ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-3f99-hvg4-qjwj
|
Insecure random number generation in keypair
|
## Description and Impact
A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim. We recommend replacing any RSA keys that were generated using keypair version 1.0.3 or earlier.
## Fix
* The [bug](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) in the pseudo-random number generator is fixed in commit [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18).
* If the crypto module is available, it is used instead of the pseudo-random number generator. Also fixed in [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18)
## Additional Details
The specific [line](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) with the flaw is:
```javascript
b.putByte(String.fromCharCode(next & 0xFF))
```
The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is
```javascript
util.ByteBuffer.prototype.putByte = function(b) {
this.data += String.fromCharCode(b);
};
```
Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. This results in most of the buffer containing zeros. An example generated buffer:
(Note: truncated for brevity)
```
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x04\x00\x00\x00....\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
```
Since it is masking with 0xFF, approximately 97% of the bytes are converted to zeros. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion.
## Credit
This issue was reported to GitHub Security Lab by Ross Wheeler of Axosoft. It was discovered by Axosoft engineer Dan Suceava, who noticed that [keypair](https://github.com/juliangruber/keypair) was regularly generating duplicate RSA keys. GitHub security engineer [@vcsjones (Kevin Jones)](https://github.com/vcsjones) independently investigated the problem and identified the cause and source code location of the bug.
|
{'CVE-2021-41117'}
|
2022-04-19T19:03:11Z
|
2021-10-11T17:09:05Z
|
HIGH
| 8.7
|
{'CWE-335'}
|
{'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18', 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj', 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/', 'https://github.com/advisories/GHSA-3f99-hvg4-qjwj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41117', 'https://github.com/juliangruber/keypair/releases/tag/v1.0.4'}
| null |
GHSA
|
GHSA-ch4f-829c-v5pw
|
Division by 0 in `ResourceScatterDiv`
|
### Impact
The implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error:
```python
import tensorflow as tf
v= tf.Variable([1,2,3])
tf.raw_ops.ResourceScatterDiv(
resource=v.handle,
indices=[1],
updates=[0])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/resource_variable_ops.cc#L865) uses a common class for all binary operations but fails to treat the division by 0 case separately.
### Patches
We have patched the issue in GitHub commit [4aacb30888638da75023e6601149415b39763d76](https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37642'}
|
2021-08-25T14:43:56Z
|
2021-08-25T14:43:56Z
|
MODERATE
| 5.5
|
{'CWE-369'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37642', 'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw', 'https://github.com/advisories/GHSA-ch4f-829c-v5pw'}
| null |
GHSA
|
GHSA-gr44-7grc-37vq
|
Moderate severity vulnerability that affects activerecord
|
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection mechanism and modify protected model attributes via a crafted request.
|
{'CVE-2013-0276'}
|
2021-09-13T12:44:07Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
| null |
{'http://secunia.com/advisories/52112', 'http://www.openwall.com/lists/oss-security/2013/02/11/5', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276', 'https://github.com/advisories/GHSA-gr44-7grc-37vq', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'http://secunia.com/advisories/52774', 'http://www.debian.org/security/2013/dsa-2620', 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain', 'http://support.apple.com/kb/HT5784', 'http://www.osvdb.org/90072', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://www.securityfocus.com/bid/57896', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}
| null |
GHSA
|
GHSA-hxcc-f52p-wc94
|
Insecure serialization leading to RCE in serialize-javascript
|
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack.
|
{'CVE-2020-7660'}
|
2021-09-23T18:51:00Z
|
2020-08-11T17:21:13Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660', 'https://github.com/advisories/GHSA-hxcc-f52p-wc94'}
| null |
GHSA
|
GHSA-6wrh-279j-6hvw
|
HTTP caching is marking private HTTP headers as public in Shopware
|
### Impact
HTTP caching is marking private HTTP headers as public
## Patches
Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24747'}
|
2022-03-18T20:15:07Z
|
2022-03-10T17:55:21Z
|
MODERATE
| 6.3
|
{'CWE-200'}
|
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/advisories/GHSA-6wrh-279j-6hvw'}
| null |
GHSA
|
GHSA-ppj3-7jw3-8vc4
|
Data races in lock_api
|
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.
|
{'CVE-2020-35910'}
|
2021-08-25T20:49:35Z
|
2021-08-25T20:49:35Z
|
MODERATE
| 5.5
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35910', 'https://github.com/advisories/GHSA-ppj3-7jw3-8vc4', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html', 'https://github.com/Amanieu/parking_lot/pull/262'}
| null |
GHSA
|
GHSA-cvx3-pqmj-x57x
|
Downloads Resources over HTTP in scalajs-standalone-bin
|
Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10634'}
|
2021-01-08T18:56:12Z
|
2019-02-18T23:47:13Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/231', 'https://github.com/advisories/GHSA-cvx3-pqmj-x57x', 'https://www.npmjs.com/advisories/231', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}
| null |
GHSA
|
GHSA-27g8-r9vw-765x
|
Private Field data leak
|
This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control.
This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information.
### Impact
Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted.
### Patches
None, at this time
### Workarounds
None, at this time
### References
None
### For more information
For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published.
If needed, you can email us at keystone@thinkmill.com.au
|
{'CVE-2021-32624'}
|
2022-04-19T19:02:58Z
|
2021-05-27T18:39:03Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/keystonejs/keystone-5/security/advisories/GHSA-27g8-r9vw-765x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32624', 'https://github.com/advisories/GHSA-27g8-r9vw-765x'}
| null |
GHSA
|
GHSA-xr53-m937-jr9c
|
Cross-Site Scripting in ngx-md
|
Versions of `ngx-md` prior to 6.0.3 are vulnerable to Cross-Site Scripting. Links are not properly restricted to http/https and can contain JavaScript which may lead to arbitrary code execution. Markdown input such as `[Click Me](javascript:alert('Injected!'%29)` is rendered as a `Click Me` link that executes JavaScript.
## Recommendation
Upgrade to version 6.0.3 or later.
| null |
2021-10-04T21:05:29Z
|
2020-09-03T15:49:14Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1485', 'https://github.com/dimpu/ngx-md/issues/129', 'https://github.com/advisories/GHSA-xr53-m937-jr9c'}
| null |
GHSA
|
GHSA-cw6w-q88j-6mqf
|
Potential session hijack in Apache CXF
|
Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
|
{'CVE-2019-12419'}
|
2021-06-17T19:55:49Z
|
2019-11-08T17:12:59Z
|
CRITICAL
| 9.8
|
{'CWE-863'}
|
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/re7593a274ee0a85d304d5d42c66fc0081c94d7f22bc96a1084d43b80@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.asc', 'https://lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6@%3Cdev.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-cw6w-q88j-6mqf', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12419', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
GHSA
|
GHSA-q6cj-6jvq-jwmh
|
Privilege Escalation in Cloud Native Computing Foundation Harbor
|
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform.
|
{'CVE-2019-19023'}
|
2021-05-18T18:27:28Z
|
2021-05-18T18:27:28Z
|
MODERATE
| 9.3
|
{'CWE-269'}
|
{'https://github.com/goharbor/harbor/security/advisories/GHSA-3868-7c5x-4827', 'https://github.com/advisories/GHSA-q6cj-6jvq-jwmh', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19023', 'https://tanzu.vmware.com/security/cve-2019-19023', 'https://github.com/goharbor/harbor/security/advisories'}
| null |
GHSA
|
GHSA-9hx8-2mrv-r674
|
Deserialization of Untrusted Data in Apache jUDDI
|
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services.
RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely.
For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.
|
{'CVE-2021-37578'}
|
2021-08-31T21:02:02Z
|
2021-08-09T20:41:37Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/advisories/GHSA-9hx8-2mrv-r674', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37578', 'http://www.openwall.com/lists/oss-security/2021/07/29/1', 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f', 'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E'}
| null |
GHSA
|
GHSA-hgpf-97c5-74fc
|
Regular expression denial of service in @absolunet/kafe
|
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.
|
{'CVE-2020-7761'}
|
2021-05-10T19:08:29Z
|
2021-05-10T19:08:29Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403', 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761', 'https://github.com/advisories/GHSA-hgpf-97c5-74fc', 'https://www.npmjs.com/package/@absolunet/kafe'}
| null |
GHSA
|
GHSA-w4f8-fxq2-j35v
|
Possible privilege escalation via bash completion script
|
The bash completion script for `fscrypt` through v0.3.2 allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the `fscrypt` bash completion script to complete mountpoint paths. We recommend upgrading to v0.3.3 or above.
For more details, see [CVE-2022-25328](https://www.cve.org/CVERecord?id=CVE-2022-25328).
| null |
2022-04-19T19:03:25Z
|
2022-03-01T21:04:57Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-w4f8-fxq2-j35v', 'https://github.com/google/fscrypt/security/advisories/GHSA-w4f8-fxq2-j35v'}
| null |
GHSA
|
GHSA-fqq2-xp7m-xvm8
|
Data race in ruspiro-singleton
|
`Singleton<T>` is meant to be a static object that can be initialized lazily. In
order to satisfy the requirement that `static` items must implement `Sync`,
`Singleton` implemented both `Sync` and `Send` unconditionally.
This allows for a bug where non-`Sync` types such as `Cell` can be used in
singletons and cause data races in concurrent programs.
The flaw was corrected in commit `b0d2bd20e` by adding trait bounds, requiring
the contaiend type to implement `Sync`.
|
{'CVE-2020-36435'}
|
2021-08-25T20:58:19Z
|
2021-08-25T20:58:19Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://github.com/RusPiRo/ruspiro-singleton/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36435', 'https://github.com/RusPiRo/ruspiro-singleton/pull/11', 'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e', 'https://github.com/advisories/GHSA-fqq2-xp7m-xvm8', 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html'}
| null |
GHSA
|
GHSA-w6rq-6h34-vh7q
|
Cached redirect poisoning via X-Forwarded-Host header
|
A user supplied `X-Forwarded-Host` header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the `X-Forwarded-Host` header as a cache key.
Users are only vulnerable if they do not configure a custom `PublicAddress` instance. A custom `PublicAddress` can be specified by using [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-). For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of `PublicAddress` which is vulnerable.
### Impact
This can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location.
### Patches
As of Ratpack 1.9.0, two changes have been made that mitigate this vulnerability:
1. The default PublicAddress implementation no longer infers the address from the request context, instead relying on the configured bind host/port
2. Relative redirects issued by the application are no longer absolutized; they are passed through as-is
### Workarounds
In production, ensure that [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-) correctly configures the server.
### References
- https://portswigger.net/web-security/web-cache-poisoning
|
{'CVE-2021-29479'}
|
2022-04-19T19:02:27Z
|
2021-07-01T17:02:38Z
|
HIGH
| 7
|
{'CWE-807'}
|
{'https://portswigger.net/web-security/web-cache-poisoning', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29479', 'https://github.com/advisories/GHSA-w6rq-6h34-vh7q', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-w6rq-6h34-vh7q'}
| null |
GHSA
|
GHSA-q6w2-89hq-hq27
|
Cross-site scripting in keycloak
|
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
{'CVE-2021-20195'}
|
2021-06-08T23:02:43Z
|
2021-06-08T23:02:43Z
|
CRITICAL
| 9.6
|
{'CWE-20', 'CWE-79'}
|
{'https://github.com/advisories/GHSA-q6w2-89hq-hq27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195', 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}
| null |
GHSA
|
GHSA-cwcx-rxgc-cmw3
|
Prototype pollution in 101
|
Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25943'}
|
2021-05-25T20:45:17Z
|
2021-05-17T20:57:40Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25943', 'https://github.com/advisories/GHSA-cwcx-rxgc-cmw3', 'https://github.com/tjmehta/101/blob/d87f63ce2a4cbdc476e8287abd78327c3144d646/set.js#L52'}
| null |
GHSA
|
GHSA-gjh6-wvhq-h4qx
|
Cross-site Scripting in FreeTAKServer-UI
|
FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.
|
{'CVE-2022-25507'}
|
2022-03-29T21:09:45Z
|
2022-03-12T00:00:37Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/FreeTAKTeam/UI/issues/28', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25507', 'https://github.com/advisories/GHSA-gjh6-wvhq-h4qx'}
| null |
GHSA
|
GHSA-p3jx-g34v-q56j
|
Malicious Package in j3-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:31:55Z
|
2020-09-03T22:54:02Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1276', 'https://github.com/advisories/GHSA-p3jx-g34v-q56j'}
| null |
GHSA
|
GHSA-9pq7-rcxv-47vq
|
Incorrect Regular Expression in RestSharp
|
RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.
|
{'CVE-2021-27293'}
|
2021-07-15T20:24:44Z
|
2021-07-14T19:10:01Z
|
HIGH
| 7.5
|
{'CWE-697', 'CWE-185'}
|
{'https://github.com/restsharp/RestSharp/issues/1556', 'https://restsharp.dev/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293', 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc', 'https://github.com/advisories/GHSA-9pq7-rcxv-47vq'}
| null |
GHSA
|
GHSA-hjf3-r7gw-9rwg
|
Moderate severity vulnerability that affects feedparser
|
Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document.
|
{'CVE-2012-2921'}
|
2021-09-14T17:24:40Z
|
2018-07-24T20:00:41Z
|
MODERATE
| 0
| null |
{'http://freecode.com/projects/feedparser/releases/344371', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2921', 'https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706', 'http://www.mandriva.com/security/advisories?name=MDVSA-2013:118', 'https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py', 'http://secunia.com/advisories/49256', 'https://github.com/advisories/GHSA-hjf3-r7gw-9rwg', 'https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0157', 'http://osvdb.org/81701', 'http://www.securityfocus.com/bid/53654'}
| null |
GHSA
|
GHSA-h6rj-8r3c-9gpj
|
bson is vulnerable to denial of service due to incorrect regex validation
|
BSON injection vulnerability in the legal? function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
|
{'CVE-2015-4412'}
|
2022-04-25T22:35:30Z
|
2018-03-05T19:43:21Z
|
CRITICAL
| 9.8
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'http://www.securityfocus.com/bid/75045', 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj', 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229750'}
| null |
GHSA
|
GHSA-fgfj-rj24-mj7q
|
Malicious Package in kraken-api
|
Version 0.1.8 of `kraken-api` contains malicious code as a postinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2020-09-02T21:47:08Z
|
2020-09-02T21:47:08Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/914', 'https://github.com/advisories/GHSA-fgfj-rj24-mj7q'}
| null |
GHSA
|
GHSA-8xfw-5q82-3652
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.1 users should update to spree_auth_devise 4.1.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
| null |
2022-04-19T19:03:15Z
|
2021-11-18T20:15:23Z
|
CRITICAL
| 9.3
|
{'CWE-352'}
|
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-8xfw-5q82-3652', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/advisories/GHSA-8xfw-5q82-3652'}
| null |
GHSA
|
GHSA-h6rp-8v4j-hwph
|
High severity vulnerability that affects org.apache.camel:camel-core
|
The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.
|
{'CVE-2014-0003'}
|
2021-09-14T15:32:35Z
|
2018-10-16T23:13:49Z
|
HIGH
| 0
| null |
{'http://secunia.com/advisories/57719', 'http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc', 'http://rhn.redhat.com/errata/RHSA-2014-0245.html', 'http://rhn.redhat.com/errata/RHSA-2014-0254.html', 'http://secunia.com/advisories/57125', 'http://secunia.com/advisories/57716', 'http://rhn.redhat.com/errata/RHSA-2014-0371.html', 'https://github.com/advisories/GHSA-h6rp-8v4j-hwph', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0003', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/bid/65902', 'http://rhn.redhat.com/errata/RHSA-2014-0372.html', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
| null |
GHSA
|
GHSA-v3px-6cc8-f8j3
|
Path traversal in servey
|
A path traversal vulnerability in servey versions prior to 3.3.2 allows an attacker to read content of any arbitrary file.
|
{'CVE-2020-8214'}
|
2021-05-07T15:56:19Z
|
2021-05-07T15:56:19Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://hackerone.com/reports/355501', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8214', 'https://github.com/advisories/GHSA-v3px-6cc8-f8j3'}
| null |
GHSA
|
GHSA-6v52-mj5r-7j2m
|
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
|
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
|
{'CVE-2018-8037'}
|
2021-09-02T18:25:31Z
|
2018-10-17T16:33:02Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'http://mail-archives.us.apache.org/mod_mbox/www-announce/201808.mbox/%3C0c616b4d-4e81-e7f8-b81d-1bb4c575aa33%40apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2868', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/104894', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2018:2867', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090623.GA92700%40minotaur.apache.org%3E', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041376', 'https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-6v52-mj5r-7j2m', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8037', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2018/dsa-4281'}
| null |
GHSA
|
GHSA-3fc5-9x9m-vqc4
|
Privilege Escalation in express-cart
|
Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users.
## Recommendation
Update to version 1.1.6 or later.
| null |
2021-08-04T21:25:59Z
|
2019-06-03T17:31:32Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json', 'https://www.npmjs.com/advisories/730', 'https://hackerone.com/reports/343626', 'https://snyk.io/vuln/npm:express-cart:20180712', 'https://github.com/advisories/GHSA-3fc5-9x9m-vqc4', 'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'}
| null |
GHSA
|
GHSA-mw25-f5r2-hpc6
|
Insertion of Sensitive Information into Log File in Apache Geode
|
Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". This issue is fixed by overhauling the log file redaction in Apache Geode versions 1.12.5, 1.13.5, and 1.14.0.
|
{'CVE-2021-34797'}
|
2022-01-13T18:33:07Z
|
2022-01-06T22:23:25Z
|
HIGH
| 0
|
{'CWE-532'}
|
{'https://lists.apache.org/thread/p4l0g49rzzzpn8yt9q9p0xp52h3zmsmk', 'https://lists.apache.org/thread/nq2w9gjzm1cjx1rh6zw41ty39qw7qpx4', 'https://github.com/advisories/GHSA-mw25-f5r2-hpc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34797'}
| null |
GHSA
|
GHSA-mc23-976p-j42x
|
Low severity vulnerability that affects xterm
|
A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters, aka "Xterm Remote Code Execution Vulnerability." This affects xterm.js.
|
{'CVE-2019-0542'}
|
2021-09-15T18:49:27Z
|
2019-01-14T16:19:55Z
|
LOW
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0542', 'https://github.com/advisories/GHSA-mc23-976p-j42x'}
| null |
GHSA
|
GHSA-h8hx-2c5r-32cf
|
Cross-Site Request Forgery (CSRF) in trestle-auth
|
### Impact
A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials.
### Patches
The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues)
* Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com)
|
{'CVE-2021-29435'}
|
2022-04-19T19:02:54Z
|
2021-04-13T17:01:50Z
|
HIGH
| 8.1
|
{'CWE-352'}
|
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc', 'https://github.com/advisories/GHSA-h8hx-2c5r-32cf', 'https://rubygems.org/gems/trestle-auth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf'}
| null |
GHSA
|
GHSA-487w-pqcm-63hq
|
Command injection in buns
|
There is a command injection vulnerability in all versions of package buns. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule).
|
{'CVE-2020-7794'}
|
2021-01-25T15:33:52Z
|
2021-01-13T18:22:13Z
|
CRITICAL
| 0
|
{'CWE-77', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7794', 'https://github.com/advisories/GHSA-487w-pqcm-63hq', 'https://snyk.io/vuln/SNYK-JS-BUNS-1050389'}
| null |
GHSA
|
GHSA-6g6m-m6h5-w9gf
|
Authorization bypass in express-jwt
|
### Overview
Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration.
When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
You are using express-jwt
AND
You do not have **algorithms** configured in your express-jwt configuration.
AND
You are using libraries such as jwks-rsa as the **secret**.
### How to fix that?
Specify **algorithms** in the express-jwt configuration. The following is an example of a proper configuration
```
const checkJwt = jwt({
secret: jwksRsa.expressJwtSecret({
rateLimit: true,
jwksRequestsPerMinute: 5,
jwksUri: `https://${DOMAIN}/.well-known/jwks.json`
}),
// Validate the audience and the issuer.
audience: process.env.AUDIENCE,
issuer: `https://${DOMAIN}/`,
// restrict allowed algorithms
algorithms: ['RS256']
});
```
### Will this update impact my users?
The fix provided in patch will not affect your users if you specified the algorithms allowed. The patch now makes **algorithms** a required configuration.
### Credit
IST Group
|
{'CVE-2020-15084'}
|
2021-01-07T23:49:23Z
|
2020-06-30T16:05:24Z
|
HIGH
| 7.7
|
{'CWE-285'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15084', 'https://github.com/advisories/GHSA-6g6m-m6h5-w9gf', 'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef', 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf'}
| null |
GHSA
|
GHSA-g53w-52xc-2j85
|
Cross-Site Scripting in react
|
Affected versions of `react` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize input used to create keys. This may allow attackers to execute arbitrary JavaScript if a key is generated from user input.
## Recommendation
If you are using `react` 0.5.x, upgrade to version 0.5.2 or later.
If you are using `react` 0.4.x, upgrade to version 0.4.2 or later.
|
{'CVE-2013-7035'}
|
2021-10-04T19:11:02Z
|
2020-09-04T16:52:57Z
|
MODERATE
| 6.5
|
{'CWE-79'}
|
{'https://reactjs.org/blog/2013/12/18/react-v0.5.2-v0.4.2.html', 'https://snyk.io/vuln/npm:react:20131217', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7035', 'https://github.com/advisories/GHSA-g53w-52xc-2j85', 'https://www.npmjs.com/advisories/1420'}
| null |
GHSA
|
GHSA-fv48-hjhp-94c7
|
Incorrect Authorization in TeamPass
|
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
|
{'CVE-2020-12477'}
|
2021-07-26T21:20:38Z
|
2021-07-26T21:20:38Z
|
HIGH
| 7.5
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-fv48-hjhp-94c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12477', 'https://github.com/nilsteampassnet/TeamPass/issues/2761'}
| null |
GHSA
|
GHSA-742w-89gc-8m9c
|
containerd v1.2.x can be coerced into leaking credentials during image pull
|
## Impact
If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers.
If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account.
The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it.
This vulnerability has been rated by the containerd maintainers as medium, with a CVSS score of 6.1 and a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N.
## Patches
This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected.
## Workarounds
If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected.
## Credits
The containerd maintainers would like to thank Brad Geesaman, Josh Larsen, Ian Coldwater, Duffie Cooley, and Rory McCune for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/master/SECURITY.md).
|
{'CVE-2020-15157'}
|
2022-04-19T19:02:37Z
|
2022-02-11T23:27:39Z
|
MODERATE
| 6.1
|
{'CWE-522'}
|
{'https://usn.ubuntu.com/4589-2/', 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15157', 'https://usn.ubuntu.com/4589-1/', 'https://darkbit.io/blog/cve-2020-15157-containerdrip', 'https://github.com/advisories/GHSA-742w-89gc-8m9c', 'https://www.debian.org/security/2021/dsa-4865', 'https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c', 'https://github.com/containerd/containerd/releases/tag/v1.2.14'}
| null |
GHSA
|
GHSA-hvv8-336g-rx3m
|
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
|
### Impact
The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21342](https://x-stream.github.io/CVE-2021-21342.html).
### Credits
钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21342'}
|
2022-02-10T11:35:18Z
|
2021-03-22T23:28:01Z
|
MODERATE
| 5.3
|
{'CWE-502', 'CWE-918'}
|
{'https://github.com/advisories/GHSA-hvv8-336g-rx3m', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21342', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://x-stream.github.io/CVE-2021-21342.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m'}
| null |
GHSA
|
GHSA-v47f-vp3p-5j6h
|
"Cross-site scripting in ThinkAdmin"
|
"ThinkAdmin version v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML."
|
{'CVE-2020-29315'}
|
2021-05-06T18:53:46Z
|
2021-05-06T18:53:46Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-v47f-vp3p-5j6h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29315', 'https://github.com/zoujingli/ThinkAdmin/issues/255'}
| null |
GHSA
|
GHSA-c6fm-rgw4-8q73
|
Moderate severity vulnerability that affects CoAPthon3
|
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
|
{'CVE-2018-12679'}
|
2021-09-08T21:29:59Z
|
2019-04-08T15:18:57Z
|
HIGH
| 7.5
|
{'CWE-502'}
|
{'https://github.com/Tanganelli/CoAPthon3/issues/16', 'https://github.com/advisories/GHSA-c6fm-rgw4-8q73', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12679'}
| null |
GHSA
|
GHSA-5822-pw57-vv37
|
XSS vulnerability when listing users on add & modify server pages.
|
### Impact
An XSS vulnerability exists in versions of Pterodactyl Panel before 0.7.19. Affected versions do not properly sanitize account names before rendering them to the dropdown selector in the admin area when creating or modifying a server.
### Patches
This XSS has been addressed in 0.7.19 and will be rolled forwards into the 1.0-rc.7 release.
### Workarounds
No workaround exists without manual patching. See https://github.com/pterodactyl/panel/pull/2441/files for the files changed.
### For more information
If you have any questions or comments about this advisory please reach out on Discord, or by emailing `dane` at `pterodactyl` dot `io`.
_Thank you to Sergej for the responsible disclosure of this issue._
| null |
2022-04-19T19:02:36Z
|
2020-10-08T20:13:19Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5822-pw57-vv37', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5822-pw57-vv37'}
| null |
GHSA
|
GHSA-gm9x-q798-hmr4
|
Command Injection in git-tags-remote
|
All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled.
The following proof-of-concept creates a file in `/tmp`:
```
const gitTagsRemote = require('git-tags-remote');
gitTagsRemote.get('https://github.com/sh0ji/git-tags-remote.git; echo "Injection Success" > /tmp/command-injection.test')
.then(tags => console.log(tags));
```
| null |
2021-09-23T17:26:33Z
|
2020-07-29T14:53:40Z
|
HIGH
| 7.2
|
{'CWE-78'}
|
{'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c', 'https://github.com/advisories/GHSA-gm9x-q798-hmr4', 'https://www.npmjs.com/advisories/1517', 'https://github.com/sh0ji/git-tags-remote/issues/58'}
| null |
GHSA
|
GHSA-4q79-fch7-g78q
|
Downloads Resources over HTTP in grunt-webdriver-qunit
|
Affected versions of `grunt-webdriver-qunit` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-webdriver-qunit`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10606'}
|
2021-01-08T19:54:31Z
|
2019-02-18T23:48:11Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/207', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10606', 'https://github.com/advisories/GHSA-4q79-fch7-g78q', 'https://www.npmjs.com/advisories/207'}
| null |
GHSA
|
GHSA-pmw4-jgxx-pcq9
|
File System Bounds Escape
|
### Impact
Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`.
### Background
When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function.

### Patches
None at the moment.
### Workarounds
There are no workarounds for windows servers. Hosting the server on a different OS mitigates the issue.
### References
Issues:
https://github.com/autovance/ftp-srv/issues/167
https://github.com/autovance/ftp-srv/issues/225
### For more information
If you have any questions or comments about this advisory:
Open an issue at https://github.com/autovance/ftp-srv.
Please email us directly; security@autovance.com.
|
{'CVE-2020-26299'}
|
2022-04-19T19:02:43Z
|
2021-02-10T18:11:34Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26299', 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/issues/225', 'https://github.com/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/pull/224', 'https://www.npmjs.com/package/ftp-srv', 'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3', 'https://github.com/autovance/ftp-srv/issues/167'}
| null |
GHSA
|
GHSA-86g5-2wh3-gc9j
|
Critical severity vulnerability that affects actionview
|
# File Content Disclosure in Action View
Impact
------
There is a possible file content disclosure vulnerability in Action View.
Specially crafted accept headers in combination with calls to `render file:`
can cause arbitrary files on the target server to be rendered, disclosing the
file contents.
The impact is limited to calls to `render` which render file contents without
a specified accept format. Impacted code in a controller looks something like
this:
```
class UserController < ApplicationController
def index
render file: "#{Rails.root}/some/file"
end
end
```
Rendering templates as opposed to files is not impacted by this vulnerability.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are
available at the normal locations.
Workarounds
-----------
This vulnerability can be mitigated by specifying a format for file rendering,
like this:
```
class UserController < ApplicationController
def index
render file: "#{Rails.root}/some/file", formats: [:html]
end
end
```
In summary, impacted calls to `render` look like this:
```
render file: "#{Rails.root}/some/file"
```
The vulnerability can be mitigated by changing to this:
```
render file: "#{Rails.root}/some/file", formats: [:html]
```
Other calls to `render` are not impacted.
Alternatively, the following monkey patch can be applied in an initializer:
```
$ cat config/initializers/formats_filter.rb
# frozen_string_literal: true
ActionDispatch::Request.prepend(Module.new do
def formats
super().select do |format|
format.symbol || format.ref == "*/*"
end
end
end)
```
Credits
-------
Thanks to John Hawthorn <john@hawthorn.email> of GitHub
|
{'CVE-2019-5418'}
|
2021-06-11T15:18:45Z
|
2019-03-13T17:26:59Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://access.redhat.com/errata/RHSA-2019:1149', 'https://access.redhat.com/errata/RHSA-2019:1147', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5418', 'https://groups.google.com/forum/#!topic/rubyonrails-security/zRNVOUhKHrg', 'https://access.redhat.com/errata/RHSA-2019:0796', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html', 'https://www.exploit-db.com/exploits/46585/', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html', 'http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html', 'https://github.com/advisories/GHSA-86g5-2wh3-gc9j', 'http://www.openwall.com/lists/oss-security/2019/03/22/1', 'https://access.redhat.com/errata/RHSA-2019:1289'}
| null |
GHSA
|
GHSA-6xg2-cf6h-x4v8
|
Malicious Package in buffer-por
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:58:55Z
|
2020-09-03T21:53:05Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1243', 'https://github.com/advisories/GHSA-6xg2-cf6h-x4v8'}
| null |
GHSA
|
GHSA-5fvx-2jj3-6mff
|
Insufficiently Protected Credentials in Elasticsearch
|
Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
|
{'CVE-2021-22132'}
|
2022-04-22T18:16:03Z
|
2021-03-18T19:27:27Z
|
MODERATE
| 4.8
|
{'CWE-522'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22132', 'https://security.netapp.com/advisory/ntap-20210219-0004/', 'https://github.com/advisories/GHSA-5fvx-2jj3-6mff'}
| null |
GHSA
|
GHSA-8pww-pp5r-rff8
|
Path Traversal in marscode
|
This affects all versionsup to and including version 1.0.1-0 of package marscode. There is no path sanitization in the path provided at fs.readFile in index.js.
|
{'CVE-2020-7681'}
|
2021-05-07T16:06:03Z
|
2021-05-07T16:06:03Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-8pww-pp5r-rff8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7681', 'https://snyk.io/vuln/SNYK-JS-MARSCODE-590122'}
| null |
GHSA
|
GHSA-936x-wgqv-hhgq
|
Authenticated path traversal in Umbraco CMS
|
An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.
|
{'CVE-2020-5811'}
|
2021-09-01T19:35:34Z
|
2021-04-13T15:51:33Z
|
MODERATE
| 6.5
|
{'CWE-22'}
|
{'https://www.tenable.com/security/research/tra-2020-59', 'http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html', 'https://github.com/advisories/GHSA-936x-wgqv-hhgq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5811'}
| null |
GHSA
|
GHSA-j7mj-748x-7p78
|
DOS attack in Pillow when processing specially crafted image files
|
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
|
{'CVE-2019-16865'}
|
2021-08-18T21:51:24Z
|
2019-10-22T14:40:42Z
|
HIGH
| 7.5
|
{'CWE-770'}
|
{'https://access.redhat.com/errata/RHSA-2020:0580', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16865', 'https://usn.ubuntu.com/4272-1/', 'https://www.debian.org/security/2020/dsa-4631', 'https://access.redhat.com/errata/RHSA-2020:0681', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://github.com/advisories/GHSA-j7mj-748x-7p78', 'https://github.com/python-pillow/Pillow/issues/4123', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3/', 'https://access.redhat.com/errata/RHSA-2020:0566', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU/'}
| null |
GHSA
|
GHSA-4hm7-73ch-vm59
|
Malicious Package in buffer-8or
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:58:16Z
|
2020-09-03T21:49:43Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-4hm7-73ch-vm59', 'https://www.npmjs.com/advisories/1241'}
| null |
GHSA
|
GHSA-rfcf-m67m-jcrq
|
Authentication granted to all firewalls instead of just one
|
Description
-----------
When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on one part of the application is considered authenticated on the whole application.
Resolution
----------
We now ensure that the authenticated token is only available for the firewall that generates it.
The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728) for branch 5.3.
Credits
-------
I would like to thank Bogdan, gndk, Paweł Warchoł, Warxcell, and Adrien Lamotte for reporting the issue and Wouter J for fixing the issue.
|
{'CVE-2021-32693'}
|
2022-04-19T19:03:00Z
|
2021-06-21T17:03:44Z
|
HIGH
| 6.8
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://github.com/advisories/GHSA-rfcf-m67m-jcrq', 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129', 'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728'}
| null |
GHSA
|
GHSA-qv8q-v995-72gr
|
Validation bypass vulnerability
|
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan)
| null |
2020-09-09T17:29:38Z
|
2020-09-09T17:29:38Z
|
LOW
| 0
| null |
{'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr', 'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/advisories/GHSA-qv8q-v995-72gr'}
| null |
GHSA
|
GHSA-hcxx-mp6g-6gr9
|
Opencast publishes global system account credentials
|
The issue was mostly mitigated before, drastically reducing the risk. See references below for more information.
### Impact
Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials, regardless of the target being part of the Opencast cluster or not.
Previous mitigations already prevented clear text authentications for such requests (e.g. HTTP Basic authentication), but with enough malicious intent, even hashed credentials can be broken.
### Patches
Opencast 10.6 will now send authentication requests only against servers which are part of the Opencast cluster, preventing external services from getting any form of authentication attempt in the first place.
### Workarounds
No workaround available.
### References
- [Patch fixing the issue](https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51)
- [Original security notice](https://groups.google.com/a/opencast.org/g/security-notices/c/XRZzRiqp-NE)
- [Original security mitigation](https://github.com/opencast/opencast/commit/fe8c3d3a60dc5869b468957270dbad5f8c30ead6)
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
- Email us at [security@opencast.org](mailto:security@opencast.org)
|
{'CVE-2018-16153'}
|
2022-04-19T19:03:17Z
|
2021-12-14T21:43:48Z
|
LOW
| 0
|
{'CWE-200', 'CWE-522'}
|
{'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9', 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51', 'https://github.com/advisories/GHSA-hcxx-mp6g-6gr9', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}
| null |
GHSA
|
GHSA-gg2g-m5wc-vccq
|
Rebuild-bot workflow may allow unauthorised repository modifications
|
### Impact
`projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the "main" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the "main" repository.
The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made).
Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch.
### Patches
The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow.
### Workarounds
The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue.
### References
The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem.
[1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests
|
{'CVE-2021-21423'}
|
2021-04-16T22:53:31Z
|
2021-04-06T18:36:40Z
|
HIGH
| 9.4
|
{'CWE-527'}
|
{'https://github.com/advisories/GHSA-gg2g-m5wc-vccq', 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643', 'https://www.npmjs.com/package/projen', 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423'}
| null |
GHSA
|
GHSA-j77r-2fxf-5jrw
|
Improper path handling in kustomization files allows path traversal
|
The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can lead to privilege escalation if the controller's service account has elevated permissions.
Within the affected versions, users with write access to a Flux source are able to use built-in features to expose sensitive data from the controller’s pod filesystem using a malicious `kustomization.yaml` file.
This vulnerability was fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0 released on 2022-04-20. The changes introduce a new Kustomize file system implementation which ensures that all files being handled are contained within the Kustomization working directory, blocking references to any files that do not meet that requirement.
Automated tooling (e.g. conftest) could be employed as a workaround, as part of a user's CI/CD pipeline to ensure that their `kustomization.yaml` files conform with specific policies, blocking access to sensitive path locations.
|
{'CVE-2022-24877'}
|
2022-05-05T21:49:52Z
|
2022-05-04T18:04:07Z
|
CRITICAL
| 9.9
|
{'CWE-22'}
|
{'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a', 'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/advisories/GHSA-j77r-2fxf-5jrw', 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw'}
| null |
GHSA
|
GHSA-mcg9-64cp-xwp7
|
Server-Side Request Forgery in Hawt Hawtio
|
Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.
|
{'CVE-2019-9827'}
|
2021-08-17T15:47:24Z
|
2019-07-05T21:08:09Z
|
CRITICAL
| 9.8
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9827', 'https://github.com/advisories/GHSA-mcg9-64cp-xwp7', 'https://www.ciphertechs.com/hawtio-advisory/'}
| null |
GHSA
|
GHSA-c4w7-xm78-47vh
|
Prototype Pollution in y18n
|
### Overview
The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution.
### POC
```
const y18n = require('y18n')();
y18n.setLocale('__proto__');
y18n.updateLocale({polluted: true});
console.log(polluted); // true
```
### Recommendation
Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.
|
{'CVE-2020-7774'}
|
2022-04-20T19:14:19Z
|
2021-03-29T16:05:12Z
|
HIGH
| 7.3
|
{'CWE-20', 'CWE-915'}
|
{'https://github.com/yargs/y18n/pull/108', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7774', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306', 'https://github.com/yargs/y18n/issues/96', 'https://github.com/advisories/GHSA-c4w7-xm78-47vh', 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
GHSA
|
GHSA-mv55-23xp-3wp8
|
Access control flaw in Kiali
|
An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kiali operand) to use this vulnerability and deploy a given image to anywhere in the cluster, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
{'CVE-2021-3495'}
|
2021-06-15T19:56:21Z
|
2021-06-08T20:09:36Z
|
HIGH
| 8.8
|
{'CWE-281'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=1947361', 'https://github.com/kiali/kiali-operator/pull/278', 'https://kiali.io/news/security-bulletins/kiali-security-003/', 'https://github.com/advisories/GHSA-mv55-23xp-3wp8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3495'}
| null |
GHSA
|
GHSA-jff3-mwp3-f8cw
|
Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `"Products.GenericSetup>=2.1.1"`
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Visit the ZMI Security tab at `portal_setup/manage_access` and click on the link _Access contents information_. On the next page, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. Return to the ZMI Security tab at `portal_setup/manage_access` and scroll down to the link _View_. Click on _View_, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_.
### References
_Are there any links users can visit to find out more?_
- [GHSA-jff3-mwp3-f8cw](https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw)
- [Products.GenericSetup on PyPI](https://pypi.org/project/Products.GenericSetup/)
- [Definition of information disclosure at MITRE](https://cwe.mitre.org/data/definitions/200.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Products.GenericSetup issue tracker](https://github.com/zopefoundation/Products.GenericSetup/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
|
{'CVE-2021-21360'}
|
2022-04-19T19:02:49Z
|
2021-03-09T00:38:31Z
|
LOW
| 0
|
{'CWE-200'}
|
{'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw', 'https://pypi.org/project/Products.GenericSetup/', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-jff3-mwp3-f8cw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360'}
| null |
GHSA
|
GHSA-8wgc-jjvv-cv6v
|
Improper Authorization in loopback
|
Vulnerable versions of `loopback` may allow attackers to create Authentication Tokens on behalf of other users due to Improper Authorization. If the AccessToken model is publicly exposed, an attacker can create Authorization Tokens for any user as long as they know the target's `userId`. This will allow the attacker to access the user's data and their privileges.
## Recommendation
For loopback 2.x, upgrade to version 2.40.0 or later
For loopback 3.x, upgrade to version 3.22.0 or later
| null |
2021-09-27T15:44:09Z
|
2020-09-02T15:54:52Z
|
HIGH
| 0
|
{'CWE-285'}
|
{'https://loopback.io/doc/en/lb3/Security-advisory-08-08-2018.html]', 'https://github.com/strongloop/loopback', 'https://www.npmjs.com/advisories/771', 'https://github.com/advisories/GHSA-8wgc-jjvv-cv6v', 'https://loopback.io/doc/en/lb2/Security-advisory-08-08-2018.html]'}
| null |
GHSA
|
GHSA-2r6q-6c8c-g762
|
Data races in toolshed
|
An issue was discovered in the toolshed crate through 2020-11-15 for Rust. In CopyCell<T>, the Send trait lacks bounds on the contained type.
|
{'CVE-2020-36456'}
|
2021-08-25T20:58:03Z
|
2021-08-25T20:58:03Z
|
HIGH
| 8.1
|
{'CWE-362', 'CWE-77'}
|
{'https://github.com/ratel-rust/toolshed/issues/12', 'https://github.com/advisories/GHSA-2r6q-6c8c-g762', 'https://rustsec.org/advisories/RUSTSEC-2020-0136.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36456'}
| null |
GHSA
|
GHSA-79qm-h35f-hr77
|
OS Command Injection in compile-sass
|
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function "setupCleanupOnExit(cssPath)" within "dist/index.js" is executed as part of the "rm" command without any sanitization.
|
{'CVE-2019-10799'}
|
2022-01-04T19:50:38Z
|
2021-04-13T15:23:13Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-RPI-548942', 'https://github.com/advisories/GHSA-79qm-h35f-hr77', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799', 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2', 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804'}
| null |
GHSA
|
GHSA-588m-9qg5-35pq
|
Reverse Tabnabbing in quill
|
Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-28T22:07:00Z
|
2020-09-03T17:19:09Z
|
MODERATE
| 6.5
|
{'CWE-1022'}
|
{'https://github.com/quilljs/quill/pull/2674', 'https://github.com/quilljs/quill/issues/2438', 'https://github.com/advisories/GHSA-588m-9qg5-35pq', 'https://www.npmjs.com/advisories/1039'}
| null |
GHSA
|
GHSA-r64m-qchj-hrjp
|
Webcache Poisoning in shopware/platform and shopware/core
|
### Impact
Webcache Poisoning via X-Forwarded-Prefix and sub-request
### Patches
We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
| null |
2021-11-24T20:05:19Z
|
2021-11-24T20:05:19Z
|
CRITICAL
| 0
|
{'CWE-444'}
|
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/advisories/GHSA-r64m-qchj-hrjp', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp'}
| null |
GHSA
|
GHSA-43gj-mj2w-wh46
|
Cross-Site Scripting in TYPO3 CMS Form Engine
|
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML `placeholder` attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described.
### References
* https://typo3.org/security/advisory/typo3-core-sa-2020-002
|
{'CVE-2020-11064'}
|
2022-04-19T19:02:30Z
|
2020-05-13T23:17:48Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-43gj-mj2w-wh46', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-43gj-mj2w-wh46', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11064'}
| null |
GHSA
|
GHSA-h232-fpqx-mqgr
|
Malicious Package in log-symboles
|
Version 2.1.0 of `log-symboles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-29T20:45:12Z
|
2020-09-03T21:03:15Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1195', 'https://github.com/advisories/GHSA-h232-fpqx-mqgr'}
| null |
GHSA
|
GHSA-fxp8-7h5w-h235
|
XSS in search engine
|
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
|
{'CVE-2019-13234'}
|
2021-08-18T22:27:15Z
|
2019-11-12T22:58:11Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-fxp8-7h5w-h235', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'}
| null |
GHSA
|
GHSA-crp2-qrr5-8pq7
|
containerd CRI plugin: Insecure handling of image volumes
|
### Impact
A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.
### Patches
This bug has been fixed in containerd 1.6.1, 1.5.10 and 1.4.13. Users should update to these versions to resolve the issue.
### Workarounds
Ensure that only trusted images are used.
### Credits
The containerd project would like to thank Felix Wilhelm of Google Project Zero for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
|
{'CVE-2022-23648'}
|
2022-03-29T19:11:09Z
|
2022-03-02T21:33:17Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/containerd/containerd/releases/tag/v1.5.10', 'http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/', 'https://github.com/containerd/containerd/releases/tag/v1.4.13', 'https://www.debian.org/security/2022/dsa-5091', 'https://github.com/containerd/containerd/releases/tag/v1.6.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/', 'https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'https://github.com/advisories/GHSA-crp2-qrr5-8pq7', 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23648'}
| null |
GHSA
|
GHSA-8r8j-xvfj-36f9
|
Code injection in ymlref
|
ymlref allows code injection.
|
{'CVE-2018-20133'}
|
2022-03-24T22:06:30Z
|
2018-12-19T19:25:14Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://github.com/dexter2206/ymlref/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20133', 'https://github.com/advisories/GHSA-8r8j-xvfj-36f9'}
| null |
GHSA
|
GHSA-m57p-p67h-mq74
|
Command Injection Vulnerability in systeminformation
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency()
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
|
{'CVE-2020-26274'}
|
2020-12-17T01:41:17Z
|
2020-12-16T19:25:00Z
|
MODERATE
| 6.4
|
{'CWE-78'}
|
{'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99', 'https://github.com/advisories/GHSA-m57p-p67h-mq74', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-m57p-p67h-mq74', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26274', 'https://www.npmjs.com/advisories/1590'}
| null |
GHSA
|
GHSA-6fcr-9h9g-23fq
|
Denial of Service in ipfs-bitswap
|
Versions of `ipfs-bitswap` prior to 0.24.1 are vulnerable to Denial of Service (DoS). The package put unwanted blocks in the blockstore, which could be used to exhaust system resources in specific conditions.
## Recommendation
Upgrade to version 0.24.1 or later.
| null |
2021-09-27T22:31:00Z
|
2020-09-02T21:50:51Z
|
MODERATE
| 5.9
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-6fcr-9h9g-23fq', 'https://www.npmjs.com/advisories/916', 'https://github.com/ipfs/js-ipfs-bitswap/pull/194', 'https://snyk.io/vuln/SNYK-JS-IPFSBITSWAP-174847'}
| null |
GHSA
|
GHSA-w4x9-4f5x-8jj8
|
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and org.apache.hive:hive-service
|
Apache Hive before 0.13.1, when in SQL standards based authorization mode, does not properly check the file permissions for (1) import and (2) export statements, which allows remote authenticated users to obtain sensitive information via a crafted URI.
|
{'CVE-2014-0228'}
|
2021-09-21T16:19:48Z
|
2018-11-21T22:23:29Z
|
LOW
| 0
|
{'CWE-284'}
|
{'http://mail-archives.apache.org/mod_mbox/hive-user/201406.mbox/%3CCABgNGzeN7E+9d=YV5yvnKA7wmSx1op_avtUjPcPtDaR6DLJM6g@mail.gmail.com%3E', 'http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html', 'https://github.com/advisories/GHSA-w4x9-4f5x-8jj8', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0228', 'http://www.securityfocus.com/archive/1/532418/100/0/threaded'}
| null |
GHSA
|
GHSA-j4mr-9xw3-c9jx
|
Out-of-bounds Read in base64-url
|
Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input.
## Recommendation
Update to version 2.0.0 or later.
| null |
2021-08-04T20:24:59Z
|
2019-05-31T23:47:01Z
|
HIGH
| 0
|
{'CWE-125'}
|
{'https://www.npmjs.com/advisories/660', 'https://hackerone.com/reports/321692', 'https://nodesecurity.io/advisories/660', 'https://github.com/advisories/GHSA-j4mr-9xw3-c9jx'}
| null |
GHSA
|
GHSA-rp65-9cf3-cjxr
|
Inefficient Regular Expression Complexity in nth-check
|
nth-check is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3803'}
|
2021-09-20T20:47:31Z
|
2021-09-20T20:47:31Z
|
MODERATE
| 7.5
|
{'CWE-1333'}
|
{'https://github.com/advisories/GHSA-rp65-9cf3-cjxr', 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0', 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3803'}
| null |
GHSA
|
GHSA-c4rh-4376-gff4
|
Improper certificate management in AWS IoT Device SDK v2
|
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.
|
{'CVE-2021-40830'}
|
2021-12-03T15:22:05Z
|
2021-11-24T21:12:04Z
|
MODERATE
| 6.3
|
{'CWE-295'}
|
{'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/advisories/GHSA-c4rh-4376-gff4', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'}
| null |
GHSA
|
GHSA-j28r-j54m-gpc4
|
Code Injection in SLO Generator
|
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
|
{'CVE-2021-22557'}
|
2021-10-18T18:40:16Z
|
2021-10-05T17:53:59Z
|
MODERATE
| 5.3
|
{'CWE-94'}
|
{'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html', 'https://github.com/google/slo-generator/pull/173', 'https://github.com/advisories/GHSA-j28r-j54m-gpc4', 'https://github.com/google/slo-generator/releases/tag/v2.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22557'}
| null |
GHSA
|
GHSA-w542-cpp9-r3g7
|
CSRF in Field Test
|
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2.
## Impact
The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected.
A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user.
All users running an affected release should upgrade immediately.
## Technical Details
Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.
|
{'CVE-2020-16252'}
|
2022-04-19T19:03:24Z
|
2020-08-05T14:53:34Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://github.com/ankane/field_test/issues/28', 'https://rubygems.org/gems/field_test', 'https://github.com/advisories/GHSA-w542-cpp9-r3g7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252', 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}
| null |
GHSA
|
GHSA-5mcr-gq6c-3hq2
|
Local Information Disclosure Vulnerability in Netty on Unix-Like systems
|
### Impact
When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled.
The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1)
### Vulnerability Details
On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems.
The method `File.createTempFile` on unix-like systems creates a random file, but, by default will create this file with the permissions `-rw-r--r--`. Thus, if sensitive information is written to this file, other local users can read this information.
This is the case in netty's `AbstractDiskHttpData` is vulnerable.
https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L80-L101
`AbstractDiskHttpData` is used as a part of the `DefaultHttpDataFactory` class which is used by `HttpPostRequestDecoder` / `HttpPostMultiPartRequestDecoder`.
You may be affected by this vulnerability your project contains the following code patterns:
```java
channelPipeline.addLast(new HttpPostRequestDecoder(...));
```
```java
channelPipeline.addLast(new HttpPostMultiPartRequestDecoder(...));
```
### Patches
This has been patched in version `4.1.59.Final`.
### Workarounds
Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user.
### References
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
### Similar Vulnerabilities
Similar, but not the same.
- JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [netty](https://github.com/netty/netty)
* Email us [here](mailto:netty-security@googlegroups.com)
### Original Report
> Hi Netty Security Team,
>
> I've been working on some security research leveraging custom CodeQL queries to detect local information disclosure vulnerabilities in java applications. This was the result from running this query against the netty project:
> https://lgtm.com/query/7723301787255288599/
>
> Netty contains three local information disclosure vulnerabilities, so far as I can tell.
>
> One is here, where the private key for the certificate is written to a temporary file.
>
> https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L316-L346
>
> One is here, where the certificate is written to a temporary file.
>
> https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L348-L371
>
> The final one is here, where the 'AbstractDiskHttpData' creates a temporary file if the getBaseDirectory() method returns null. I believe that 'AbstractDiskHttpData' is used as a part of the file upload support? If this is the case, any files uploaded would be similarly vulnerable.
>
> https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L91
>
> All of these vulnerabilities exist because `File.createTempFile(String, String)` will create a temporary file in the system temporary directory if the 'java.io.tmpdir' system property is not explicitly set. It is my understanding that when java creates a file, by default, and using this method, the permissions on that file utilize the umask. In a majority of cases, this means that the file that java creates has the permissions: `-rw-r--r--`, thus, any other local user on that system can read the contents of that file.
>
> Impacted OS:
> - Any OS where the system temporary directory is shared between multiple users. This is not the case for MacOS or Windows.
>
> Mitigation.
>
> Moving to the `Files` API instead will fix this vulnerability.
> https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile-java.nio.file.Path-java.lang.String-java.lang.String-java.nio.file.attribute.FileAttribute...-
>
> This API will explicitly set the posix file permissions to something safe, by default.
>
> I recently disclosed a similar vulnerability in JUnit 4:
> https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
>
> If you're also curious, this vulnerability in Jetty was also mine, also involving temporary directories, but is not the same vulnerability as in this case.
> https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
>
> I would appreciate it if we could perform disclosure of this vulnerability leveraging the GitHub security advisories feature here. GitHub has a nice credit system that I appreciate, plus the disclosures, as you can see from the sampling above, end up looking very nice.
> https://github.com/netty/netty/security/advisories
>
> This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first.
>
> Cheers,
> Jonathan Leitschuh
|
{'CVE-2021-21290'}
|
2022-04-22T18:18:15Z
|
2021-02-08T21:17:48Z
|
MODERATE
| 6.2
|
{'CWE-379', 'CWE-668', 'CWE-378'}
|
{'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21290', 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0011/', 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f@%3Ccommits.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00016.html', 'https://www.debian.org/security/2021/dsa-4885', 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.apache.org/thread.html/r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-4vf4-qmvg-mh7h
|
Cookie prefix spoofing in CGI
|
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
|
{'CVE-2021-41819'}
|
2022-02-14T22:21:20Z
|
2022-01-21T23:22:17Z
|
HIGH
| 7.5
|
{'CWE-565'}
|
{'https://security.netapp.com/advisory/ntap-20220121-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41819', 'https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/', 'https://github.com/advisories/GHSA-4vf4-qmvg-mh7h', 'https://hackerone.com/reports/910552'}
| null |
GHSA
|
GHSA-ccgm-3xw4-h5p8
|
Improper Restriction of XML External Entity Reference in pikepdf
|
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.
|
{'CVE-2021-29421'}
|
2021-09-29T18:44:06Z
|
2021-04-20T16:30:03Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QFLBBYGEDNXJ7FS6PIWTVI4T4BUPGEQ/', 'https://github.com/advisories/GHSA-ccgm-3xw4-h5p8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36P4HTLBJPO524WMQWW57N3QRF4RFSJG/', 'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421'}
| null |
GHSA
|
GHSA-95hx-62rh-gg96
|
Potential XSS injection In PrestaShop contactform
|
### Impact
An attacker is able to inject javascript while using the contact form.
### Patches
The problem is fixed in v4.3.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
|
{'CVE-2020-15178'}
|
2021-01-07T22:56:43Z
|
2020-09-15T17:34:17Z
|
HIGH
| 8
|
{'CWE-79'}
|
{'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178', 'https://packagist.org/packages/prestashop/contactform', 'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96', 'https://github.com/advisories/GHSA-95hx-62rh-gg96'}
| null |
GHSA
|
GHSA-v2wx-jj66-2hp7
|
Cross-site Scripting in Wildfly
|
A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.
|
{'CVE-2021-3536'}
|
2021-05-25T18:45:05Z
|
2021-05-25T18:45:05Z
|
LOW
| 3.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-v2wx-jj66-2hp7', 'https://bugzilla.redhat.com/show_bug.cgi?id=1948001', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3536'}
| null |
GHSA
|
GHSA-vv6j-ww6x-54gx
|
Use after free in Animation
|
CVE-2022-0609: Use after free in Animation
- https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0609
Google is aware of reports that exploits for CVE-2022-0609 exist in the wild.
The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are unknown but an exploit is available.
There is currently little other public information on the issue other than it has been flagged as `High` severity.
|
{'CVE-2022-0609'}
|
2022-04-12T15:14:37Z
|
2022-02-22T21:51:19Z
|
HIGH
| 8.8
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-vv6j-ww6x-54gx', 'https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html', 'https://crbug.com/1296150', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0609', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx'}
| null |
GHSA
|
GHSA-4rhm-m2fp-hx7q
|
Potential CSV Injection vector in OctoberCMS
|
### Impact
Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed:
1. Have found a vulnerability in the victim's spreadsheet software of choice.
2. Control data that would potentially be exported through the `ImportExportController` by a theoretical victim.
3. Convince the victim to export above data as a CSV and run it in vulnerable spreadsheet software while also bypassing any sanity checks by said software.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a & https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484 to your installation manually if unable to upgrade to Build 466.
### References
Reported by @chrisvidal initially & [Sivanesh Ashok](https://stazot.com/) later.
### For more information
If you have any questions or comments about this advisory:
* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
### Threat assessment:
Given the number of hoops that a potential attacker would have to jump through, this vulnerability really boils down to the possibility of abusing the trust that a user may have in the export functionality of the project. Thus, this has been rated low severity as it requires vulnerabilities to also exist in other software used by any potential victims as well as successful social engineering attacks.
|
{'CVE-2020-5299'}
|
2022-04-19T19:02:26Z
|
2020-06-03T21:58:35Z
|
MODERATE
| 4
|
{'CWE-77'}
|
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'https://github.com/advisories/GHSA-4rhm-m2fp-hx7q', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://github.com/octobercms/october/security/advisories/GHSA-4rhm-m2fp-hx7q'}
| null |
GHSA
|
GHSA-2j6v-xpf3-xvrv
|
Use of Externally-Controlled Format String in wire-avs
|
### Impact
A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code.
### Patches
* The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x)
### Workarounds
* No workaround known
### References
* Fixed in commit https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe
### For more information
If you have any questions or comments about this advisory feel free to email us at [vulnerability-report@wire.com](mailto:vulnerability-report@wire.com)
|
{'CVE-2021-41193'}
|
2022-03-10T15:59:42Z
|
2022-03-01T18:58:23Z
|
HIGH
| 9.8
|
{'CWE-134'}
|
{'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv', 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41193', 'https://github.com/advisories/GHSA-2j6v-xpf3-xvrv'}
| null |
GHSA
|
GHSA-h5h8-pc6h-jvvx
|
Missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial in composer
|
URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow commands to be executed in the HgDriver if hg/Mercurial is installed on the system.
### Impact
- The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins.
- The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote command injection. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone.
- Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately
### Patches
1.10.22 and 2.0.13 include patches for this issue.
|
{'CVE-2021-29472'}
|
2022-04-19T19:02:55Z
|
2021-04-29T21:52:04Z
|
HIGH
| 8.8
|
{'CWE-88', 'CWE-94'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29472', 'https://www.debian.org/security/2021/dsa-4907', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html', 'https://getcomposer.org/', 'https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx', 'https://github.com/advisories/GHSA-h5h8-pc6h-jvvx'}
| null |
GHSA
|
GHSA-q3gh-5r98-j4h3
|
RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign
|
### Impact
Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature.
- If you are not use RSA-PSS signature validation, this vulnerability is not affected.
- Risk to accept a forged or crafted message to be signed is low.
- Risk to raise memory corruption is low since jsrsasign uses BigInteger class.
### Patches
Users using RSA-PSS signature validation should upgrade to 8.0.17.
### Workarounds
Reject RSA-PSS signatures with unnecessary prepending zeros.
### References
https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3
[https://github.com/kjur/jsrsasign/issues/438](https://github.com/kjur/jsrsasign/issues/438)
https://nvd.nist.gov/vuln/detail/CVE-2020-14968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968
https://vuldb.com/?id.157125
https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS
|
{'CVE-2020-14968'}
|
2021-10-06T21:44:42Z
|
2020-06-26T16:26:50Z
|
CRITICAL
| 9.8
|
{'CWE-119'}
|
{'https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14968', 'https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/advisories/GHSA-q3gh-5r98-j4h3', 'https://github.com/kjur/jsrsasign/issues/438', 'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968', 'https://www.npmjs.com/advisories/1541', 'https://vuldb.com/?id.157125', 'https://www.npmjs.com/package/jsrsasign'}
| null |
GHSA
|
GHSA-wp4h-pvgw-5727
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in Apache Struts
|
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
|
{'CVE-2019-0230'}
|
2021-12-02T14:50:51Z
|
2021-12-02T14:50:51Z
|
CRITICAL
| 9.8
|
{'CWE-915'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html', 'https://cwiki.apache.org/confluence/display/ww/s2-059', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0230', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-wp4h-pvgw-5727', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://launchpad.support.sap.com/#/notes/2982840'}
| null |
GHSA
|
GHSA-53qw-q765-4fww
|
Denial-of-service in Django
|
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
|
{'CVE-2021-45115'}
|
2022-02-14T22:16:19Z
|
2022-01-12T19:20:53Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://www.djangoproject.com/weblog/2022/jan/04/security-releases/', 'https://security.netapp.com/advisory/ntap-20220121-0005/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://github.com/advisories/GHSA-53qw-q765-4fww', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45115', 'https://groups.google.com/forum/#!forum/django-announce'}
| null |
GHSA
|
GHSA-42qm-c3cf-9wv2
|
Code injection in dolibarr/dolibarr
|
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s parameter
|
{'CVE-2022-0819'}
|
2022-03-10T15:55:04Z
|
2022-03-03T00:00:49Z
|
HIGH
| 8.8
|
{'CWE-94'}
|
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://github.com/advisories/GHSA-42qm-c3cf-9wv2'}
| null |
GHSA
|
GHSA-v768-w7m9-2vmm
|
Reference binding to nullptr in shape inference
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`:
```python
import tensorflow as tf
tf.compat.v1.disable_v2_behavior()
tf.raw_ops.SparseFillEmptyRows(
indices = tf.constant([], shape=[0, 0], dtype=tf.int64),
values = tf.constant([], shape=[0], dtype=tf.int64),
dense_shape = tf.constant([], shape=[0], dtype=tf.int64),
default_value = 0)
```
The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/sparse_ops.cc#L608-L634) does not validate that the input arguments are not empty tensors.
### Patches
We have patched the issue in GitHub commit [578e634b4f1c1c684d4b4294f9e5281b2133b3ed](https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security
|
{'CVE-2021-37676'}
|
2021-08-25T14:41:26Z
|
2021-08-25T14:41:26Z
|
HIGH
| 7.8
|
{'CWE-824'}
|
{'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed', 'https://github.com/advisories/GHSA-v768-w7m9-2vmm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37676', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm'}
| null |
GHSA
|
GHSA-j66h-cc96-c32q
|
Cross-site Scripting in SilverStripe Framework
|
SilverStripe Framework through 4.8.1 allows XSS.
|
{'CVE-2021-36150'}
|
2021-12-22T20:59:33Z
|
2021-10-12T18:42:30Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/silverstripe/silverstripe-framework/releases', 'https://www.silverstripe.org/download/security-releases/CVE-2021-36150', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36150', 'https://github.com/advisories/GHSA-j66h-cc96-c32q'}
| null |
GHSA
|
GHSA-5qgp-p5jc-w2rm
|
Arbitrary Code Execution in Docker
|
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
|
{'CVE-2014-6407'}
|
2022-02-15T00:41:12Z
|
2022-02-15T00:41:12Z
|
HIGH
| 7.3
|
{'CWE-59'}
|
{'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407', 'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e', 'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://www.openwall.com/lists/oss-security/2014/11/24/5', 'https://docs.docker.com/v1.3/release-notes/', 'https://secunia.com/advisories/60171', 'https://secunia.com/advisories/60241', 'https://github.com/advisories/GHSA-5qgp-p5jc-w2rm', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6407', 'https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html'}
| null |
GHSA
|
GHSA-5mh9-r3rr-9597
|
Code execution vulnerability in HtmlUnit
|
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
|
{'CVE-2020-5529'}
|
2021-08-25T21:12:10Z
|
2020-05-21T21:08:33Z
|
HIGH
| 8.1
|
{'CWE-665'}
|
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00023.html', 'https://jvn.jp/en/jp/JVN34535327/', 'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367', 'https://github.com/HtmlUnit/htmlunit/releases/tag/2.37.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529', 'https://usn.ubuntu.com/4584-1/', 'https://github.com/advisories/GHSA-5mh9-r3rr-9597', 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563@%3Ccommits.camel.apache.org%3E'}
| null |
GHSA
|
GHSA-83r8-p8v6-6gfm
|
Slock<T> allows sending non-Send types across thread boundaries
|
`Slock<T>` unconditionally implements `Send`/`Sync`.
Affected versions of this crate allows sending non-Send types to other threads,
which can lead to data races and memory corruption due to the data race.
| null |
2021-08-25T21:00:20Z
|
2021-08-25T21:00:20Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://github.com/BrokenLamp/slock-rs/issues/2', 'https://github.com/advisories/GHSA-83r8-p8v6-6gfm', 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'}
| null |
GHSA
|
GHSA-gq77-3r6x-383w
|
Cross-site Scripting in ShowDoc
|
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0880'}
|
2022-03-23T15:37:14Z
|
2022-03-13T00:00:54Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf', 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c', 'https://github.com/advisories/GHSA-gq77-3r6x-383w'}
| null |
GHSA
|
GHSA-59x8-7wx6-4hj9
|
Malicious Package in secure_identity_login_module
|
All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:01:36Z
|
2020-09-03T17:47:52Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-59x8-7wx6-4hj9', 'https://www.npmjs.com/advisories/1063'}
| null |
GHSA
|
GHSA-rvmq-4x66-q7j3
|
Remote code execution in Apache Airflow
|
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
|
{'CVE-2020-11978'}
|
2021-09-22T21:16:27Z
|
2020-07-27T16:57:33Z
|
HIGH
| 8.8
|
{'CWE-77', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11978', 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-rvmq-4x66-q7j3'}
| null |
GHSA
|
GHSA-f7f4-hqp2-7prc
|
Improper Input Validation in sails-hook-sockets
|
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
|
{'CVE-2018-21036'}
|
2021-09-22T21:11:20Z
|
2020-07-24T20:10:21Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e', 'http://www.openwall.com/lists/oss-security/2020/07/19/1', 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md', 'https://github.com/advisories/GHSA-f7f4-hqp2-7prc'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.