-12-07T21:23:17Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6', 'https://github.com/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.com/PrestaShop/PrestaShop/issues/26623', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://cwe.mitre.org/data/definitions/89.html', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2'}
| null |
GHSA
|
GHSA-fqwf-pjwf-7vqv
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
|
{'CVE-2020-10673'}
|
2021-10-21T21:12:27Z
|
2020-05-15T18:59:04Z
|
MODERATE
| 0
| null |
{'https://github.com/FasterXML/jackson-databind/issues/2660', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00027.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10673', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-fqwf-pjwf-7vqv'}
| null |
GHSA
|
GHSA-4whc-pp4x-9pf3
|
Moderate severity vulnerability that affects jquery-rails and jquery-ujs
|
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
|
{'CVE-2015-1840'}
|
2021-09-01T18:38:28Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html', 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md', 'http://openwall.com/lists/oss-security/2015/06/16/15', 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3', 'http://www.securityfocus.com/bid/75239', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html', 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html'}
| null |
GHSA
|
GHSA-2p3x-qw9c-25hh
|
XStream can cause a Denial of Service.
|
### Impact
The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21341](https://x-stream.github.io/CVE-2021-21341.html).
### Credits
The vulnerability was discovered and reported by threedr3am.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21341'}
|
2022-04-19T19:02:49Z
|
2021-03-22T23:27:51Z
|
HIGH
| 7.5
|
{'CWE-835', 'CWE-400', 'CWE-502'}
|
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-2p3x-qw9c-25hh', 'http://x-stream.github.io/changes.html#1.4.16', 'https://x-stream.github.io/CVE-2021-21341.html', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21341', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-9p9m-jm8w-94p2
|
Improper Handling of Highly Compressed Data (Data Amplification) and Memory Allocation with Excessive Size Value in eventlet
|
### Impact
A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame.
### Patches
Version 0.31.0 restricts websocket frame to reasonable limits.
### Workarounds
Restricting memory usage via OS limits would help against overall machine exhaustion. No workaround to protect Eventlet process.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [eventlet](https://github.com/eventlet/eventlet/issues)
* Contact current maintainers. At 2021-03: temotor@gmail.com or https://t.me/temotor
|
{'CVE-2021-21419'}
|
2021-09-29T18:51:38Z
|
2021-05-07T15:50:36Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21419', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5JZP4LZOSP7CUAM3GIRW6PIAWKH5VGB/', 'https://github.com/advisories/GHSA-9p9m-jm8w-94p2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WJFSBPLCNSZNHYQC4QDRDFRTEZRMD2L/', 'https://github.com/eventlet/eventlet/security/advisories/GHSA-9p9m-jm8w-94p2'}
| null |
GHSA
|
GHSA-w8cj-mvf9-mpc9
|
OS Command injection in Bolt
|
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
|
{'CVE-2020-28925'}
|
2021-05-06T18:53:29Z
|
2021-05-06T18:53:29Z
|
MODERATE
| 5.3
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/compare/3.7.1...3.7.2', 'https://github.com/advisories/GHSA-w8cj-mvf9-mpc9', 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
| null |
GHSA
|
GHSA-gm2x-6475-g9r8
|
XSS Injection in Media Collection Title was possible
|
### Impact
A logged in admin user was possible to add a script injection (XSS) in the collection title which was executed.
### Workarounds
Manual patching the js files.
### For more information
If you have any questions or comments about this advisory:'
- Email us at [security@sulu.io](mailto:security@sulu.io)
|
{'CVE-2021-32737'}
|
2022-04-19T19:03:02Z
|
2021-07-02T18:32:18Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-gm2x-6475-g9r8', 'https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32737', 'https://github.com/sulu/sulu/releases/tag/1.6.41'}
| null |
GHSA
|
GHSA-3q6g-vf58-7m4g
|
Regular Expression Denial of Service in flask-restx
|
Flask RESTX contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service) in `email_regex`.
|
{'CVE-2021-32838'}
|
2022-04-19T19:03:07Z
|
2021-09-08T15:41:15Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da', 'https://github.com/python-restx/flask-restx/issues/372', 'https://github.com/advisories/GHSA-3q6g-vf58-7m4g', 'https://github.com/python-restx/flask-restx/security/advisories/GHSA-3q6g-vf58-7m4g', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32838', 'https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51', 'https://pypi.org/project/flask-restx/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/'}
| null |
GHSA
|
GHSA-cwp7-92h5-82wx
|
Downloads Resources over HTTP in haxe-dev
|
Affected versions of `haxe-dev` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `haxe-dev`.
## Recommendation
This package is actively maintained, yet after 2 years, the maintainer has not provided a patch for the vulnerability. This likely means that the maintainer has decided to accept the risk, and this vulnerability will never be patched.
Because of this, the best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10637'}
|
2021-01-08T18:55:36Z
|
2019-02-18T23:47:10Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10637', 'https://www.npmjs.com/advisories/237', 'https://github.com/advisories/GHSA-cwp7-92h5-82wx', 'https://nodesecurity.io/advisories/237'}
| null |
GHSA
|
GHSA-7pm4-g2qj-j85x
|
CSRF attack via CORS preflight requests with Spring MVC or Spring WebFlux
|
Spring Framework, versions 5.2.x prior to 5.2.3 are vulnerable to CSRF attacks through CORS preflight requests that target Spring MVC (spring-webmvc module) or Spring WebFlux (spring-webflux module) endpoints. Only non-authenticated endpoints are vulnerable because preflight requests should not include credentials and therefore requests should fail authentication. However a notable exception to this are Chrome based browsers when using client certificates for authentication since Chrome sends TLS client certificates in CORS preflight requests in violation of spec requirements. No HTTP body can be sent or received as a result of this attack.
|
{'CVE-2020-5397'}
|
2022-04-13T16:23:12Z
|
2020-01-21T20:59:33Z
|
MODERATE
| 5.3
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-7pm4-g2qj-j85x', 'https://github.com/spring-projects/spring-framework', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://pivotal.io/security/cve-2020-5397', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5397', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-r2v5-5vcr-h3vq
|
Cross-site Scripting in Apache Zeppelin
|
Apache Zeppelin prior to 0.8.0 had a stored XSS issue via Note permissions. Issue reported by "Josna Joseph".
|
{'CVE-2018-1328'}
|
2021-08-03T17:54:46Z
|
2019-04-24T16:07:36Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://github.com/advisories/GHSA-r2v5-5vcr-h3vq', 'https://zeppelin.apache.org/releases/zeppelin-release-0.8.0.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1328'}
| null |
GHSA
|
GHSA-725f-3pw7-rq6x
|
Malicious Package in 8.9.4
|
Versions 1.0.2, 1.0.3, 1.0.4 and 1.0.5 of `8.9.4` contain malicious code as a preinstall script. The package reads the system's SSH keys but does not upload it to a remote server.
## Recommendation
Remove the package from your environment. There is no evidence of further compromise at the moment.
| null |
2021-09-29T20:46:53Z
|
2020-09-03T21:09:47Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1201', 'https://github.com/advisories/GHSA-725f-3pw7-rq6x'}
| null |
GHSA
|
GHSA-vwqq-5vrc-xw9h
|
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender
|
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender.
|
{'CVE-2020-9488'}
|
2022-04-22T18:27:13Z
|
2020-06-05T14:15:51Z
|
LOW
| 3.7
|
{'CWE-295'}
|
{'https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.debian.org/security/2021/dsa-5020', 'https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E', 'https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9488', 'https://security.netapp.com/advisory/ntap-20200504-0003/', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'https://github.com/advisories/GHSA-vwqq-5vrc-xw9h', 'https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4J2-2819', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html', 'https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E'}
| null |
GHSA
|
GHSA-q4qq-fm7q-cwp5
|
Multiple XSS Filter Bypasses in validator
|
Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter.
## Proof of Concept
Various inputs that could bypass the filter were discovered:
Improper parsing of nested tags:
```
<s <onmouseover="alert(1)"> <;s onmouseover="alert(1)">This is a test</s>
```
Incomplete filtering of javascript: URIs:
```
<a href="javascriptJ a V a S c R iPt::alert(1)" "<s>">test</a>
```
UI Redressing:
```
<div style="z-index: 9999999; background-color: green; width: 100%; height: 100%">
<h1>You have won</h1>Please click the link and enter your login details:
<a href="http://example.com/">http://good.com</a>
</div>
```
Bypass via Nested Forbidden Strings:
```
<scrRedirecRedirect 302t 302ipt type="text/javascript">prompt(1);</scrRedirecRedirect 302t 302ipt>
```
Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of.
## Recommendation
If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed.
|
{'CVE-2013-7454'}
|
2021-09-16T19:30:37Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5', 'https://www.npmjs.com/advisories/41', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454', 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html', 'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/', 'https://nodesecurity.io/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
| null |
GHSA
|
GHSA-32wx-4gxx-h48f
|
Users can edit the tags of any discussion
|
This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020.
### Impact
This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API.
Users were able to remove any existing tag, and add any tag in which they are allowed to create discussions. The chosen tags still had to match the configured Tags minimums and maximums.
By moving the discussion to new tags, users were able to go around permissions applied to restricted tags. Depending on the setup, this can include publicly exposing content that was only visible to certain groups, or gain the ability to interact with content where such interaction was limited.
The full impact varies depending on the configuration of permissions and restricted tags, and which community extensions are being used. All tag-scoped permissions offered by extensions are impacted by this ability to go around them.
Forums that don't use restricted tags and don't use any extension that relies on tags for access control should not see any security impact. An update is still required to stop users from being able to change any discussion's tags.
Forums that don't use the Tags extension are unaffected.
### Patches
The fix will be available in version v0.1.0-beta.14 with Flarum beta 14. The fix has already been back-ported to Flarum beta 13 as version v0.1.0-beta.13.2 of the Tags extension.
### Workarounds
Version v0.1.0-beta.13.2 of the Tags extension allows existing Flarum beta 13 forums to fix the issue without the need to update to beta 14.
Forums that have not yet updated to Flarum beta 13 are encouraged to update as soon as possible.
### References
- [Release announcement](https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132)
- [GitHub issue](https://github.com/flarum/core/issues/2355)
### For more information
If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).
If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
| null |
2022-04-19T19:02:36Z
|
2021-01-29T18:13:32Z
|
MODERATE
| 0
|
{'CWE-639'}
|
{'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d', 'https://github.com/advisories/GHSA-32wx-4gxx-h48f', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132', 'https://packagist.org/packages/flarum/tags', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://github.com/flarum/core/issues/2355'}
| null |
GHSA
|
GHSA-4vr3-9v7h-5f8v
|
Low severity vulnerability that affects Gw2Sharp
|
## Leaking cached authenticated requests
### Impact
If you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug.
When using an instance of `MemoryCacheMethod` and using it with multiple instances of `Gw2WebApiClient`, there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint.
The occurence of this is limited however. The Guild Wars 2 API doesn't use the `Expires` header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen.
### Patches
This bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id.
### Workarounds
For version 0.3.0 and lower, you can use one separate instance of `MemoryCacheMethod` per `Gw2WebApiClient` if you need to use it.
### For more information
If you have any questions or comments about this advisory, you can open an issue in [the Gw2Sharp repository](https://github.com/Archomeda/Gw2Sharp) or contact me on [Discord](https://discord.gg/hNcpDT3).
| null |
2021-12-03T14:36:24Z
|
2019-06-18T15:38:41Z
|
LOW
| 0
| null |
{'https://github.com/advisories/GHSA-4vr3-9v7h-5f8v', 'https://github.com/Archomeda/Gw2Sharp/security/advisories/GHSA-4vr3-9v7h-5f8v'}
| null |
GHSA
|
GHSA-f545-vpwp-r9j7
|
showdoc is vulnerable to URL Redirection to Untrusted Site
|
showdoc is vulnerable to URL Redirection to Untrusted Site.
|
{'CVE-2021-3989'}
|
2021-12-03T20:41:35Z
|
2021-12-03T20:41:35Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989', 'https://github.com/advisories/GHSA-f545-vpwp-r9j7', 'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5'}
| null |
GHSA
|
GHSA-gcj7-j438-hjj2
|
Smokescreen SSRF via deny list bypass
|
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure.
Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by appending a dot to the end of user-supplied URLs, or by providing input in a different letter case.
### Recommendation
Upgrade Smokescreen to version 0.0.3 or later.
### Acknowledgements
Thanks to [Grzegorz Niedziela](https://twitter.com/gregxsunday) for reporting the issue.
### For more information
Email us at security@stripe.com
|
{'CVE-2022-24825'}
|
2022-04-28T19:13:16Z
|
2022-04-07T22:10:22Z
|
MODERATE
| 5.8
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24825', 'https://github.com/advisories/GHSA-gcj7-j438-hjj2', 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b', 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2'}
| null |
GHSA
|
GHSA-8c89-2vwr-chcq
|
Heap buffer overflow in `QuantizedResizeBilinear`
|
### Impact
An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization:
```python
import tensorflow as tf
images = tf.constant([], shape=[0], dtype=tf.qint32)
size = tf.constant([], shape=[0], dtype=tf.int32)
min = tf.constant([], dtype=tf.float32)
max = tf.constant([], dtype=tf.float32)
tf.raw_ops.QuantizedResizeBilinear(images=images, size=size, min=min, max=max, align_corners=False, half_pixel_centers=False)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/50711818d2e61ccce012591eeb4fdf93a8496726/tensorflow/core/kernels/quantized_resize_bilinear_op.cc#L705-L706) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly:
```cc
const float in_min = context->input(2).flat<float>()(0);
const float in_max = context->input(3).flat<float>()(0);
```
However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow.
### Patches
We have patched the issue in GitHub commit [f6c40f0c6cbf00d46c7717a26419f2062f2f8694](https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29537'}
|
2021-05-21T14:22:35Z
|
2021-05-21T14:22:35Z
|
LOW
| 2.5
|
{'CWE-131', 'CWE-787'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq', 'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29537', 'https://github.com/advisories/GHSA-8c89-2vwr-chcq'}
| null |
GHSA
|
GHSA-7638-r9r3-rmjj
|
chroot isolation: environment value leakage to intermediate processes
|
### Impact
When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original `buildah` process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during `buildah run`. The commands that `buildah` is instructed to run can read that information if they choose to.
### Patches
Users should upgrade packages, or images which contain packages, to include version 1.21.3 or later.
### Workarounds
As a workaround, invoking `buildah` in a container under `env -i` to have it started with a reinitialized environment should prevent the leakage.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [buildah](https://github.com/containers/buildah/issues)
* Email us at [the buildah general mailing list](mailto:buildah@lists.buildah.io), or [the podman security mailing list](mailto:security@lists.podman.io) if it's sensitive.
|
{'CVE-2021-3602'}
|
2022-03-18T21:03:35Z
|
2021-07-19T15:19:09Z
|
MODERATE
| 5.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-7638-r9r3-rmjj', 'https://ubuntu.com/security/CVE-2021-3602', 'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264', 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj'}
| null |
GHSA
|
GHSA-4pwq-fj89-6rjc
|
Cross-site Scripting in Apache Airflow
|
In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit.
|
{'CVE-2020-13944'}
|
2021-06-18T18:29:54Z
|
2021-06-18T18:29:54Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/11/2', 'https://github.com/advisories/GHSA-4pwq-fj89-6rjc', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cusers.airflow.apache.org%3E', 'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/05/01/2', 'https://lists.apache.org/thread.html/r4656959c8ed06c1f6202d89aa4e67b35ad7bdba5a666caff3fea888e@%3Cusers.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944', 'https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cdev.airflow.apache.org%3E'}
| null |
GHSA
|
GHSA-jjjr-3jcw-f8v6
|
Potential Observable Timing Discrepancy in Wagtail
|
### Impact
A potential timing attack exists on pages or documents that have been protected with a shared password through Wagtail's "Privacy" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. (This is [understood to be feasible on a local network, but not on the public internet](https://groups.google.com/d/msg/django-developers/iAaq0pvHXuA/fpUuwjK3i2wJ).)
Privacy settings that restrict access to pages / documents on a per-user or per-group basis (as opposed to a shared password) are unaffected by this vulnerability.
### Patches
Patched versions have been released as Wagtail 2.7.3 (for the LTS 2.7 branch), Wagtail 2.8.2 and Wagtail 2.9.
### Workarounds
Site owners who are unable to upgrade to the new versions can use [user- or group-based privacy restrictions](https://docs.wagtail.io/en/stable/advanced_topics/privacy.html) to restrict access to sensitive information; these are unaffected by this vulnerability.
|
{'CVE-2020-11037'}
|
2022-04-19T19:02:25Z
|
2020-05-07T18:04:53Z
|
MODERATE
| 6.1
|
{'CWE-208'}
|
{'https://github.com/advisories/GHSA-jjjr-3jcw-f8v6', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11037'}
| null |
GHSA
|
GHSA-f8h4-7rgh-q2gm
|
Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord`
|
### Impact
The implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault:
```python
import tensorflow as tf
dataset = tf.data.Dataset.range(3)
dataset = tf.data.experimental.to_variant(dataset)
tf.raw_ops.ExperimentalDatasetToTFRecord(
input_dataset=dataset,
filename='/tmp/output',
compression_type='')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/data/experimental/to_tf_record_op.cc#L93-L102) assumes that all records in the dataset are of string type. However, there is no check for that, and the example given above uses numeric types.
### Patches
We have patched the issue in GitHub commit [e0b6e58c328059829c3eb968136f17aa72b6c876](https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37650'}
|
2021-08-25T14:43:24Z
|
2021-08-25T14:43:24Z
|
HIGH
| 7.8
|
{'CWE-787', 'CWE-120'}
|
{'https://github.com/advisories/GHSA-f8h4-7rgh-q2gm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37650', 'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}
| null |
GHSA
|
GHSA-gf8q-jrpm-jvxq
|
URL parsing in node-forge could lead to undesired behavior.
|
### Impact
The regex used for the `forge.util.parseUrl` API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior.
### Patches
`forge.util.parseUrl` and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API.
### Workarounds
Ensure code does not directly or indirectly call `forge.util.parseUrl` with untrusted input.
### References
- https://www.huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge)
* Email us at support@digitalbazaar.com
| null |
2022-01-08T00:22:02Z
|
2022-01-08T00:22:02Z
|
LOW
| 0
| null |
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq', 'https://github.com/advisories/GHSA-gf8q-jrpm-jvxq'}
| null |
GHSA
|
GHSA-j89m-gcjf-6ghp
|
Out-of-bounds write in ChakraCore
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
|
{'CVE-2020-0825'}
|
2021-07-28T18:57:02Z
|
2021-07-28T18:57:02Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825', 'https://github.com/advisories/GHSA-j89m-gcjf-6ghp'}
| null |
GHSA
|
GHSA-49h4-g8p5-jgq6
|
Moderate severity vulnerability that affects org.apache.juddi:juddi-client
|
After logging into the portal, the logout jsp page redirects the browser back to the login page after. It is feasible for malicious users to redirect the browser to an unintended web page in Apache jUDDI 3.1.2, 3.1.3, 3.1.4, and 3.1.5 when utilizing the portlets based user interface also known as 'Pluto', 'jUDDI Portal', 'UDDI Portal' or 'uddi-console'. User session data, credentials, and auth tokens are cleared before the redirect.
|
{'CVE-2015-5241'}
|
2021-09-01T14:11:51Z
|
2018-10-16T19:49:32Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'http://juddi.apache.org/security.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5241', 'https://github.com/advisories/GHSA-49h4-g8p5-jgq6'}
| null |
GHSA
|
GHSA-vxf5-wxwp-m7g9
|
Open Redirect in Next.js
|
Next.js is an open source website development framework to be used with the React library. In affected versions specially encoded paths could be used when `pages/_error.js` was statically generated, allowing an open redirect to occur to an external site. In general, this redirect does not directly harm users although it can allow for phishing attacks by redirecting to an attacker's domain from a trusted domain.
### Impact
- **Affected:** Users of Next.js between `10.0.5` and `10.2.0`
- **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` without `getInitialProps`
- **Affected:** Users of Next.js between `11.0.0` and `11.0.1` using `pages/_error.js` and `next export`
- **Not affected**: Deployments on Vercel ([vercel.com](https://vercel.com)) are not affected
- **Not affected:** Deployments **with** `pages/404.js`
- Note that versions prior to 0.9.9 package `next` npm package hosted a different utility (0.4.1 being the latest version of that codebase), and this advisory does not apply to those versions.
We recommend upgrading to the latest version of Next.js to improve the overall security of your application.
### Patches
https://github.com/vercel/next.js/releases/tag/v11.1.0
|
{'CVE-2021-37699'}
|
2022-04-28T20:32:19Z
|
2021-08-12T14:51:14Z
|
MODERATE
| 6.9
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37699', 'https://github.com/vercel/next.js/releases/tag/v11.1.0', 'https://github.com/vercel/next.js/security/advisories/GHSA-vxf5-wxwp-m7g9', 'https://github.com/advisories/GHSA-vxf5-wxwp-m7g9'}
| null |
GHSA
|
GHSA-pmcr-2rhp-36hr
|
SQL injection in github.com/navidrome/navidrome
|
model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords).
|
{'CVE-2022-23857'}
|
2022-01-27T16:23:02Z
|
2022-01-27T16:23:02Z
|
MODERATE
| 0
|
{'CWE-89'}
|
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857', 'https://github.com/advisories/GHSA-pmcr-2rhp-36hr', 'https://github.com/navidrome/navidrome/releases/tag/v0.47.5'}
| null |
GHSA
|
GHSA-gfv4-2vhm-486m
|
Hijacked Environment Variables in node-fabric
|
The `node-fabric` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16052'}
|
2021-01-08T18:47:31Z
|
2018-07-23T20:50:10Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-gfv4-2vhm-486m', 'https://nodesecurity.io/advisories/489', 'https://www.npmjs.com/advisories/489', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16052'}
| null |
GHSA
|
GHSA-8fvr-5rqf-3wwh
|
Information Exposure in Docker Engine
|
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
|
{'CVE-2015-3630'}
|
2022-04-12T22:39:05Z
|
2022-02-15T01:57:18Z
|
HIGH
| 8.4
|
{'CWE-285'}
|
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://github.com/advisories/GHSA-8fvr-5rqf-3wwh', 'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660', 'https://seclists.org/fulldisclosure/2015/May/28', 'https://www.securityfocus.com/bid/74566', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3630', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html'}
| null |
GHSA
|
GHSA-vj88-5667-w56p
|
Singleton lacks bounds on Send and Sync.
|
`Singleton<T>` is meant to be a static object that can be initialized lazily. In
order to satisfy the requirement that `static` items must implement `Sync`,
`Singleton` implemented both `Sync` and `Send` unconditionally.
This allows for a bug where non-`Sync` types such as `Cell` can be used in
singletons and cause data races in concurrent programs.
The flaw was corrected in commit `b0d2bd20e` by adding trait bounds, requiring
the contaiend type to implement `Sync`.
| null |
2021-08-25T21:00:11Z
|
2021-08-25T21:00:11Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://github.com/advisories/GHSA-vj88-5667-w56p', 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html', 'https://github.com/RusPiRo/ruspiro-singleton/issues/10'}
| null |
GHSA
|
GHSA-jqfh-8hw5-fqjr
|
Improper Handling of Exceptional Conditions in detect-character-encoding
|
### Impact
In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash.
### Patches
The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, accepting data from untrusted sources over a network and passing it directly to detect-character-encoding. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const bodyParser = require("body-parser");
const detectCharacterEncoding = require("detect-character-encoding");
const app = express();
app.use(bodyParser.raw());
app.post("/", (req, res) => {
const charsetMatch = detectCharacterEncoding(req.body);
res.end(charsetMatch.encoding);
});
app.listen(3000);
```
`printf "\xAA" | curl --request POST --header "Content-Type: application/octet-stream" --data-binary @- http://localhost:3000` crashes the server.
|
{'CVE-2021-39157'}
|
2022-04-19T19:03:06Z
|
2021-08-25T14:44:48Z
|
HIGH
| 7.5
|
{'CWE-755'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39157', 'https://github.com/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0', 'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a', 'https://github.com/sonicdoe/detect-character-encoding/issues/15'}
| null |
GHSA
|
GHSA-p979-4mfw-53vg
|
HTTP Request Smuggling in Netty
|
Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling.
|
{'CVE-2019-16869'}
|
2022-04-11T20:49:20Z
|
2019-10-11T18:41:23Z
|
HIGH
| 7.5
|
{'CWE-444'}
|
{'https://lists.apache.org/thread.html/cbf6e6a04cb37e9320ad20e437df63beeab1755fc0761918ed5c5a6e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/0acadfb96176768caac79b404110df62d14d30aa9d53b6dbdb1407ac@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/35961d1ae00849974353a932b4fef12ebce074541552eceefa04f1fd@%3Cdev.olingo.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/6e1e34c0d5635a987d595df9e532edac212307243bb1b49eead6d55b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bdf7a5e597346a75d2d884ca48c767525e35137ad59d8f10b8fc943c@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/3e6d7aae1cca10257e3caf2d69b22f74c875f12a1314155af422569d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/799eb85d67cbddc1851a3e63a07b55e95b2f44f1685225d38570ce89@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/e192fe8797c192679759ffa6b15e4d0806546945a41d8ebfbc6ee3ac@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r90030b0117490caed526e57271bf4d7f9b012091ac5083c895d16543@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/af6e9c2d716868606523857a4cd7a5ee506e6d1710f5fb0d567ec030@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/re0b78a3d0a4ba2cf9f4e14e1d05040bde9051d5c78071177186336c9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/64b10f49c68333aaecf00348c5670fe182e49fd60d45c4a3ab241f8b@%3Cissues.spark.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://lists.apache.org/thread.html/r8402d67fdfe9cf169f859d52a7670b28a08eff31e54b522cc1432532@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/76540c8b0ed761bfa6c81fa28c13057f13a5448aed079d656f6a3c79@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5d243a5f8ed8b83c0104e321aa420e5e98792a95749e3c9a54c0b9@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/d7d530599dc7813056c712213e367b68cdf56fb5c9b73f864870bc4c@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/cf5aa087632ead838f8ac3a42e9837684e7afe6e0fcb7704e0c73bc0@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/d14f721e0099b914daebe29bca199fde85d8354253be9d6d3d46507a@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/19fed892608db1efe5a5ce14372137669ff639df0205323959af7de3@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r3225f7dfe6b8a37e800ecb8e31abd7ac6c4312dbd3223dd8139c37bb@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/2e1cf538b502713c2c42ffa46d81f4688edb5676eb55bd9fc4b4fed7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r831e0548fad736a98140d0b3b7dc575af0c50faea0b266434ba813cc@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/9128111213b7b734ffc85db08d8f789b00a85a7f241b708e55debbd0@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/380f6d2730603a2cd6b0a8bea9bcb21a86c199147e77e448c5f7390b@%3Ccommits.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16869', 'https://seclists.org/bugtraq/2020/Jan/6', 'https://www.debian.org/security/2020/dsa-4597', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://github.com/netty/netty/compare/netty-4.1.41.Final...netty-4.1.42.Final', 'https://lists.apache.org/thread.html/2494a2ac7f66af6e4646a4937b17972a4ec7cd3c7333c66ffd6c639d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/e39931d7cdd17241e69a0a09a89d99d7435bcc59afee8a9628d67769@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/d3eb0dbea75ef5c400bd49dfa1901ad50be606cca3cb29e0d01b6a54@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00035.html', 'https://lists.apache.org/thread.html/re78eaef7d01ad65c370df30e45c686fffff00b37f7bfd78b26a08762@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/b3dda6399a0ea2b647624b899fd330fca81834e41b13e3e11e1002d8@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/rcddf723a4b4117f8ed6042e9ac25e8c5110a617bab77694b61b14833@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r86befa74c5cd1482c711134104aec339bf7ae879f2c4437d7ec477d4@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/51923a9ba513b2e816e02a9d1fd8aa6f12e3e4e99bbd9dc884bccbbe@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/681493a2f9b63f5b468f741d88d1aa51b2cfcf7a1c5b74ea8c4343fb@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/37ed432b8eb35d8bd757f53783ec3e334bd51f514534432bea7f1c3d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r73c400ab66d79821dec9e3472f0e2c048d528672bdb0f8bf44d7cb1f@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/f6c5ebfb018787c764f000362d59e4b231c0a36b6253aa866de8c64e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rf2bf8e2eb0a03227f5bc100b544113f8cafea01e887bb068e8d1fa41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://github.com/advisories/GHSA-p979-4mfw-53vg', 'https://lists.apache.org/thread.html/b264fa5801e87698e9f43f2b5585fbc5ebdc26c6f4aad861b258fb69@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/r0c3d49bfdbc62fd3915676433cc5899c5506d06da1c552ef1b7923a5@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://lists.apache.org/thread.html/rc7eb5634b71d284483e58665b22bf274a69bd184d9bd7ede52015d91@%3Ccommon-issues.hadoop.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://github.com/netty/netty/issues/9571', 'https://lists.apache.org/thread.html/rb3361f6c6a5f834ad3db5e998c352760d393c0891b8d3bea90baa836@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/r0aa8b28e76ec01c697b15e161e6797e88fc8d406ed762e253401106e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/a0f77c73af32cbe4ff0968bfcbbe80ae6361f3dccdd46f3177547266@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2c59428f34d4757702f9ae739a8795bda7bea97b857e708a9c62c6@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/6063699b87b501ecca8dd3b0e82251bfc85f29363a9b46ac5ace80cf@%3Cdev.olingo.apache.org%3E', 'https://lists.apache.org/thread.html/rb25b42f666d2cac5e6e6b3f771faf60d1f1aa58073dcdd8db14edf8a@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/860acce024d79837e963a51a42bab2cef8e8d017aad2b455ecd1dcf0@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/ee6faea9e542c0b90afd70297a9daa203e20d41aa2ac7fca6703662f@%3Cissues.spark.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://lists.apache.org/thread.html/b2cd51795f938632c6f60a4c59d9e587fbacd7f7d0e0a3684850a30f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/b3ddeebbfaf8a288d7de8ab2611cf2609ab76b9809f0633248546b7c@%3Cissues.spark.apache.org%3E'}
| null |
GHSA
|
GHSA-7c6q-jqwc-4423
|
Path Traversal in Crafter CMS Crafter Studio
|
In Crafter CMS Crafter Studio 3.0.1 a directory traversal vulnerability exists which allows unauthenticated attackers to overwrite files from the operating system which can lead to RCE.
|
{'CVE-2017-15681'}
|
2022-02-09T23:07:59Z
|
2022-02-09T23:07:59Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15681', 'https://github.com/advisories/GHSA-7c6q-jqwc-4423', 'http://crafter.com', 'https://docs.craftercms.org/en/3.0/security/advisory.html'}
| null |
GHSA
|
GHSA-5j5w-g665-5m35
|
Ambiguous OCI manifest parsing
|
### Impact
In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of containerd prior to 1.4.12 and 1.5.8 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.
### Patches
This issue has been fixed in containerd 1.4.12 and 1.5.8. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected.
### Workarounds
Ensure you only pull images from trusted sources.
### References
https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
| null |
2021-11-18T16:08:58Z
|
2021-11-18T16:08:58Z
|
LOW
| 3
|
{'CWE-843'}
|
{'https://github.com/advisories/GHSA-5j5w-g665-5m35', 'https://github.com/containerd/containerd/releases/tag/v1.5.8', 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh', 'https://github.com/containerd/containerd/releases/tag/v1.4.12', 'https://github.com/containerd/containerd/security/advisories/GHSA-5j5w-g665-5m35', 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}
| null |
GHSA
|
GHSA-28xx-8j99-m32j
|
Malicious Package in nginxbeautifier
|
Version 1.0.14 of `nginxbeautifier` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.14 of this module is found installed you will want to replace it with a version before or after 1.0.14. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-10-01T13:11:55Z
|
2020-09-01T20:37:25Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-28xx-8j99-m32j', 'https://www.npmjs.com/advisories/639'}
| null |
GHSA
|
GHSA-gc67-crq6-hgh5
|
Improper Input Validation in Parquet-MR
|
Improper Input Validation vulnerability in Parquet-MR of Apache Parquet allows an attacker to DoS by malicious Parquet files. This issue affects Apache Parquet-MR version 1.9.0 and later versions.
|
{'CVE-2021-41561'}
|
2022-01-06T23:59:25Z
|
2022-01-06T23:59:25Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41561', 'https://github.com/advisories/GHSA-gc67-crq6-hgh5', 'https://lists.apache.org/thread/1bjlscbqtfzl160hrm9lnpjpppp5z3zr', 'http://www.openwall.com/lists/oss-security/2021/12/20/1'}
| null |
GHSA
|
GHSA-h72c-w3q3-55qq
|
OS Command Injection in jw.util
|
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
|
{'CVE-2020-13388'}
|
2021-06-02T21:45:13Z
|
2021-06-02T21:45:12Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://joel-malwarebenchmark.github.io/blog/2020/04/27/cve-2020-13388-jw-util-vulnerability/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13388', 'https://github.com/advisories/GHSA-h72c-w3q3-55qq', 'https://security.netapp.com/advisory/ntap-20200528-0002/', 'https://joel-malwarebenchmark.github.io'}
| null |
GHSA
|
GHSA-29f8-q7mf-7cqj
|
Logic error in Apache Pinot
|
In 0.9.3 or older versions of Apache Pinot segment upload path allowed segment directories to be imported into pinot tables. In pinot installations that allow open access to the controller a specially crafted request can potentially be exploited to cause disruption in pinot service. Pinot release 0.10.0 fixes this. See https://docs.pinot.apache.org/basics/releases/0.10.0
|
{'CVE-2022-23974'}
|
2022-04-17T15:34:43Z
|
2022-04-06T00:01:28Z
|
HIGH
| 7.5
|
{'CWE-674'}
|
{'https://docs.pinot.apache.org/basics/releases/0.10.0', 'https://github.com/advisories/GHSA-29f8-q7mf-7cqj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23974', 'https://lists.apache.org/thread/3dk8pf1n02p8oj2j3czbtchyjsf8khwr', 'https://github.com/apache/pinot/pull/7969'}
| null |
GHSA
|
GHSA-56hp-xqp3-w2jf
|
Repository credentials passed to alternate domain
|
While working on the Helm source, a Helm core maintainer discovered a situation where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository.
### Impact
The `index.yaml` within a Helm chart repository contains a reference where to get the chart archive for each version of a chart. The reference can be relative to the `index.yaml` file or a URL to location. The URL can point to any domain and this is a feature leveraged by Helm users. For example, an `index.yaml` file can be hosted on GitHub pages while the chart archives are hosted as GitHub releases. These are on different domain names and the `index.yaml` file points to the other domain.
When a username and password were associated with a Helm repository the username and password were also passed on to other domains referenced in the `index.yaml` file. This occurred when Helm went to retrieve a specific chart archive on the other domain.
### Patches
This issue has been resolved in 3.6.1.
There is a slight behavior change to credential handling with regard to repositories. Usernames and passwords are only passed to the URL location of the Helm repository by default. The username and password are scoped to the scheme, host, and port of the Helm repository. To pass the username and password to other domains Helm may encounter when it goes to retrieve a chart, the new `--pass-credentials` flag can be used. This flag restores the old behavior for a single repository as an opt-in behavior.
### Workarounds
If you use a username and password for a Helm repository you can audit the Helm repository in order to check for another domain being used that could have received the credentials. In the `index.yaml` file for that repository, look for another domain in the `urls` list for the chart versions. If there is another domain found and that chart version was pulled or installed the credentials would have been passed on.
### For more information
Helm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.
| null |
2021-06-23T18:14:15Z
|
2021-06-23T18:14:15Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-56hp-xqp3-w2jf', 'https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf'}
| null |
GHSA
|
GHSA-j34v-3552-5r7j
|
Multiple security issues in Pomerium's embedded envoy
|
Envoy, which Pomerium is based on, has issued multiple CVEs impacting stability and security.
Though Pomerium may not be vulnerable to all of the issues, it is recommended that all users upgrade to Pomerium v0.16.4 as soon as possible to minimize risk.
### Impact
- Possible DoS or crash
- Resources available to unauthorized users
- Pomerium may trust upstream certificates that should not be trusted
### Patches
Patched in v0.16.4
### Workarounds
No
### References
[Envoy Security Announcement](https://groups.google.com/g/envoy-security-announce/c/QBGxoqZdTR4)
* [CVE-2021-43824](https://github.com/envoyproxy/envoy/security/advisories/GHSA-vj5m-rch8-5r2p) (CVSS Score 6.5, Medium): Envoy 1.21.0 and earlier - Potential null pointer dereference when using JWT filter safe_regex match
* [CVE-2021-43825](https://github.com/envoyproxy/envoy/security/advisories/GHSA-h69p-g6xg-mhhh) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when response filters increase response data, and increased data exceeds downstream buffer limits.
* [CVE-2021-43826](https://github.com/envoyproxy/envoy/security/advisories/GHSA-cmx3-fvgf-83mf) (CVSS Score 6.1, Medium): Envoy 1.21.0 and earlier - Use-after-free when tunneling TCP over HTTP, if downstream disconnects during upstream connection establishment
* [CVE-2022-21654](https://github.com/envoyproxy/envoy/security/advisories/GHSA-5j4x-g36v-m283) (CVSS Score 7.3, High): Envoy 1.7.0 and later - Incorrect configuration handling allows mTLS session re-use without re-validation after validation settings have changed.
* [CVE-2022-21655](https://github.com/envoyproxy/envoy/security/advisories/GHSA-7r5p-7fmh-jxpg) (CVSS Score 7.5, High): Envoy 1.21 and earlier - Incorrect handling of internal redirects to routes with a direct response entry
* [CVE-2022-21657](https://github.com/envoyproxy/envoy/security/advisories/GHSA-837m-wjrv-vm5g) (CVSS Score 3.1, Low): Envoy 1.20.1 and earlier - X.509 Extended Key Usage and Trust Purposes bypass
### For more information
If you have any questions or comments about this advisory:
Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
Email us at [security@pomerium.com](mailto:security@pomerium.com)
| null |
2022-03-02T14:45:17Z
|
2022-03-01T22:04:17Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-j34v-3552-5r7j', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j34v-3552-5r7j'}
| null |
GHSA
|
GHSA-5fvx-5p2r-4mvp
|
Open Redirect in firefly-iii
|
firefly-iii is vulnerable to URL Redirection to Untrusted Site
|
{'CVE-2021-3851'}
|
2021-10-25T20:08:27Z
|
2021-10-21T17:48:41Z
|
MODERATE
| 5
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3851', 'https://github.com/advisories/GHSA-5fvx-5p2r-4mvp', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
| null |
GHSA
|
GHSA-5pq8-2q24-mj3p
|
Downloads Resources over HTTP in fis-parser-sass-bin
|
Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10660'}
|
2021-01-08T19:48:53Z
|
2019-02-18T23:45:03Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/269', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660', 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p', 'https://www.npmjs.com/advisories/269'}
| null |
GHSA
|
GHSA-qgmg-gppg-76g5
|
Inefficient Regular Expression Complexity in validator.js
|
validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3765'}
|
2021-11-03T17:34:45Z
|
2021-11-03T17:34:45Z
|
MODERATE
| 5.3
|
{'CWE-1333'}
|
{'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/advisories/GHSA-qgmg-gppg-76g5', 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}
| null |
GHSA
|
GHSA-4pv3-63jw-4jw2
|
Missing Release of Memory after Effective Lifetime in Apache Tika
|
A carefully crafted or corrupt file may trigger a System.exit in Tika's OneNote Parser. Crafted or corrupted files can also cause out of memory errors and/or infinite loops in Tika's ICNSParser, MP3Parser, MP4Parser, SAS7BDATParser, OneNoteParser and ImageParser. Apache Tika users should upgrade to 1.24.1 or later. The vulnerabilities in the MP4Parser were partially fixed by upgrading the com.googlecode:isoparser:1.1.22 dependency to org.tallison:isoparser:1.9.41.2. For unrelated security reasons, we upgraded org.apache.cxf to 3.3.6 as part of the 1.24.1 release.
|
{'CVE-2020-9489'}
|
2021-06-15T17:32:28Z
|
2021-05-07T15:53:40Z
|
MODERATE
| 5.5
|
{'CWE-401'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9489', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-4pv3-63jw-4jw2', 'https://lists.apache.org/thread.html/r4d943777e36ca3aa6305a45da5acccc54ad894f2d5a07186cfa2442c%40%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E'}
| null |
GHSA
|
GHSA-446m-mv8f-q348
|
Regular Expression Denial of Service in moment
|
Affected versions of `moment` are vulnerable to a low severity regular expression denial of service when parsing dates as strings.
## Recommendation
Update to version 2.19.3 or later.
|
{'CVE-2017-18214'}
|
2021-08-31T21:44:16Z
|
2018-03-05T18:35:09Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-446m-mv8f-q348', 'https://nodesecurity.io/advisories/532', 'https://www.npmjs.com/advisories/532', 'https://www.tenable.com/security/tns-2019-02', 'https://github.com/moment/moment/pull/4326', 'https://github.com/moment/moment/issues/4163', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18214'}
| null |
GHSA
|
GHSA-qgcg-p3v2-9h4p
|
Externally Controlled Reference to a Resource in Another Sphere and Confused Deputy in Spring Cloud Netflix
|
Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly.
|
{'CVE-2020-5412'}
|
2021-04-30T17:29:42Z
|
2021-04-30T17:29:42Z
|
MODERATE
| 6.5
|
{'CWE-610', 'CWE-441'}
|
{'https://tanzu.vmware.com/security/cve-2020-5412', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5412', 'https://github.com/advisories/GHSA-qgcg-p3v2-9h4p'}
| null |
GHSA
|
GHSA-c4fm-46gm-4469
|
Malicious Package in sparkies
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:28:30Z
|
2020-09-03T20:00:05Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-c4fm-46gm-4469', 'https://www.npmjs.com/advisories/1141'}
| null |
GHSA
|
GHSA-hgwm-pv9h-q5m7
|
Potential XSS in jQuery dependency in Mirador
|
### Impact
Mirador users less than v3.0.0 (alpha-rc) versions that have an unpatched jQuery. When adopters update jQuery they will find some of Mirador functionality to be broken.
### Patches
Mirador adopters should update to v3.0.0, no updates exist for v2.x releases.
### Workarounds
Yes, Mirador users could fork and create their own custom build of Mirador and make the bug fixes themselves.
### References
https://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://jquery.com/upgrade-guide/3.5/
| null |
2021-10-04T21:19:57Z
|
2020-09-18T18:03:29Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-hgwm-pv9h-q5m7', 'https://github.com/ProjectMirador/mirador/security/advisories/GHSA-hgwm-pv9h-q5m7'}
| null |
GHSA
|
GHSA-5f2r-qp73-37mr
|
`CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow
|
### Impact
The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger `CHECK` failures.
### Patches
We have patched the issue in GitHub commit [92dba16749fae36c246bec3f9ba474d9ddeb7662](https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23579'}
|
2022-02-11T20:39:08Z
|
2022-02-10T00:33:29Z
|
MODERATE
| 6.5
|
{'CWE-617'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23579', 'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662', 'https://github.com/advisories/GHSA-5f2r-qp73-37mr', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr'}
| null |
GHSA
|
GHSA-fgmr-vx7c-5wj6
|
Timing attack on HMAC signature comparison in Apache Tapestry
|
The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison should be done with a constant time algorithm instead.
|
{'CVE-2019-10071'}
|
2021-07-27T21:51:15Z
|
2019-09-26T21:30:34Z
|
CRITICAL
| 9.8
|
{'CWE-697', 'CWE-203'}
|
{'https://lists.apache.org/thread.html/6e8f42c88da7be3c60aafe3f6a85eb00b4f8b444de26b38d36233a43@%3Cusers.tapestry.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10071', 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E', 'https://lists.apache.org/thread.html/7a437dad5af7309aba4d01bfc2463b3ac34e6aafaa565381d3a36460@%3Cusers.tapestry.apache.org%3E', 'https://github.com/advisories/GHSA-fgmr-vx7c-5wj6'}
| null |
GHSA
|
GHSA-j586-cj67-vg4p
|
Cross-Site Request Forgery in Drupal core
|
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
|
{'CVE-2020-13674'}
|
2022-02-26T00:28:02Z
|
2022-02-12T00:00:47Z
|
MODERATE
| 6.5
|
{'CWE-352'}
|
{'https://www.drupal.org/sa-core-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13674', 'https://github.com/advisories/GHSA-j586-cj67-vg4p'}
| null |
GHSA
|
GHSA-wr2c-ppj9-f2fv
|
Downloads Resources over HTTP in webdrvr
|
Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10601'}
|
2021-01-08T01:16:15Z
|
2019-02-18T23:33:54Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv', 'https://www.npmjs.com/advisories/193', 'https://nodesecurity.io/advisories/193', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601'}
| null |
GHSA
|
GHSA-h372-w3xp-2jg3
|
Directory Traversal in section2.madisonjbrooks12
|
Affected versions of `section2.madisonjbrooks12` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16172'}
|
2021-01-14T15:35:27Z
|
2020-09-01T18:54:34Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/468', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16172', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/section2.madisonjbrooks12', 'https://github.com/advisories/GHSA-h372-w3xp-2jg3', 'https://nodesecurity.io/advisories/468'}
| null |
GHSA
|
GHSA-hv9c-qwqg-qj3v
|
Remote Code Execution in electron
|
GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code execution.
More information to determine if you are impacted can be found on the [electron blog](https://electronjs.org/blog/web-preferences-fix).
## Recommendation
Upgrade Electron to >=3.0.0-beta.7, >=2.0.8, >=1.8.8, or >=1.7.16."
|
{'CVE-2018-15685'}
|
2021-09-14T17:29:35Z
|
2018-08-23T19:12:08Z
|
HIGH
| 8.1
|
{'CWE-1188'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-15685', 'https://www.npmjs.com/advisories/732', 'https://github.com/advisories/GHSA-hv9c-qwqg-qj3v', 'https://www.exploit-db.com/exploits/45272/', 'https://www.contrastsecurity.com/security-influencers/cve-2018-15685', 'https://electronjs.org/blog/web-preferences-fix'}
| null |
GHSA
|
GHSA-mvg9-xffr-p774
|
Out of bounds read in Pillow
|
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
|
{'CVE-2021-25291'}
|
2021-12-02T15:31:14Z
|
2021-03-29T16:35:57Z
|
HIGH
| 7.5
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-mvg9-xffr-p774', 'https://security.gentoo.org/glsa/202107-33', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25291'}
| null |
GHSA
|
GHSA-5v7r-jg9r-vq44
|
Insecure Cryptography Algorithm in simple-crypto-js
|
Versions of `simple-crypto-js` prior to 2.3.0 use AES-CBC with PKCS#7 padding, which is vulnerable to padding oracle attacks. This may allow attackers to break the encryption and access sensitive data.
## Recommendation
Upgrade to version 2.3.0 or later.
| null |
2021-09-29T20:08:02Z
|
2020-09-03T21:19:46Z
|
MODERATE
| 5.9
|
{'CWE-327'}
|
{'https://www.npmjs.com/advisories/1220', 'https://robertheaton.com/2013/07/29/padding-oracle-attack/', 'https://github.com/advisories/GHSA-5v7r-jg9r-vq44', 'https://github.com/danang-id/simple-crypto-js/issues/12', 'https://snyk.io/vuln/SNYK-JS-SIMPLECRYPTOJS-544027'}
| null |
GHSA
|
GHSA-2wrq-wmqf-8vcc
|
Downloads Resources over HTTP in operadriver
|
operadriver is a Opera Driver for Selenium.
operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
## Recommendation
Update to version 0.2.3 or later.
|
{'CVE-2016-10565'}
|
2021-01-08T20:05:54Z
|
2019-02-18T23:35:48Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10565', 'https://www.npmjs.com/advisories/196', 'https://nodesecurity.io/advisories/196', 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc'}
| null |
GHSA
|
GHSA-7ph8-f946-q5r7
|
High severity vulnerability that affects Microsoft.ChakraCore
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0592.
|
{'CVE-2019-0611'}
|
2021-09-03T21:01:09Z
|
2019-04-09T19:43:54Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0611', 'https://github.com/advisories/GHSA-7ph8-f946-q5r7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611'}
| null |
GHSA
|
GHSA-qpp2-2mcp-2wm5
|
Unauthenticated user can list hidden document from multiple velocity templates in XWiki
|
### Impact
A guest user without the right to view pages of the wiki can still list documents by rendering some velocity documents.
### Patches
The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1.
### Workarounds
There is no known workaround for this problem.
### References
https://jira.xwiki.org/browse/XWIKI-16544
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki](https://jira.xwiki.org)
* Email us at [our security mailing list](mailto:security@xwiki.org)
|
{'CVE-2022-24820'}
|
2022-04-19T18:26:56Z
|
2022-04-08T22:00:54Z
|
MODERATE
| 5.3
|
{'CWE-200', 'CWE-359'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24820', 'https://github.com/advisories/GHSA-qpp2-2mcp-2wm5', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qpp2-2mcp-2wm5', 'https://jira.xwiki.org/browse/XWIKI-16544'}
| null |
GHSA
|
GHSA-hh3j-x4mc-g48r
|
Insufficiently Protected Credentials in Apache Tomcat
|
When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
|
{'CVE-2019-12418'}
|
2022-04-19T18:42:25Z
|
2019-12-26T18:22:36Z
|
HIGH
| 7
|
{'CWE-522'}
|
{'https://www.debian.org/security/2020/dsa-4680', 'https://security.netapp.com/advisory/ntap-20200107-0001/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E', 'https://security.gentoo.org/glsa/202003-43', 'https://github.com/advisories/GHSA-hh3j-x4mc-g48r', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418', 'https://usn.ubuntu.com/4251-1/'}
| null |
GHSA
|
GHSA-xj6f-x7jm-85ff
|
Downloads Resources over HTTP in openframe-ascii-image
|
Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10690'}
|
2021-01-08T00:00:46Z
|
2019-02-18T23:41:54Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10690', 'https://nodesecurity.io/advisories/298', 'https://github.com/advisories/GHSA-xj6f-x7jm-85ff', 'https://www.npmjs.com/advisories/298'}
| null |
GHSA
|
GHSA-5gqf-456p-4836
|
Reference binding to nullptr in `SdcaOptimizer`
|
### Impact
The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer:
```python
import tensorflow as tf
sparse_example_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)]
sparse_feature_indices = [tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), tf.constant((0), dtype=tf.int64)]
sparse_feature_values = []
dense_features = []
dense_weights = []
example_weights = tf.constant((0.0), dtype=tf.float32)
example_labels = tf.constant((0.0), dtype=tf.float32)
sparse_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)]
sparse_weights = [tf.constant((0.0), dtype=tf.float32), tf.constant((0.0), dtype=tf.float32)]
example_state_data = tf.constant([0.0, 0.0, 0.0, 0.0], shape=[1, 4], dtype=tf.float32)
tf.raw_ops.SdcaOptimizer(
sparse_example_indices=sparse_example_indices,
sparse_feature_indices=sparse_feature_indices,
sparse_feature_values=sparse_feature_values, dense_features=dense_features,
example_weights=example_weights, example_labels=example_labels,
sparse_indices=sparse_indices, sparse_weights=sparse_weights,
dense_weights=dense_weights, example_state_data=example_state_data,
loss_type="logistic_loss", l1=0.0, l2=0.0, num_loss_partitions=1,
num_inner_iterations=1, adaptative=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a751d435cc3/tensorflow/core/kernels/sdca_internal.cc) does not validate that the user supplied arguments satisfy all [constraints expected by the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/SdcaOptimizer).
### Patches
We have patched the issue in GitHub commit [f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb](https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29572'}
|
2021-05-21T14:25:31Z
|
2021-05-21T14:25:31Z
|
LOW
| 2.5
|
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29572', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb', 'https://github.com/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836'}
| null |
GHSA
|
GHSA-34hv-f45p-4qfq
|
Open redirect in wwbn/avideo
|
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
|
{'CVE-2022-27463'}
|
2022-04-19T14:13:44Z
|
2022-04-06T00:01:29Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://avideo.tube/', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c', 'https://github.com/advisories/GHSA-34hv-f45p-4qfq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463'}
| null |
GHSA
|
GHSA-7p8f-8hjm-wm92
|
Lookup operations do not take into account wildcards in SpiceDB
|
### Impact
Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion.
For example, given schema:
```zed
definition user {}
definition resource {
relation viewer: user
relation banned: user | user:*
permission view = viewer - banned
}
```
If `user:*` is placed into the `banned` relation for a particular resource, `view` should return false for *all* resources. in `v1.3.0`, the wildcard is ignored entirely in lookup's dispatch, resulting in the `banned` wildcard being ignored in the exclusion.
### Workarounds
Don't make use of wildcards on the right side of intersections or within exclusions.
### References
https://github.com/authzed/spicedb/issues/358
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [SpiceDB](https://github.com/authzed/spicedb)
* Ask a question in the [SpiceDB Discord](https://authzed.com/discord)
|
{'CVE-2022-21646'}
|
2022-04-19T19:03:19Z
|
2022-01-13T15:05:41Z
|
HIGH
| 8.1
|
{'CWE-155', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21646', 'https://github.com/authzed/spicedb/releases/tag/v1.4.0', 'https://github.com/advisories/GHSA-7p8f-8hjm-wm92', 'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970', 'https://github.com/authzed/spicedb/issues/358', 'https://github.com/authzed/spicedb/security/advisories/GHSA-7p8f-8hjm-wm92'}
| null |
GHSA
|
GHSA-gx5w-rrhp-f436
|
XSS in mdBook
|
> This is a cross-post of [the official security advisory][ml]. The official post contains a signed version with our PGP key, as well.
[ml]: https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0
The Rust Security Response Working Group was recently notified of a security issue affecting the search feature of mdBook, which could allow an attacker to execute arbitrary JavaScript code on the page.
The CVE for this vulnerability is [CVE-2020-26297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26297).
## Overview
The search feature of mdBook (introduced in version 0.1.4) was affected by a cross site scripting vulnerability that allowed an attacker to execute arbitrary JavaScript code on an user's browser by tricking the user into typing a malicious search query, or tricking the user into clicking a link to the search page with the malicious search query prefilled.
mdBook 0.4.5 fixes the vulnerability by properly escaping the search query.
## Mitigations
Owners of websites built with mdBook have to upgrade to mdBook 0.4.5 or greater and rebuild their website contents with it. It's possible to install mdBook 0.4.5 on the local system with:
```
cargo install mdbook --version 0.4.5 --force
```
## Acknowledgements
Thanks to Kamil Vavra for responsibly disclosing the vulnerability to us according to [our security policy](https://www.rust-lang.org/policies/security).
## Timeline of events
All times are listed in UTC.
- 2020-12-30 20:14 - The issue is reported to the Rust Security Response WG
- 2020-12-30 20:32 - The issue is acknowledged and the investigation began
- 2020-12-30 21:21 - Found the cause of the vulnerability and prepared the patch
- 2021-01-04 15:00 - Patched version released and vulnerability disclosed
|
{'CVE-2020-26297'}
|
2022-04-19T19:02:44Z
|
2021-08-25T20:56:20Z
|
HIGH
| 8.2
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26297', 'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b', 'https://rustsec.org/advisories/RUSTSEC-2021-0001.html', 'https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045', 'https://github.com/rust-lang/mdBook/security/advisories/GHSA-gx5w-rrhp-f436', 'https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0', 'https://github.com/advisories/GHSA-gx5w-rrhp-f436'}
| null |
GHSA
|
GHSA-pqm6-cgwr-x6pf
|
Signature validation bypass in XmlSecLibs
|
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
|
{'CVE-2019-3465'}
|
2021-08-18T22:14:39Z
|
2019-11-08T20:06:46Z
|
HIGH
| 8.8
|
{'CWE-347'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBKVDUZ7G5ZOUO4BFJWLNJ6VOKBQJX5U/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESKJTWLE7QZBQ3EKMYXKMBQG3JDEJWM6/', 'https://github.com/advisories/GHSA-pqm6-cgwr-x6pf', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBSSRV5Q7JFCYO46A3EN624UZ4KXFQ2M/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3465', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBE2SJSXG7J4XYLJ2H6HC2VPPOG2OMUN/', 'https://seclists.org/bugtraq/2019/Nov/8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAWOVYLZKYDCQBLQEJCFAAD3KQTBPHXE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KID7C4AZPYYIZQIPSLANP4R2RQR6YK3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AB34ILMJ67CUROBOR6YPKB46VHXLOAJ4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNFMY5RRLU63P25HEBVDO5KAVI7TX7JV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://www.tenable.com/security/tns-2019-09', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://www.debian.org/security/2019/dsa-4560', 'https://simplesamlphp.org/security/201911-01'}
| null |
GHSA
|
GHSA-6r3p-fcvm-xh7c
|
SSRF vulnerability in Arache Airflow
|
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.
|
{'CVE-2020-17513'}
|
2020-12-17T21:00:58Z
|
2020-12-17T21:00:58Z
|
MODERATE
| 0
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-6r3p-fcvm-xh7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17513', 'https://lists.apache.org/thread.html/rb3647269f07cc2775ca6568cbfd4994d862c842a58120d2aba9c658a%40%3Cusers.airflow.apache.org%3E'}
| null |
GHSA
|
GHSA-ph58-4vrj-w6hr
|
XSS vulnerability that affects bootstrap
|
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
|
{'CVE-2018-20677'}
|
2021-07-26T21:49:19Z
|
2019-01-17T13:57:56Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://github.com/advisories/GHSA-ph58-4vrj-w6hr', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/issues/27045', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/pull/27047', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}
| null |
GHSA
|
GHSA-255r-pghp-r5wh
|
Malicious Package in hdeky
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:02:18Z
|
2020-09-03T17:05:34Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-255r-pghp-r5wh', 'https://www.npmjs.com/advisories/1398'}
| null |
GHSA
|
GHSA-4hq8-gmxx-h6w9
|
XML Processing error in github.com/crewjam/saml
|
### Impact
There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator)
### Patches
In version 0.4.3, all XML input is validated prior to being parsed.
|
{'CVE-2020-27846'}
|
2021-06-23T17:29:42Z
|
2021-06-23T17:29:42Z
|
HIGH
| 9.8
|
{'CWE-287', 'CWE-115'}
|
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053', 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9', 'https://bugzilla.redhat.com/show_bug.cgi?id=1907670', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI/', 'https://github.com/advisories/GHSA-4hq8-gmxx-h6w9', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM/', 'https://security.netapp.com/advisory/ntap-20210205-0002/'}
| null |
GHSA
|
GHSA-pqhq-xx62-2v2p
|
Cross-site scripting in Apache NiFi
|
A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. Did not appear to occur in other browsers.
|
{'CVE-2020-1933'}
|
2022-01-06T20:35:39Z
|
2022-01-06T20:35:39Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nifi.apache.org/security.html#CVE-2020-1933', 'https://github.com/advisories/GHSA-pqhq-xx62-2v2p', 'https://github.com/apache/nifi/pull/3991', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1933'}
| null |
GHSA
|
GHSA-735c-r4vc-6gm9
|
Downloads Resources over HTTP in bionode-sra
|
Affected versions of `bionode-sra` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10613'}
|
2021-09-16T20:41:22Z
|
2019-02-18T23:56:45Z
|
HIGH
| 0
|
{'CWE-311', 'CWE-269'}
|
{'https://www.npmjs.com/advisories/211', 'https://github.com/advisories/GHSA-735c-r4vc-6gm9', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10613', 'https://nodesecurity.io/advisories/211'}
| null |
GHSA
|
GHSA-6h88-qjpv-p32m
|
OpenSSL gem for Ruby using inadequate encryption strength
|
The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
|
{'CVE-2016-7798'}
|
2022-04-25T16:33:58Z
|
2017-10-24T18:33:35Z
|
HIGH
| 7.5
|
{'CWE-326'}
|
{'http://www.openwall.com/lists/oss-security/2016/09/19/9', 'http://www.openwall.com/lists/oss-security/2016/09/30/6', 'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062', 'http://www.openwall.com/lists/oss-security/2016/10/01/2', 'https://github.com/ruby/openssl/issues/49', 'https://www.debian.org/security/2017/dsa-3966', 'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'http://www.securityfocus.com/bid/93031', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798'}
| null |
GHSA
|
GHSA-8w3x-457r-wg53
|
Out-of-bounds Write in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to opencv-python and opencv-contrib-python through 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.
|
{'CVE-2017-12597'}
|
2021-11-18T00:08:10Z
|
2021-10-12T22:00:41Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-8w3x-457r-wg53', 'https://github.com/opencv/opencv-python/releases/tag/9', 'https://github.com/opencv/opencv-python/releases/tag/11', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12597', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
| null |
GHSA
|
GHSA-4gw3-8f77-f72c
|
Regular expression denial of service in codemirror
|
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2.
The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
|
{'CVE-2020-7760'}
|
2022-04-22T17:20:51Z
|
2021-05-10T18:46:27Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCODEMIRROR-1024448', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEMARMOTTAWEBJARS-1024450', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449', 'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760', 'https://snyk.io/vuln/SNYK-JS-CODEMIRROR-1016937', 'https://www.debian.org/security/2020/dsa-4789', 'https://github.com/advisories/GHSA-4gw3-8f77-f72c', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445', 'https://www.npmjs.com/package/codemirror', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1024447', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-6m4r-cgm3-6q7q
|
Cross-Site Scripting in status-board
|
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderJsDashboard()` function concatenates the `safeDashboard` variable to the HTTP response message with insufficient sanitization. If this variable is controlled by user input it may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15478'}
|
2021-08-17T22:30:45Z
|
2019-09-23T18:32:54Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/jameswlane/status-board/pull/949', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15478', 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460293', 'https://github.com/jameswlane/status-board/pull/949/files', 'https://www.npmjs.com/advisories/1151', 'https://github.com/advisories/GHSA-6m4r-cgm3-6q7q'}
| null |
GHSA
|
GHSA-6x2m-w449-qwx7
|
Code Injection in CRI-O
|
### Impact
A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve container escape and arbitrary code execution as root on any node in the cluster.
### Patches
The patches will be present in 1.19.6, 1.20.7, 1.21.6, 1.22.3, 1.23.2, 1.24.0
### Workarounds
- Users can set manage_ns_lifecycle to false, which causes the sysctls to be configured by the OCI runtime, which typically filter these cases. This option is available in 1.20 and 1.19. Newer versions don't have this option.
- An admission webhook could be created to deny pods that specify a `+` in the sysctl value of a pod.
- A [PodSecurityPolicy](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#podsecuritypolicy) [deprecated] could be created, specifying all sysctls as forbidden like so:
```
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: sysctl-psp
spec:
forbiddenSysctls:
- "*"
```
However, this option will not work if any sysctls are required by any pods in the cluster.
### Credits
Credit for finding this vulnerability goes to John Walker and Manoj Ahuje of Crowdstrike. The CRI-O community deeply thanks them for the report.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)
* To make a report, email your vulnerability to the private
[cncf-crio-security@lists.cncf.io](mailto:cncf-crio-security@lists.cncf.io) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).
|
{'CVE-2022-0811'}
|
2022-03-18T17:53:33Z
|
2022-03-15T20:13:38Z
|
HIGH
| 8.8
|
{'CWE-94'}
|
{'https://access.redhat.com/security/cve/CVE-2022-0811', 'https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7', 'https://bugs.gentoo.org/835336', 'https://bugzilla.redhat.com/show_bug.cgi?id=2059475', 'https://www.crowdstrike.com/blog/cr8escape-zero-day-vulnerability-discovered-in-cri-o-container-engine-cve-2022-0811/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0811', 'https://github.com/advisories/GHSA-6x2m-w449-qwx7'}
| null |
GHSA
|
GHSA-vqhp-cxgc-6wmm
|
regular expression denial-of-service (ReDoS) in Bleach
|
### Impact
`bleach.clean` behavior parsing style attributes could result in a regular expression denial of service (ReDoS).
Calls to ``bleach.clean`` with an allowed tag with an allowed ``style`` attribute are vulnerable to ReDoS. For example, ``bleach.clean(..., attributes={'a': ['style']})``.
### Patches
3.1.4
### Workarounds
* do not whitelist the style attribute in `bleach.clean` calls
* limit input string length
### References
* https://bugzilla.mozilla.org/show_bug.cgi?id=1623633
* https://www.regular-expressions.info/redos.html
* https://blog.r2c.dev/posts/finding-python-redos-bugs-at-scale-using-dlint-and-r2c/
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6817
### Credits
* Reported by schwag09 of r2c
### For more information
If you have any questions or comments about this advisory:
* Open an issue at https://github.com/mozilla/bleach/issues
* Email us at security@mozilla.org
|
{'CVE-2020-6817'}
|
2021-08-23T14:43:19Z
|
2020-03-30T19:45:56Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-6817', 'https://github.com/advisories/GHSA-vqhp-cxgc-6wmm', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1623633', 'https://snyk.io/vuln/SNYK-PYTHON-BLEACH-561754', 'https://github.com/mozilla/bleach/security/advisories/GHSA-vqhp-cxgc-6wmm', 'https://github.com/mozilla/bleach/releases/tag/v3.1.4'}
| null |
GHSA
|
GHSA-vmjw-c2vp-p33c
|
Crash in NMS ops caused by integer conversion to unsigned
|
### Impact
An attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0:
```python
import tensorflow as tf
tf.raw_ops.NonMaxSuppressionV5(
boxes=[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],
scores=[1.0,2.0,3.0],
max_output_size=-1,
iou_threshold=0.5,
score_threshold=0.5,
soft_nms_sigma=1.0,
pad_to_max_output_size=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/image/non_max_suppression_op.cc#L170-L271) uses a user controlled argument to resize a `std::vector`:
```cc
const int output_size = max_output_size.scalar<int>()();
// ...
std::vector<int> selected;
// ...
if (pad_to_max_output_size) {
selected.resize(output_size, 0);
// ...
}
```
However, as `std::vector::resize` takes the size argument as a `size_t` and `output_size` is an `int`, there is an implicit conversion to usigned. If the attacker supplies a negative value, this conversion results in a crash.
A similar issue occurs in `CombinedNonMaxSuppression`:
```python
import tensorflow as tf
tf.raw_ops.NonMaxSuppressionV5(
boxes=[[[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]]]],
scores=[[[1.0,2.0,3.0],[1.0,2.0,3.0],[1.0,2.0,3.0]]],
max_output_size_per_class=-1,
max_total_size=10,
iou_threshold=score_threshold=0.5,
pad_per_class=True,
clip_boxes=True)
```
### Patches
We have patched the issue in GitHub commit [3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d](https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d) and commit [b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58](https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37669'}
|
2021-08-25T14:42:03Z
|
2021-08-25T14:42:03Z
|
MODERATE
| 5.5
|
{'CWE-681'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37669', 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58', 'https://github.com/advisories/GHSA-vmjw-c2vp-p33c', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'}
| null |
GHSA
|
GHSA-wm2m-xrrp-j74c
|
HTTP Request Smuggling in netius
|
netius prior to 1.17.58 is vulnerable to HTTP Request Smuggling. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Transfer encoding header parsing which could allow for CL:TE or TE:TE attacks.
|
{'CVE-2020-7655'}
|
2021-06-18T18:31:40Z
|
2021-06-18T18:31:40Z
|
MODERATE
| 6.1
|
{'CWE-444'}
|
{'https://github.com/advisories/GHSA-wm2m-xrrp-j74c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7655', 'https://snyk.io/vuln/SNYK-PYTHON-NETIUS-569141'}
| null |
GHSA
|
GHSA-c9h5-hf8r-m97x
|
Dangling reference in flatbuffers
|
An issue was discovered in the flatbuffers crate through 2020-04-11 for Rust. read_scalar (and read_scalar_at) can transmute values without unsafe blocks.
|
{'CVE-2020-35864'}
|
2021-08-25T20:47:36Z
|
2021-08-25T20:47:36Z
|
HIGH
| 7.5
|
{'CWE-704'}
|
{'https://github.com/google/flatbuffers/issues/5825', 'https://github.com/advisories/GHSA-c9h5-hf8r-m97x', 'https://rustsec.org/advisories/RUSTSEC-2020-0009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35864'}
| null |
GHSA
|
GHSA-hg2p-2cvq-4ppv
|
Cross-site scripting in lazysizes
|
lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: data-vimeo, data-vimeoparams, data-youtube and data-ytparams which can be abused to inject malicious JavaScript.
|
{'CVE-2020-7642'}
|
2021-12-10T20:06:23Z
|
2021-12-10T20:06:23Z
|
LOW
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-hg2p-2cvq-4ppv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642', 'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144', 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
| null |
GHSA
|
GHSA-w749-p3v6-hccq
|
Possible code injection vulnerability in Rails / Active Storage
|
The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue.
|
{'CVE-2022-21831'}
|
2022-04-19T19:03:27Z
|
2022-03-08T21:25:54Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://github.com/advisories/GHSA-w749-p3v6-hccq', 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI', 'https://rubysec.com/advisories/CVE-2022-21831/'}
| null |
GHSA
|
GHSA-6q3p-36f4-cwxv
|
Server-Side Request Forgery in UReport
|
UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.
|
{'CVE-2020-21122'}
|
2021-09-20T20:45:21Z
|
2021-09-20T20:45:21Z
|
HIGH
| 0
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21122', 'https://github.com/advisories/GHSA-6q3p-36f4-cwxv', 'https://github.com/youseries/ureport/issues/483'}
| null |
GHSA
|
GHSA-f89g-whpf-6q9m
|
Cross-Site Scripting in i18next
|
Affected versions of `i18next` allow untrusted user input to be injected into dictionary key names, resulting in a cross-site scripting vulnerability.
## Proof of Concept
```
var init = i18n.init({debug: true}, function(){
var test = i18n.t('__firstName__ __lastName__', {
escapeInterpolation: true,
firstName: '__lastNameHTML__',
lastName: '<script>',
});
console.log(test);
});
// equals "<script> <script>"
```
## Recommendation
Update to version 1.10.3 or later.
|
{'CVE-2017-16008'}
|
2021-01-08T18:53:47Z
|
2018-11-09T17:46:56Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16008', 'https://github.com/advisories/GHSA-f89g-whpf-6q9m', 'https://nodesecurity.io/advisories/325', 'https://www.npmjs.com/advisories/325', 'https://github.com/i18next/i18next/pull/443'}
| null |
GHSA
|
GHSA-qcj6-jqrg-4wp2
|
Template injection in thymeleaf-spring5
|
In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution.
|
{'CVE-2021-43466'}
|
2022-03-30T21:14:10Z
|
2021-11-10T19:52:33Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43466', 'https://vuldb.com/?id.186365', 'https://github.com/thymeleaf/thymeleaf-spring/issues/263#issuecomment-977199524', 'https://gitee.com/wayne_wwang/wayne_wwang/blob/master/2021/10/31/ruoyi+thymeleaf-rce/index.html', 'https://github.com/advisories/GHSA-qcj6-jqrg-4wp2'}
| null |
GHSA
|
GHSA-3fw8-66wf-pr7m
|
methodOverride Middleware Reflected Cross-Site Scripting in connect
|
Connect is a stack of middleware that is executed in order in each request.
The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override".
Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser.
###Example:
```
~ curl "localhost:3000" -d "_method=<script src=http://nodesecurity.io/xss.js></script>"
Cannot <SCRIPT SRC=HTTP://NODESECURITY.IO/XSS.JS></SCRIPT> /
```
## Recommendation
Update to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.
|
{'CVE-2013-7370'}
|
2021-04-07T19:56:51Z
|
2020-08-31T22:41:27Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7370', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-7370', 'http://www.openwall.com/lists/oss-security/2014/04/21/2', 'https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting', 'https://www.npmjs.com/advisories/3', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-7370', 'https://security-tracker.debian.org/tracker/CVE-2013-7370', 'https://github.com/senchalabs/connect/issues/831', 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://access.redhat.com/security/cve/cve-2013-7370', 'https://github.com/advisories/GHSA-3fw8-66wf-pr7m', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
| null |
GHSA
|
GHSA-7c82-mp33-r854
|
Cross-site scripting in bootstrap-select
|
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
|
{'CVE-2019-20921'}
|
2021-05-07T16:47:54Z
|
2021-05-07T16:47:54Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPSELECT-570457', 'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767', 'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://github.com/advisories/GHSA-7c82-mp33-r854', 'https://www.npmjs.com/advisories/1522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921'}
| null |
GHSA
|
GHSA-4mv4-gmmf-q382
|
Cross-Site Scripting in datatables
|
Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php.
## Recommendation
Update to a version greater than 1.10.8.
|
{'CVE-2015-6584'}
|
2021-09-23T19:26:59Z
|
2020-08-31T22:42:29Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d', 'https://nvd.nist.gov/vuln/detail/CVE-2015-6584', 'https://github.com/DataTables/DataTables/issues/602', 'https://github.com/advisories/GHSA-4mv4-gmmf-q382', 'https://www.npmjs.com/advisories/5', 'http://www.securityfocus.com/archive/1/archive/1/536437/100/0/threaded', 'http://www.securityfocus.com/archive/1/536437/100/0/threaded', 'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/', 'http://seclists.org/fulldisclosure/2015/Sep/37', 'http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html'}
| null |
GHSA
|
GHSA-5cp4-xmrw-59wf
|
XSS via JQLite DOM manipulation functions in AngularJS
|
### Summary
XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`.
### Description
JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`.
One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218).
If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM.
This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/).
### Proof of concept
```javascript
const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>`
```
Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is.
As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute.
```javascript
angular.element(document).append(inertPayload);
```
This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`.
### Patches
The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2).
### Workarounds
Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended.
### References
https://github.com/advisories/GHSA-mhp6-pxh8-r675
https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058
| null |
2022-04-19T19:02:31Z
|
2020-08-05T21:47:02Z
|
MODERATE
| 5
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5cp4-xmrw-59wf', 'https://github.com/google/security-research/security/advisories/GHSA-5cp4-xmrw-59wf', 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2', 'https://github.com/advisories/GHSA-mhp6-pxh8-r675', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/', 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}
| null |
GHSA
|
GHSA-hvwm-2624-rp9x
|
Moderate severity vulnerability that affects org.apache.activemq:activemq-web-console
|
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.
|
{'CVE-2018-8006'}
|
2021-09-14T17:31:43Z
|
2018-10-30T20:48:58Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8006', 'https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-hvwm-2624-rp9x', 'http://www.securityfocus.com/bid/105156', 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/3f1e41bc9153936e065ca3094bd89ff8167ad2d39ac0b410f24382d2@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/c0ec53b72b3240b187afb1cf67e4309a9e5f607282010aa196734814@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E', 'http://activemq.apache.org/security-advisories.data/CVE-2018-8006-announcement.txt'}
| null |
GHSA
|
GHSA-68v9-3jjq-rvp4
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
|
{'CVE-2021-32716'}
|
2021-09-08T18:00:40Z
|
2021-09-08T18:00:40Z
|
MODERATE
| 4.4
|
{'CWE-200'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb', 'https://github.com/advisories/GHSA-68v9-3jjq-rvp4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}
| null |
GHSA
|
GHSA-q7fr-vqhq-v5xr
|
Improper Access Control in Apache ActiveMQ Artemis
|
While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.
|
{'CVE-2021-26118'}
|
2021-08-30T22:14:01Z
|
2021-06-16T17:39:05Z
|
HIGH
| 7.5
|
{'CWE-287', 'CWE-284'}
|
{'https://security.netapp.com/advisory/ntap-20210827-0002/', 'https://lists.apache.org/thread.html/rafd5d7cf303772a0118865262946586921a65ebd98fc24f56c812574@%3Cannounce.apache.org%3E', 'https://mail-archives.apache.org/mod_mbox/activemq-users/202101.mbox/%3CCAH%2BvQmMUNnkiXv2-d3ucdErWOsdnLi6CgnK%2BVfixyJvTgTuYig%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26118', 'https://github.com/advisories/GHSA-q7fr-vqhq-v5xr'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.