ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-3f99-hvg4-qjwj
Insecure random number generation in keypair
## Description and Impact A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging to the victim. We recommend replacing any RSA keys that were generated using keypair version 1.0.3 or earlier. ## Fix * The [bug](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) in the pseudo-random number generator is fixed in commit [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18). * If the crypto module is available, it is used instead of the pseudo-random number generator. Also fixed in [`9596418`](https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18) ## Additional Details The specific [line](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L1008) with the flaw is: ```javascript b.putByte(String.fromCharCode(next & 0xFF)) ``` The [definition](https://github.com/juliangruber/keypair/blob/87c62f255baa12c1ec4f98a91600f82af80be6db/index.js#L350-L352) of `putByte` is ```javascript util.ByteBuffer.prototype.putByte = function(b) { this.data += String.fromCharCode(b); }; ``` Simplified, this is `String.fromCharCode(String.fromCharCode(next & 0xFF))`. This results in most of the buffer containing zeros. An example generated buffer: (Note: truncated for brevity) ``` \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x04\x00\x00\x00....\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ``` Since it is masking with 0xFF, approximately 97% of the bytes are converted to zeros. The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion. ## Credit This issue was reported to GitHub Security Lab by Ross Wheeler of Axosoft. It was discovered by Axosoft engineer Dan Suceava, who noticed that [keypair](https://github.com/juliangruber/keypair) was regularly generating duplicate RSA keys. GitHub security engineer [@vcsjones (Kevin Jones)](https://github.com/vcsjones) independently investigated the problem and identified the cause and source code location of the bug.
{'CVE-2021-41117'}
2022-04-19T19:03:11Z
2021-10-11T17:09:05Z
HIGH
8.7
{'CWE-335'}
{'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18', 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj', 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/', 'https://github.com/advisories/GHSA-3f99-hvg4-qjwj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41117', 'https://github.com/juliangruber/keypair/releases/tag/v1.0.4'}
null
GHSA
GHSA-ch4f-829c-v5pw
Division by 0 in `ResourceScatterDiv`
### Impact The implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error: ```python import tensorflow as tf v= tf.Variable([1,2,3]) tf.raw_ops.ResourceScatterDiv( resource=v.handle, indices=[1], updates=[0]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/resource_variable_ops.cc#L865) uses a common class for all binary operations but fails to treat the division by 0 case separately. ### Patches We have patched the issue in GitHub commit [4aacb30888638da75023e6601149415b39763d76](https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37642'}
2021-08-25T14:43:56Z
2021-08-25T14:43:56Z
MODERATE
5.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37642', 'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw', 'https://github.com/advisories/GHSA-ch4f-829c-v5pw'}
null
GHSA
GHSA-gr44-7grc-37vq
Moderate severity vulnerability that affects activerecord
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection mechanism and modify protected model attributes via a crafted request.
{'CVE-2013-0276'}
2021-09-13T12:44:07Z
2017-10-24T18:33:37Z
MODERATE
0
null
{'http://secunia.com/advisories/52112', 'http://www.openwall.com/lists/oss-security/2013/02/11/5', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276', 'https://github.com/advisories/GHSA-gr44-7grc-37vq', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'http://secunia.com/advisories/52774', 'http://www.debian.org/security/2013/dsa-2620', 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain', 'http://support.apple.com/kb/HT5784', 'http://www.osvdb.org/90072', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://www.securityfocus.com/bid/57896', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}
null
GHSA
GHSA-hxcc-f52p-wc94
Insecure serialization leading to RCE in serialize-javascript
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires the attacker to control the values of both `foo` and `bar` and guess the value of `<UID>`. The UID has a keyspace of approximately 4 billion making it a realistic network attack.
{'CVE-2020-7660'}
2021-09-23T18:51:00Z
2020-08-11T17:21:13Z
HIGH
8.1
{'CWE-502'}
{'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660', 'https://github.com/advisories/GHSA-hxcc-f52p-wc94'}
null
GHSA
GHSA-6wrh-279j-6hvw
HTTP caching is marking private HTTP headers as public in Shopware
### Impact HTTP caching is marking private HTTP headers as public ## Patches Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2022-24747'}
2022-03-18T20:15:07Z
2022-03-10T17:55:21Z
MODERATE
6.3
{'CWE-200'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/advisories/GHSA-6wrh-279j-6hvw'}
null
GHSA
GHSA-ppj3-7jw3-8vc4
Data races in lock_api
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedMutexGuard unsoundness.
{'CVE-2020-35910'}
2021-08-25T20:49:35Z
2021-08-25T20:49:35Z
MODERATE
5.5
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35910', 'https://github.com/advisories/GHSA-ppj3-7jw3-8vc4', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html', 'https://github.com/Amanieu/parking_lot/pull/262'}
null
GHSA
GHSA-cvx3-pqmj-x57x
Downloads Resources over HTTP in scalajs-standalone-bin
Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10634'}
2021-01-08T18:56:12Z
2019-02-18T23:47:13Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/231', 'https://github.com/advisories/GHSA-cvx3-pqmj-x57x', 'https://www.npmjs.com/advisories/231', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}
null
GHSA
GHSA-27g8-r9vw-765x
Private Field data leak
This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. This is an access control related oracle attack in that the attack method guides an attacker during their attempt to reveal information they do not have access to. The complexity of completing the attack is limited by some length-dependent behaviors and the fidelity of the exposed information. ### Impact Under some circumstances, field values or field value meta data can be determined, despite the field or list having `read` access control configured. If you use private fields or lists, you may be impacted. ### Patches None, at this time ### Workarounds None, at this time ### References None ### For more information For the protection of the community and private deployments, we think that the best course of action will be to not disclose further details on any open GitHub issues related to this advisory until a hot-fix or work-around has been deployed or published. If needed, you can email us at keystone@thinkmill.com.au
{'CVE-2021-32624'}
2022-04-19T19:02:58Z
2021-05-27T18:39:03Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/keystonejs/keystone-5/security/advisories/GHSA-27g8-r9vw-765x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32624', 'https://github.com/advisories/GHSA-27g8-r9vw-765x'}
null
GHSA
GHSA-xr53-m937-jr9c
Cross-Site Scripting in ngx-md
Versions of `ngx-md` prior to 6.0.3 are vulnerable to Cross-Site Scripting. Links are not properly restricted to http/https and can contain JavaScript which may lead to arbitrary code execution. Markdown input such as `[Click Me](javascript:alert('Injected!'%29)` is rendered as a `Click Me` link that executes JavaScript. ## Recommendation Upgrade to version 6.0.3 or later.
null
2021-10-04T21:05:29Z
2020-09-03T15:49:14Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1485', 'https://github.com/dimpu/ngx-md/issues/129', 'https://github.com/advisories/GHSA-xr53-m937-jr9c'}
null
GHSA
GHSA-cw6w-q88j-6mqf
Potential session hijack in Apache CXF
Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
{'CVE-2019-12419'}
2021-06-17T19:55:49Z
2019-11-08T17:12:59Z
CRITICAL
9.8
{'CWE-863'}
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/re7593a274ee0a85d304d5d42c66fc0081c94d7f22bc96a1084d43b80@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.asc', 'https://lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6@%3Cdev.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-cw6w-q88j-6mqf', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12419', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-q6cj-6jvq-jwmh
Privilege Escalation in Cloud Native Computing Foundation Harbor
Cloud Native Computing Foundation Harbor prior to 1.8.6 and 1.9.3 has a Privilege Escalation Vulnerability in the VMware Harbor Container Registry for the Pivotal Platform.
{'CVE-2019-19023'}
2021-05-18T18:27:28Z
2021-05-18T18:27:28Z
MODERATE
9.3
{'CWE-269'}
{'https://github.com/goharbor/harbor/security/advisories/GHSA-3868-7c5x-4827', 'https://github.com/advisories/GHSA-q6cj-6jvq-jwmh', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19023', 'https://tanzu.vmware.com/security/cve-2019-19023', 'https://github.com/goharbor/harbor/security/advisories'}
null
GHSA
GHSA-9hx8-2mrv-r674
Deserialization of Untrusted Data in Apache jUDDI
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.
{'CVE-2021-37578'}
2021-08-31T21:02:02Z
2021-08-09T20:41:37Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-9hx8-2mrv-r674', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37578', 'http://www.openwall.com/lists/oss-security/2021/07/29/1', 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f', 'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E'}
null
GHSA
GHSA-hgpf-97c5-74fc
Regular expression denial of service in @absolunet/kafe
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.
{'CVE-2020-7761'}
2021-05-10T19:08:29Z
2021-05-10T19:08:29Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403', 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761', 'https://github.com/advisories/GHSA-hgpf-97c5-74fc', 'https://www.npmjs.com/package/@absolunet/kafe'}
null
GHSA
GHSA-w4f8-fxq2-j35v
Possible privilege escalation via bash completion script
The bash completion script for `fscrypt` through v0.3.2 allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the `fscrypt` bash completion script to complete mountpoint paths. We recommend upgrading to v0.3.3 or above. For more details, see [CVE-2022-25328](https://www.cve.org/CVERecord?id=CVE-2022-25328).
null
2022-04-19T19:03:25Z
2022-03-01T21:04:57Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-w4f8-fxq2-j35v', 'https://github.com/google/fscrypt/security/advisories/GHSA-w4f8-fxq2-j35v'}
null
GHSA
GHSA-fqq2-xp7m-xvm8
Data race in ruspiro-singleton
`Singleton<T>` is meant to be a static object that can be initialized lazily. In order to satisfy the requirement that `static` items must implement `Sync`, `Singleton` implemented both `Sync` and `Send` unconditionally. This allows for a bug where non-`Sync` types such as `Cell` can be used in singletons and cause data races in concurrent programs. The flaw was corrected in commit `b0d2bd20e` by adding trait bounds, requiring the contaiend type to implement `Sync`.
{'CVE-2020-36435'}
2021-08-25T20:58:19Z
2021-08-25T20:58:19Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://github.com/RusPiRo/ruspiro-singleton/issues/10', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36435', 'https://github.com/RusPiRo/ruspiro-singleton/pull/11', 'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e', 'https://github.com/advisories/GHSA-fqq2-xp7m-xvm8', 'https://rustsec.org/advisories/RUSTSEC-2020-0115.html'}
null
GHSA
GHSA-w6rq-6h34-vh7q
Cached redirect poisoning via X-Forwarded-Host header
A user supplied `X-Forwarded-Host` header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the `X-Forwarded-Host` header as a cache key. Users are only vulnerable if they do not configure a custom `PublicAddress` instance. A custom `PublicAddress` can be specified by using [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-). For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of `PublicAddress` which is vulnerable. ### Impact This can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location. ### Patches As of Ratpack 1.9.0, two changes have been made that mitigate this vulnerability: 1. The default PublicAddress implementation no longer infers the address from the request context, instead relying on the configured bind host/port 2. Relative redirects issued by the application are no longer absolutized; they are passed through as-is ### Workarounds In production, ensure that [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-) correctly configures the server. ### References - https://portswigger.net/web-security/web-cache-poisoning
{'CVE-2021-29479'}
2022-04-19T19:02:27Z
2021-07-01T17:02:38Z
HIGH
7
{'CWE-807'}
{'https://portswigger.net/web-security/web-cache-poisoning', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29479', 'https://github.com/advisories/GHSA-w6rq-6h34-vh7q', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-w6rq-6h34-vh7q'}
null
GHSA
GHSA-q6w2-89hq-hq27
Cross-site scripting in keycloak
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20195'}
2021-06-08T23:02:43Z
2021-06-08T23:02:43Z
CRITICAL
9.6
{'CWE-20', 'CWE-79'}
{'https://github.com/advisories/GHSA-q6w2-89hq-hq27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195', 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}
null
GHSA
GHSA-cwcx-rxgc-cmw3
Prototype pollution in 101
Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25943'}
2021-05-25T20:45:17Z
2021-05-17T20:57:40Z
CRITICAL
9.8
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25943', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25943', 'https://github.com/advisories/GHSA-cwcx-rxgc-cmw3', 'https://github.com/tjmehta/101/blob/d87f63ce2a4cbdc476e8287abd78327c3144d646/set.js#L52'}
null
GHSA
GHSA-gjh6-wvhq-h4qx
Cross-site Scripting in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.
{'CVE-2022-25507'}
2022-03-29T21:09:45Z
2022-03-12T00:00:37Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/FreeTAKTeam/UI/issues/28', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25507', 'https://github.com/advisories/GHSA-gjh6-wvhq-h4qx'}
null
GHSA
GHSA-p3jx-g34v-q56j
Malicious Package in j3-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:31:55Z
2020-09-03T22:54:02Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1276', 'https://github.com/advisories/GHSA-p3jx-g34v-q56j'}
null
GHSA
GHSA-9pq7-rcxv-47vq
Incorrect Regular Expression in RestSharp
RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.
{'CVE-2021-27293'}
2021-07-15T20:24:44Z
2021-07-14T19:10:01Z
HIGH
7.5
{'CWE-697', 'CWE-185'}
{'https://github.com/restsharp/RestSharp/issues/1556', 'https://restsharp.dev/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293', 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc', 'https://github.com/advisories/GHSA-9pq7-rcxv-47vq'}
null
GHSA
GHSA-hjf3-r7gw-9rwg
Moderate severity vulnerability that affects feedparser
Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML ENTITY declaration in a non-ASCII encoded document.
{'CVE-2012-2921'}
2021-09-14T17:24:40Z
2018-07-24T20:00:41Z
MODERATE
0
null
{'http://freecode.com/projects/feedparser/releases/344371', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2921', 'https://code.google.com/p/feedparser/source/browse/trunk/NEWS?spec=svn706&r=706', 'http://www.mandriva.com/security/advisories?name=MDVSA-2013:118', 'https://code.google.com/p/feedparser/source/detail?r=703&path=/trunk/feedparser/feedparser.py', 'http://secunia.com/advisories/49256', 'https://github.com/advisories/GHSA-hjf3-r7gw-9rwg', 'https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0157', 'http://osvdb.org/81701', 'http://www.securityfocus.com/bid/53654'}
null
GHSA
GHSA-h6rj-8r3c-9gpj
bson is vulnerable to denial of service due to incorrect regex validation
BSON injection vulnerability in the legal? function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
{'CVE-2015-4412'}
2022-04-25T22:35:30Z
2018-03-05T19:43:21Z
CRITICAL
9.8
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'http://www.securityfocus.com/bid/75045', 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj', 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229750'}
null
GHSA
GHSA-fgfj-rj24-mj7q
Malicious Package in kraken-api
Version 0.1.8 of `kraken-api` contains malicious code as a postinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2020-09-02T21:47:08Z
2020-09-02T21:47:08Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/914', 'https://github.com/advisories/GHSA-fgfj-rj24-mj7q'}
null
GHSA
GHSA-8xfw-5q82-3652
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.1 users should update to spree_auth_devise 4.1.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
null
2022-04-19T19:03:15Z
2021-11-18T20:15:23Z
CRITICAL
9.3
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-8xfw-5q82-3652', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2', 'https://github.com/advisories/GHSA-8xfw-5q82-3652'}
null
GHSA
GHSA-h6rp-8v4j-hwph
High severity vulnerability that affects org.apache.camel:camel-core
The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.
{'CVE-2014-0003'}
2021-09-14T15:32:35Z
2018-10-16T23:13:49Z
HIGH
0
null
{'http://secunia.com/advisories/57719', 'http://camel.apache.org/security-advisories.data/CVE-2014-0003.txt.asc', 'http://rhn.redhat.com/errata/RHSA-2014-0245.html', 'http://rhn.redhat.com/errata/RHSA-2014-0254.html', 'http://secunia.com/advisories/57125', 'http://secunia.com/advisories/57716', 'http://rhn.redhat.com/errata/RHSA-2014-0371.html', 'https://github.com/advisories/GHSA-h6rp-8v4j-hwph', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0003', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/bid/65902', 'http://rhn.redhat.com/errata/RHSA-2014-0372.html', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-v3px-6cc8-f8j3
Path traversal in servey
A path traversal vulnerability in servey versions prior to 3.3.2 allows an attacker to read content of any arbitrary file.
{'CVE-2020-8214'}
2021-05-07T15:56:19Z
2021-05-07T15:56:19Z
HIGH
7.5
{'CWE-22'}
{'https://hackerone.com/reports/355501', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8214', 'https://github.com/advisories/GHSA-v3px-6cc8-f8j3'}
null
GHSA
GHSA-6v52-mj5r-7j2m
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
{'CVE-2018-8037'}
2021-09-02T18:25:31Z
2018-10-17T16:33:02Z
MODERATE
5.9
{'CWE-362'}
{'http://mail-archives.us.apache.org/mod_mbox/www-announce/201808.mbox/%3C0c616b4d-4e81-e7f8-b81d-1bb4c575aa33%40apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2868', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/104894', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2018:2867', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090623.GA92700%40minotaur.apache.org%3E', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041376', 'https://lists.apache.org/thread.html/5d15316dfb4adf75d96d394745f8037533fa3bcc1ac8f619bf5c044c@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-6v52-mj5r-7j2m', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8037', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2018/dsa-4281'}
null
GHSA
GHSA-3fc5-9x9m-vqc4
Privilege Escalation in express-cart
Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users. ## Recommendation Update to version 1.1.6 or later.
null
2021-08-04T21:25:59Z
2019-06-03T17:31:32Z
CRITICAL
9.8
null
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json', 'https://www.npmjs.com/advisories/730', 'https://hackerone.com/reports/343626', 'https://snyk.io/vuln/npm:express-cart:20180712', 'https://github.com/advisories/GHSA-3fc5-9x9m-vqc4', 'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'}
null
GHSA
GHSA-mw25-f5r2-hpc6
Insertion of Sensitive Information into Log File in Apache Geode
Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". This issue is fixed by overhauling the log file redaction in Apache Geode versions 1.12.5, 1.13.5, and 1.14.0.
{'CVE-2021-34797'}
2022-01-13T18:33:07Z
2022-01-06T22:23:25Z
HIGH
0
{'CWE-532'}
{'https://lists.apache.org/thread/p4l0g49rzzzpn8yt9q9p0xp52h3zmsmk', 'https://lists.apache.org/thread/nq2w9gjzm1cjx1rh6zw41ty39qw7qpx4', 'https://github.com/advisories/GHSA-mw25-f5r2-hpc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34797'}
null
GHSA
GHSA-mc23-976p-j42x
Low severity vulnerability that affects xterm
A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters, aka "Xterm Remote Code Execution Vulnerability." This affects xterm.js.
{'CVE-2019-0542'}
2021-09-15T18:49:27Z
2019-01-14T16:19:55Z
LOW
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0542', 'https://github.com/advisories/GHSA-mc23-976p-j42x'}
null
GHSA
GHSA-h8hx-2c5r-32cf
Cross-Site Request Forgery (CSRF) in trestle-auth
### Impact A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. ### Patches The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems. ### For more information If you have any questions or comments about this advisory: * Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues) * Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com)
{'CVE-2021-29435'}
2022-04-19T19:02:54Z
2021-04-13T17:01:50Z
HIGH
8.1
{'CWE-352'}
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc', 'https://github.com/advisories/GHSA-h8hx-2c5r-32cf', 'https://rubygems.org/gems/trestle-auth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf'}
null
GHSA
GHSA-487w-pqcm-63hq
Command injection in buns
There is a command injection vulnerability in all versions of package buns. The injection point is located in line 678 in index file lib/index.js in the exported function install(requestedModule).
{'CVE-2020-7794'}
2021-01-25T15:33:52Z
2021-01-13T18:22:13Z
CRITICAL
0
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7794', 'https://github.com/advisories/GHSA-487w-pqcm-63hq', 'https://snyk.io/vuln/SNYK-JS-BUNS-1050389'}
null
GHSA
GHSA-6g6m-m6h5-w9gf
Authorization bypass in express-jwt
### Overview Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration. When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: You are using express-jwt AND You do not have **algorithms** configured in your express-jwt configuration. AND You are using libraries such as jwks-rsa as the **secret**. ### How to fix that? Specify **algorithms** in the express-jwt configuration. The following is an example of a proper configuration ``` const checkJwt = jwt({ secret: jwksRsa.expressJwtSecret({ rateLimit: true, jwksRequestsPerMinute: 5, jwksUri: `https://${DOMAIN}/.well-known/jwks.json` }), // Validate the audience and the issuer. audience: process.env.AUDIENCE, issuer: `https://${DOMAIN}/`, // restrict allowed algorithms algorithms: ['RS256'] }); ``` ### Will this update impact my users? The fix provided in patch will not affect your users if you specified the algorithms allowed. The patch now makes **algorithms** a required configuration. ### Credit IST Group
{'CVE-2020-15084'}
2021-01-07T23:49:23Z
2020-06-30T16:05:24Z
HIGH
7.7
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15084', 'https://github.com/advisories/GHSA-6g6m-m6h5-w9gf', 'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef', 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf'}
null
GHSA
GHSA-g53w-52xc-2j85
Cross-Site Scripting in react
Affected versions of `react` are vulnerable to Cross-Site Scripting (XSS). The package fails to properly sanitize input used to create keys. This may allow attackers to execute arbitrary JavaScript if a key is generated from user input. ## Recommendation If you are using `react` 0.5.x, upgrade to version 0.5.2 or later. If you are using `react` 0.4.x, upgrade to version 0.4.2 or later.
{'CVE-2013-7035'}
2021-10-04T19:11:02Z
2020-09-04T16:52:57Z
MODERATE
6.5
{'CWE-79'}
{'https://reactjs.org/blog/2013/12/18/react-v0.5.2-v0.4.2.html', 'https://snyk.io/vuln/npm:react:20131217', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7035', 'https://github.com/advisories/GHSA-g53w-52xc-2j85', 'https://www.npmjs.com/advisories/1420'}
null
GHSA
GHSA-fv48-hjhp-94c7
Incorrect Authorization in TeamPass
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
{'CVE-2020-12477'}
2021-07-26T21:20:38Z
2021-07-26T21:20:38Z
HIGH
7.5
{'CWE-863'}
{'https://github.com/advisories/GHSA-fv48-hjhp-94c7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12477', 'https://github.com/nilsteampassnet/TeamPass/issues/2761'}
null
GHSA
GHSA-742w-89gc-8m9c
containerd v1.2.x can be coerced into leaking credentials during image pull
## Impact If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been rated by the containerd maintainers as medium, with a CVSS score of 6.1 and a vector string of CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N. ## Patches This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. ## Workarounds If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected. ## Credits The containerd maintainers would like to thank Brad Geesaman, Josh Larsen, Ian Coldwater, Duffie Cooley, and Rory McCune for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/master/SECURITY.md).
{'CVE-2020-15157'}
2022-04-19T19:02:37Z
2022-02-11T23:27:39Z
MODERATE
6.1
{'CWE-522'}
{'https://usn.ubuntu.com/4589-2/', 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15157', 'https://usn.ubuntu.com/4589-1/', 'https://darkbit.io/blog/cve-2020-15157-containerdrip', 'https://github.com/advisories/GHSA-742w-89gc-8m9c', 'https://www.debian.org/security/2021/dsa-4865', 'https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c', 'https://github.com/containerd/containerd/releases/tag/v1.2.14'}
null
GHSA
GHSA-hvv8-336g-rx3m
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
### Impact The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21342](https://x-stream.github.io/CVE-2021-21342.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21342'}
2022-02-10T11:35:18Z
2021-03-22T23:28:01Z
MODERATE
5.3
{'CWE-502', 'CWE-918'}
{'https://github.com/advisories/GHSA-hvv8-336g-rx3m', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21342', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://x-stream.github.io/CVE-2021-21342.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m'}
null
GHSA
GHSA-v47f-vp3p-5j6h
"Cross-site scripting in ThinkAdmin"
"ThinkAdmin version v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML."
{'CVE-2020-29315'}
2021-05-06T18:53:46Z
2021-05-06T18:53:46Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-v47f-vp3p-5j6h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29315', 'https://github.com/zoujingli/ThinkAdmin/issues/255'}
null
GHSA
GHSA-c6fm-rgw4-8q73
Moderate severity vulnerability that affects CoAPthon3
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, example collect CoAP server and client) when they receive crafted CoAP messages.
{'CVE-2018-12679'}
2021-09-08T21:29:59Z
2019-04-08T15:18:57Z
HIGH
7.5
{'CWE-502'}
{'https://github.com/Tanganelli/CoAPthon3/issues/16', 'https://github.com/advisories/GHSA-c6fm-rgw4-8q73', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12679'}
null
GHSA
GHSA-5822-pw57-vv37
XSS vulnerability when listing users on add & modify server pages.
### Impact An XSS vulnerability exists in versions of Pterodactyl Panel before 0.7.19. Affected versions do not properly sanitize account names before rendering them to the dropdown selector in the admin area when creating or modifying a server. ### Patches This XSS has been addressed in 0.7.19 and will be rolled forwards into the 1.0-rc.7 release. ### Workarounds No workaround exists without manual patching. See https://github.com/pterodactyl/panel/pull/2441/files for the files changed. ### For more information If you have any questions or comments about this advisory please reach out on Discord, or by emailing `dane` at `pterodactyl` dot `io`. _Thank you to Sergej for the responsible disclosure of this issue._
null
2022-04-19T19:02:36Z
2020-10-08T20:13:19Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-5822-pw57-vv37', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5822-pw57-vv37'}
null
GHSA
GHSA-gm9x-q798-hmr4
Command Injection in git-tags-remote
All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled. The following proof-of-concept creates a file in `/tmp`: ``` const gitTagsRemote = require('git-tags-remote'); gitTagsRemote.get('https://github.com/sh0ji/git-tags-remote.git; echo "Injection Success" > /tmp/command-injection.test') .then(tags => console.log(tags)); ```
null
2021-09-23T17:26:33Z
2020-07-29T14:53:40Z
HIGH
7.2
{'CWE-78'}
{'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c', 'https://github.com/advisories/GHSA-gm9x-q798-hmr4', 'https://www.npmjs.com/advisories/1517', 'https://github.com/sh0ji/git-tags-remote/issues/58'}
null
GHSA
GHSA-4q79-fch7-g78q
Downloads Resources over HTTP in grunt-webdriver-qunit
Affected versions of `grunt-webdriver-qunit` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-webdriver-qunit`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10606'}
2021-01-08T19:54:31Z
2019-02-18T23:48:11Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/207', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10606', 'https://github.com/advisories/GHSA-4q79-fch7-g78q', 'https://www.npmjs.com/advisories/207'}
null
GHSA
GHSA-pmw4-jgxx-pcq9
File System Bounds Escape
### Impact Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`. ### Background When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function. ![Screen Shot 2020-12-15 at 6 42 52 PM](https://user-images.githubusercontent.com/3375444/102293941-5a75fb80-3f05-11eb-9d71-0c190a8dcc75.png) ### Patches None at the moment. ### Workarounds There are no workarounds for windows servers. Hosting the server on a different OS mitigates the issue. ### References Issues: https://github.com/autovance/ftp-srv/issues/167 https://github.com/autovance/ftp-srv/issues/225 ### For more information If you have any questions or comments about this advisory: Open an issue at https://github.com/autovance/ftp-srv. Please email us directly; security@autovance.com.
{'CVE-2020-26299'}
2022-04-19T19:02:43Z
2021-02-10T18:11:34Z
MODERATE
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26299', 'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/issues/225', 'https://github.com/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/pull/224', 'https://www.npmjs.com/package/ftp-srv', 'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3', 'https://github.com/autovance/ftp-srv/issues/167'}
null
GHSA
GHSA-86g5-2wh3-gc9j
Critical severity vulnerability that affects actionview
# File Content Disclosure in Action View Impact ------ There is a possible file content disclosure vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. The impact is limited to calls to `render` which render file contents without a specified accept format. Impacted code in a controller looks something like this: ``` class UserController < ApplicationController def index render file: "#{Rails.root}/some/file" end end ``` Rendering templates as opposed to files is not impacted by this vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by specifying a format for file rendering, like this: ``` class UserController < ApplicationController def index render file: "#{Rails.root}/some/file", formats: [:html] end end ``` In summary, impacted calls to `render` look like this: ``` render file: "#{Rails.root}/some/file" ``` The vulnerability can be mitigated by changing to this: ``` render file: "#{Rails.root}/some/file", formats: [:html] ``` Other calls to `render` are not impacted. Alternatively, the following monkey patch can be applied in an initializer: ``` $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub
{'CVE-2019-5418'}
2021-06-11T15:18:45Z
2019-03-13T17:26:59Z
HIGH
7.5
{'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2019:1149', 'https://access.redhat.com/errata/RHSA-2019:1147', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5418', 'https://groups.google.com/forum/#!topic/rubyonrails-security/zRNVOUhKHrg', 'https://access.redhat.com/errata/RHSA-2019:0796', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html', 'https://www.exploit-db.com/exploits/46585/', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html', 'http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html', 'https://github.com/advisories/GHSA-86g5-2wh3-gc9j', 'http://www.openwall.com/lists/oss-security/2019/03/22/1', 'https://access.redhat.com/errata/RHSA-2019:1289'}
null
GHSA
GHSA-6xg2-cf6h-x4v8
Malicious Package in buffer-por
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:58:55Z
2020-09-03T21:53:05Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1243', 'https://github.com/advisories/GHSA-6xg2-cf6h-x4v8'}
null
GHSA
GHSA-5fvx-2jj3-6mff
Insufficiently Protected Credentials in Elasticsearch
Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
{'CVE-2021-22132'}
2022-04-22T18:16:03Z
2021-03-18T19:27:27Z
MODERATE
4.8
{'CWE-522'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22132', 'https://security.netapp.com/advisory/ntap-20210219-0004/', 'https://github.com/advisories/GHSA-5fvx-2jj3-6mff'}
null
GHSA
GHSA-8pww-pp5r-rff8
Path Traversal in marscode
This affects all versionsup to and including version 1.0.1-0 of package marscode. There is no path sanitization in the path provided at fs.readFile in index.js.
{'CVE-2020-7681'}
2021-05-07T16:06:03Z
2021-05-07T16:06:03Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-8pww-pp5r-rff8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7681', 'https://snyk.io/vuln/SNYK-JS-MARSCODE-590122'}
null
GHSA
GHSA-936x-wgqv-hhgq
Authenticated path traversal in Umbraco CMS
An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.
{'CVE-2020-5811'}
2021-09-01T19:35:34Z
2021-04-13T15:51:33Z
MODERATE
6.5
{'CWE-22'}
{'https://www.tenable.com/security/research/tra-2020-59', 'http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html', 'https://github.com/advisories/GHSA-936x-wgqv-hhgq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5811'}
null
GHSA
GHSA-j7mj-748x-7p78
DOS attack in Pillow when processing specially crafted image files
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
{'CVE-2019-16865'}
2021-08-18T21:51:24Z
2019-10-22T14:40:42Z
HIGH
7.5
{'CWE-770'}
{'https://access.redhat.com/errata/RHSA-2020:0580', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16865', 'https://usn.ubuntu.com/4272-1/', 'https://www.debian.org/security/2020/dsa-4631', 'https://access.redhat.com/errata/RHSA-2020:0681', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://pillow.readthedocs.io/en/latest/releasenotes/6.2.0.html', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://github.com/advisories/GHSA-j7mj-748x-7p78', 'https://github.com/python-pillow/Pillow/issues/4123', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYDXD7EE4YAEVSTNIFZKNVPRVJX5ZOG3/', 'https://access.redhat.com/errata/RHSA-2020:0566', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMJBUZQGQ2Q7HXYCQVRLU7OXNC7CAWWU/'}
null
GHSA
GHSA-4hm7-73ch-vm59
Malicious Package in buffer-8or
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:58:16Z
2020-09-03T21:49:43Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-4hm7-73ch-vm59', 'https://www.npmjs.com/advisories/1241'}
null
GHSA
GHSA-rfcf-m67m-jcrq
Authentication granted to all firewalls instead of just one
Description ----------- When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on one part of the application is considered authenticated on the whole application. Resolution ---------- We now ensure that the authenticated token is only available for the firewall that generates it. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728) for branch 5.3. Credits ------- I would like to thank Bogdan, gndk, Paweł Warchoł, Warxcell, and Adrien Lamotte for reporting the issue and Wouter J for fixing the issue.
{'CVE-2021-32693'}
2022-04-19T19:03:00Z
2021-06-21T17:03:44Z
HIGH
6.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://github.com/advisories/GHSA-rfcf-m67m-jcrq', 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129', 'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728'}
null
GHSA
GHSA-qv8q-v995-72gr
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-09T17:29:38Z
2020-09-09T17:29:38Z
LOW
0
null
{'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr', 'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/advisories/GHSA-qv8q-v995-72gr'}
null
GHSA
GHSA-hcxx-mp6g-6gr9
Opencast publishes global system account credentials
The issue was mostly mitigated before, drastically reducing the risk. See references below for more information. ### Impact Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials, regardless of the target being part of the Opencast cluster or not. Previous mitigations already prevented clear text authentications for such requests (e.g. HTTP Basic authentication), but with enough malicious intent, even hashed credentials can be broken. ### Patches Opencast 10.6 will now send authentication requests only against servers which are part of the Opencast cluster, preventing external services from getting any form of authentication attempt in the first place. ### Workarounds No workaround available. ### References - [Patch fixing the issue](https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51) - [Original security notice](https://groups.google.com/a/opencast.org/g/security-notices/c/XRZzRiqp-NE) - [Original security mitigation](https://github.com/opencast/opencast/commit/fe8c3d3a60dc5869b468957270dbad5f8c30ead6) ### For more information If you have any questions or comments about this advisory: - Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) - Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2018-16153'}
2022-04-19T19:03:17Z
2021-12-14T21:43:48Z
LOW
0
{'CWE-200', 'CWE-522'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9', 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51', 'https://github.com/advisories/GHSA-hcxx-mp6g-6gr9', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}
null
GHSA
GHSA-gg2g-m5wc-vccq
Rebuild-bot workflow may allow unauthorised repository modifications
### Impact `projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the "main" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the "main" repository. The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made). Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch. ### Patches The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow. ### Workarounds The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue. ### References The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem. [1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests
{'CVE-2021-21423'}
2021-04-16T22:53:31Z
2021-04-06T18:36:40Z
HIGH
9.4
{'CWE-527'}
{'https://github.com/advisories/GHSA-gg2g-m5wc-vccq', 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643', 'https://www.npmjs.com/package/projen', 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423'}
null
GHSA
GHSA-j77r-2fxf-5jrw
Improper path handling in kustomization files allows path traversal
The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can lead to privilege escalation if the controller's service account has elevated permissions. Within the affected versions, users with write access to a Flux source are able to use built-in features to expose sensitive data from the controller’s pod filesystem using a malicious `kustomization.yaml` file. This vulnerability was fixed in kustomize-controller v0.24.0 and included in flux2 v0.29.0 released on 2022-04-20. The changes introduce a new Kustomize file system implementation which ensures that all files being handled are contained within the Kustomization working directory, blocking references to any files that do not meet that requirement. Automated tooling (e.g. conftest) could be employed as a workaround, as part of a user's CI/CD pipeline to ensure that their `kustomization.yaml` files conform with specific policies, blocking access to sensitive path locations.
{'CVE-2022-24877'}
2022-05-05T21:49:52Z
2022-05-04T18:04:07Z
CRITICAL
9.9
{'CWE-22'}
{'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a', 'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/advisories/GHSA-j77r-2fxf-5jrw', 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw'}
null
GHSA
GHSA-mcg9-64cp-xwp7
Server-Side Request Forgery in Hawt Hawtio
Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.
{'CVE-2019-9827'}
2021-08-17T15:47:24Z
2019-07-05T21:08:09Z
CRITICAL
9.8
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9827', 'https://github.com/advisories/GHSA-mcg9-64cp-xwp7', 'https://www.ciphertechs.com/hawtio-advisory/'}
null
GHSA
GHSA-c4w7-xm78-47vh
Prototype Pollution in y18n
### Overview The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. ### POC ``` const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true ``` ### Recommendation Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.
{'CVE-2020-7774'}
2022-04-20T19:14:19Z
2021-03-29T16:05:12Z
HIGH
7.3
{'CWE-20', 'CWE-915'}
{'https://github.com/yargs/y18n/pull/108', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7774', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306', 'https://github.com/yargs/y18n/issues/96', 'https://github.com/advisories/GHSA-c4w7-xm78-47vh', 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-mv55-23xp-3wp8
Access control flaw in Kiali
An incorrect access control flaw was found in the kiali-operator in versions before 1.33.0. This flaw allows an attacker with a basic level of access to the cluster (to deploy a kiali operand) to use this vulnerability and deploy a given image to anywhere in the cluster, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-3495'}
2021-06-15T19:56:21Z
2021-06-08T20:09:36Z
HIGH
8.8
{'CWE-281'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1947361', 'https://github.com/kiali/kiali-operator/pull/278', 'https://kiali.io/news/security-bulletins/kiali-security-003/', 'https://github.com/advisories/GHSA-mv55-23xp-3wp8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3495'}
null
GHSA
GHSA-jff3-mwp3-f8cw
Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup
### Impact _What kind of vulnerability is it? Who is impacted?_ Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `"Products.GenericSetup>=2.1.1"` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Visit the ZMI Security tab at `portal_setup/manage_access` and click on the link _Access contents information_. On the next page, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. Return to the ZMI Security tab at `portal_setup/manage_access` and scroll down to the link _View_. Click on _View_, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. ### References _Are there any links users can visit to find out more?_ - [GHSA-jff3-mwp3-f8cw](https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw) - [Products.GenericSetup on PyPI](https://pypi.org/project/Products.GenericSetup/) - [Definition of information disclosure at MITRE](https://cwe.mitre.org/data/definitions/200.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Products.GenericSetup issue tracker](https://github.com/zopefoundation/Products.GenericSetup/issues) * Email us at [security@plone.org](mailto:security@plone.org)
{'CVE-2021-21360'}
2022-04-19T19:02:49Z
2021-03-09T00:38:31Z
LOW
0
{'CWE-200'}
{'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57', 'http://www.openwall.com/lists/oss-security/2021/05/21/1', 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw', 'https://pypi.org/project/Products.GenericSetup/', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-jff3-mwp3-f8cw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360'}
null
GHSA
GHSA-8wgc-jjvv-cv6v
Improper Authorization in loopback
Vulnerable versions of `loopback` may allow attackers to create Authentication Tokens on behalf of other users due to Improper Authorization. If the AccessToken model is publicly exposed, an attacker can create Authorization Tokens for any user as long as they know the target's `userId`. This will allow the attacker to access the user's data and their privileges. ## Recommendation For loopback 2.x, upgrade to version 2.40.0 or later For loopback 3.x, upgrade to version 3.22.0 or later
null
2021-09-27T15:44:09Z
2020-09-02T15:54:52Z
HIGH
0
{'CWE-285'}
{'https://loopback.io/doc/en/lb3/Security-advisory-08-08-2018.html]', 'https://github.com/strongloop/loopback', 'https://www.npmjs.com/advisories/771', 'https://github.com/advisories/GHSA-8wgc-jjvv-cv6v', 'https://loopback.io/doc/en/lb2/Security-advisory-08-08-2018.html]'}
null
GHSA
GHSA-2r6q-6c8c-g762
Data races in toolshed
An issue was discovered in the toolshed crate through 2020-11-15 for Rust. In CopyCell<T>, the Send trait lacks bounds on the contained type.
{'CVE-2020-36456'}
2021-08-25T20:58:03Z
2021-08-25T20:58:03Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://github.com/ratel-rust/toolshed/issues/12', 'https://github.com/advisories/GHSA-2r6q-6c8c-g762', 'https://rustsec.org/advisories/RUSTSEC-2020-0136.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36456'}
null
GHSA
GHSA-79qm-h35f-hr77
OS Command Injection in compile-sass
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function &quot;setupCleanupOnExit(cssPath)&quot; within &quot;dist/index.js&quot; is executed as part of the &quot;rm&quot; command without any sanitization.
{'CVE-2019-10799'}
2022-01-04T19:50:38Z
2021-04-13T15:23:13Z
HIGH
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-RPI-548942', 'https://github.com/advisories/GHSA-79qm-h35f-hr77', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799', 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2', 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804'}
null
GHSA
GHSA-588m-9qg5-35pq
Reverse Tabnabbing in quill
Versions of `quill` prior to 1.3.7 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T22:07:00Z
2020-09-03T17:19:09Z
MODERATE
6.5
{'CWE-1022'}
{'https://github.com/quilljs/quill/pull/2674', 'https://github.com/quilljs/quill/issues/2438', 'https://github.com/advisories/GHSA-588m-9qg5-35pq', 'https://www.npmjs.com/advisories/1039'}
null
GHSA
GHSA-r64m-qchj-hrjp
Webcache Poisoning in shopware/platform and shopware/core
### Impact Webcache Poisoning via X-Forwarded-Prefix and sub-request ### Patches We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
null
2021-11-24T20:05:19Z
2021-11-24T20:05:19Z
CRITICAL
0
{'CWE-444'}
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/advisories/GHSA-r64m-qchj-hrjp', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp'}
null
GHSA
GHSA-43gj-mj2w-wh46
Cross-Site Scripting in TYPO3 CMS Form Engine
In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML `placeholder` attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-002
{'CVE-2020-11064'}
2022-04-19T19:02:30Z
2020-05-13T23:17:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-43gj-mj2w-wh46', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-43gj-mj2w-wh46', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11064'}
null
GHSA
GHSA-h232-fpqx-mqgr
Malicious Package in log-symboles
Version 2.1.0 of `log-symboles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-29T20:45:12Z
2020-09-03T21:03:15Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1195', 'https://github.com/advisories/GHSA-h232-fpqx-mqgr'}
null
GHSA
GHSA-fxp8-7h5w-h235
XSS in search engine
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
{'CVE-2019-13234'}
2021-08-18T22:27:15Z
2019-11-12T22:58:11Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-fxp8-7h5w-h235', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'}
null
GHSA
GHSA-crp2-qrr5-8pq7
containerd CRI plugin: Insecure handling of image volumes
### Impact A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd’s CRI implementation. ### Patches This bug has been fixed in containerd 1.6.1, 1.5.10 and 1.4.13. Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images are used. ### Credits The containerd project would like to thank Felix Wilhelm of Google Project Zero for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md). ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io)
{'CVE-2022-23648'}
2022-03-29T19:11:09Z
2022-03-02T21:33:17Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/containerd/containerd/releases/tag/v1.5.10', 'http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFTS2EF3S7HNYSNZSEJZIJHPRU7OPUV3/', 'https://github.com/containerd/containerd/releases/tag/v1.4.13', 'https://www.debian.org/security/2022/dsa-5091', 'https://github.com/containerd/containerd/releases/tag/v1.6.1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCCARJ6FU4MWBTXHZNMS7NELPDBIX2VO/', 'https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'https://github.com/advisories/GHSA-crp2-qrr5-8pq7', 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23648'}
null
GHSA
GHSA-8r8j-xvfj-36f9
Code injection in ymlref
ymlref allows code injection.
{'CVE-2018-20133'}
2022-03-24T22:06:30Z
2018-12-19T19:25:14Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/dexter2206/ymlref/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20133', 'https://github.com/advisories/GHSA-8r8j-xvfj-36f9'}
null
GHSA
GHSA-m57p-p67h-mq74
Command Injection Vulnerability in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency() ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
{'CVE-2020-26274'}
2020-12-17T01:41:17Z
2020-12-16T19:25:00Z
MODERATE
6.4
{'CWE-78'}
{'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99', 'https://github.com/advisories/GHSA-m57p-p67h-mq74', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-m57p-p67h-mq74', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26274', 'https://www.npmjs.com/advisories/1590'}
null
GHSA
GHSA-6fcr-9h9g-23fq
Denial of Service in ipfs-bitswap
Versions of `ipfs-bitswap` prior to 0.24.1 are vulnerable to Denial of Service (DoS). The package put unwanted blocks in the blockstore, which could be used to exhaust system resources in specific conditions. ## Recommendation Upgrade to version 0.24.1 or later.
null
2021-09-27T22:31:00Z
2020-09-02T21:50:51Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/advisories/GHSA-6fcr-9h9g-23fq', 'https://www.npmjs.com/advisories/916', 'https://github.com/ipfs/js-ipfs-bitswap/pull/194', 'https://snyk.io/vuln/SNYK-JS-IPFSBITSWAP-174847'}
null
GHSA
GHSA-w4x9-4f5x-8jj8
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and org.apache.hive:hive-service
Apache Hive before 0.13.1, when in SQL standards based authorization mode, does not properly check the file permissions for (1) import and (2) export statements, which allows remote authenticated users to obtain sensitive information via a crafted URI.
{'CVE-2014-0228'}
2021-09-21T16:19:48Z
2018-11-21T22:23:29Z
LOW
0
{'CWE-284'}
{'http://mail-archives.apache.org/mod_mbox/hive-user/201406.mbox/%3CCABgNGzeN7E+9d=YV5yvnKA7wmSx1op_avtUjPcPtDaR6DLJM6g@mail.gmail.com%3E', 'http://packetstormsecurity.com/files/127091/Apache-Hive-0.13.0-Authorization-Failure.html', 'https://github.com/advisories/GHSA-w4x9-4f5x-8jj8', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0228', 'http://www.securityfocus.com/archive/1/532418/100/0/threaded'}
null
GHSA
GHSA-j4mr-9xw3-c9jx
Out-of-bounds Read in base64-url
Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input. ## Recommendation Update to version 2.0.0 or later.
null
2021-08-04T20:24:59Z
2019-05-31T23:47:01Z
HIGH
0
{'CWE-125'}
{'https://www.npmjs.com/advisories/660', 'https://hackerone.com/reports/321692', 'https://nodesecurity.io/advisories/660', 'https://github.com/advisories/GHSA-j4mr-9xw3-c9jx'}
null
GHSA
GHSA-rp65-9cf3-cjxr
Inefficient Regular Expression Complexity in nth-check
nth-check is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3803'}
2021-09-20T20:47:31Z
2021-09-20T20:47:31Z
MODERATE
7.5
{'CWE-1333'}
{'https://github.com/advisories/GHSA-rp65-9cf3-cjxr', 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0', 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3803'}
null
GHSA
GHSA-c4rh-4376-gff4
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.
{'CVE-2021-40830'}
2021-12-03T15:22:05Z
2021-11-24T21:12:04Z
MODERATE
6.3
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/advisories/GHSA-c4rh-4376-gff4', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'}
null
GHSA
GHSA-j28r-j54m-gpc4
Code Injection in SLO Generator
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
{'CVE-2021-22557'}
2021-10-18T18:40:16Z
2021-10-05T17:53:59Z
MODERATE
5.3
{'CWE-94'}
{'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html', 'https://github.com/google/slo-generator/pull/173', 'https://github.com/advisories/GHSA-j28r-j54m-gpc4', 'https://github.com/google/slo-generator/releases/tag/v2.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22557'}
null
GHSA
GHSA-w542-cpp9-r3g7
CSRF in Field Test
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2. ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user. All users running an affected release should upgrade immediately. ## Technical Details Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.
{'CVE-2020-16252'}
2022-04-19T19:03:24Z
2020-08-05T14:53:34Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://github.com/ankane/field_test/issues/28', 'https://rubygems.org/gems/field_test', 'https://github.com/advisories/GHSA-w542-cpp9-r3g7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252', 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}
null
GHSA
GHSA-5mcr-gq6c-3hq2
Local Information Disclosure Vulnerability in Netty on Unix-Like systems
### Impact When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1) ### Vulnerability Details On unix-like systems, the temporary directory is shared between all user. As such, writing to this directory using APIs that do not explicitly set the file/directory permissions can lead to information disclosure. Of note, this does not impact modern MacOS Operating Systems. The method `File.createTempFile` on unix-like systems creates a random file, but, by default will create this file with the permissions `-rw-r--r--`. Thus, if sensitive information is written to this file, other local users can read this information. This is the case in netty's `AbstractDiskHttpData` is vulnerable. https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L80-L101 `AbstractDiskHttpData` is used as a part of the `DefaultHttpDataFactory` class which is used by `HttpPostRequestDecoder` / `HttpPostMultiPartRequestDecoder`. You may be affected by this vulnerability your project contains the following code patterns: ```java channelPipeline.addLast(new HttpPostRequestDecoder(...)); ``` ```java channelPipeline.addLast(new HttpPostMultiPartRequestDecoder(...)); ``` ### Patches This has been patched in version `4.1.59.Final`. ### Workarounds Specify your own `java.io.tmpdir` when you start the JVM or use `DefaultHttpDataFactory.setBaseDir(...)` to set the directory to something that is only readable by the current user. ### References - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### Similar Vulnerabilities Similar, but not the same. - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 ### For more information If you have any questions or comments about this advisory: * Open an issue in [netty](https://github.com/netty/netty) * Email us [here](mailto:netty-security@googlegroups.com) ### Original Report > Hi Netty Security Team, > > I've been working on some security research leveraging custom CodeQL queries to detect local information disclosure vulnerabilities in java applications. This was the result from running this query against the netty project: > https://lgtm.com/query/7723301787255288599/ > > Netty contains three local information disclosure vulnerabilities, so far as I can tell. > > One is here, where the private key for the certificate is written to a temporary file. > > https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L316-L346 > > One is here, where the certificate is written to a temporary file. > > https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/handler/src/main/java/io/netty/handler/ssl/util/SelfSignedCertificate.java#L348-L371 > > The final one is here, where the 'AbstractDiskHttpData' creates a temporary file if the getBaseDirectory() method returns null. I believe that 'AbstractDiskHttpData' is used as a part of the file upload support? If this is the case, any files uploaded would be similarly vulnerable. > > https://github.com/netty/netty/blob/e5951d46fc89db507ba7d2968d2ede26378f0b04/codec-http/src/main/java/io/netty/handler/codec/http/multipart/AbstractDiskHttpData.java#L91 > > All of these vulnerabilities exist because `File.createTempFile(String, String)` will create a temporary file in the system temporary directory if the 'java.io.tmpdir' system property is not explicitly set. It is my understanding that when java creates a file, by default, and using this method, the permissions on that file utilize the umask. In a majority of cases, this means that the file that java creates has the permissions: `-rw-r--r--`, thus, any other local user on that system can read the contents of that file. > > Impacted OS: > - Any OS where the system temporary directory is shared between multiple users. This is not the case for MacOS or Windows. > > Mitigation. > > Moving to the `Files` API instead will fix this vulnerability. > https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile-java.nio.file.Path-java.lang.String-java.lang.String-java.nio.file.attribute.FileAttribute...- > > This API will explicitly set the posix file permissions to something safe, by default. > > I recently disclosed a similar vulnerability in JUnit 4: > https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp > > If you're also curious, this vulnerability in Jetty was also mine, also involving temporary directories, but is not the same vulnerability as in this case. > https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 > > I would appreciate it if we could perform disclosure of this vulnerability leveraging the GitHub security advisories feature here. GitHub has a nice credit system that I appreciate, plus the disclosures, as you can see from the sampling above, end up looking very nice. > https://github.com/netty/netty/security/advisories > > This vulnerability disclosure follows Google's [90-day vulnerability disclosure policy](https://www.google.com/about/appsecurity/) (I'm not an employee of Google, I just like their policy). Full disclosure will occur either at the end of the 90-day deadline or whenever a patch is made widely available, whichever occurs first. > > Cheers, > Jonathan Leitschuh
{'CVE-2021-21290'}
2022-04-22T18:18:15Z
2021-02-08T21:17:48Z
MODERATE
6.2
{'CWE-379', 'CWE-668', 'CWE-378'}
{'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r326ec431f06eab7cb7113a7a338e59731b8d556d05258457f12bac1b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0857b613604c696bf9743f0af047360baaded48b1c75cf6945a083c5@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r10308b625e49d4e9491d7e079606ca0df2f0a4d828f1ad1da64ba47b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5c701840aa2845191721e39821445e1e8c59711e71942b7796a6ec29@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21290', 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20220210-0011/', 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r5bf303d7c04da78f276765da08559fdc62420f1df539b277ca31f63b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc488f80094872ad925f0c73d283d4c00d32def81977438e27a3dc2bb@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdba4f78ac55f803893a1a2265181595e79e3aa027e2e651dfba98c18@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra503756ced78fdc2136bd33e87cb7553028645b261b1f5c6186a121e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r71dbb66747ff537640bb91eb0b2b24edef21ac07728097016f58b01f@%3Ccommits.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00016.html', 'https://www.debian.org/security/2021/dsa-4885', 'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.apache.org/thread.html/r5e4a540089760c8ecc2c411309d74264f1dad634ad93ad583ca16214@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r743149dcc8db1de473e6bff0b3ddf10140a7357bc2add75f7d1fbb12@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2748097ea4b774292539cf3de6e3b267fc7a88d6c8ec40f4e2e87bd4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2fda4dab73097051977f2ab818f75e04fbcb15bb1003c8530eac1059@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-4vf4-qmvg-mh7h
Cookie prefix spoofing in CGI
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
{'CVE-2021-41819'}
2022-02-14T22:21:20Z
2022-01-21T23:22:17Z
HIGH
7.5
{'CWE-565'}
{'https://security.netapp.com/advisory/ntap-20220121-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41819', 'https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/', 'https://github.com/advisories/GHSA-4vf4-qmvg-mh7h', 'https://hackerone.com/reports/910552'}
null
GHSA
GHSA-ccgm-3xw4-h5p8
Improper Restriction of XML External Entity Reference in pikepdf
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.
{'CVE-2021-29421'}
2021-09-29T18:44:06Z
2021-04-20T16:30:03Z
HIGH
7.5
{'CWE-611'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QFLBBYGEDNXJ7FS6PIWTVI4T4BUPGEQ/', 'https://github.com/advisories/GHSA-ccgm-3xw4-h5p8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36P4HTLBJPO524WMQWW57N3QRF4RFSJG/', 'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421'}
null
GHSA
GHSA-95hx-62rh-gg96
Potential XSS injection In PrestaShop contactform
### Impact An attacker is able to inject javascript while using the contact form. ### Patches The problem is fixed in v4.3.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-15178'}
2021-01-07T22:56:43Z
2020-09-15T17:34:17Z
HIGH
8
{'CWE-79'}
{'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178', 'https://packagist.org/packages/prestashop/contactform', 'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96', 'https://github.com/advisories/GHSA-95hx-62rh-gg96'}
null
GHSA
GHSA-v2wx-jj66-2hp7
Cross-site Scripting in Wildfly
A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.
{'CVE-2021-3536'}
2021-05-25T18:45:05Z
2021-05-25T18:45:05Z
LOW
3.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-v2wx-jj66-2hp7', 'https://bugzilla.redhat.com/show_bug.cgi?id=1948001', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3536'}
null
GHSA
GHSA-vv6j-ww6x-54gx
Use after free in Animation
CVE-2022-0609: Use after free in Animation - https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0609 Google is aware of reports that exploits for CVE-2022-0609 exist in the wild. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are unknown but an exploit is available. There is currently little other public information on the issue other than it has been flagged as `High` severity.
{'CVE-2022-0609'}
2022-04-12T15:14:37Z
2022-02-22T21:51:19Z
HIGH
8.8
{'CWE-416'}
{'https://github.com/advisories/GHSA-vv6j-ww6x-54gx', 'https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html', 'https://crbug.com/1296150', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0609', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx'}
null
GHSA
GHSA-4rhm-m2fp-hx7q
Potential CSV Injection vector in OctoberCMS
### Impact Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed: 1. Have found a vulnerability in the victim's spreadsheet software of choice. 2. Control data that would potentially be exported through the `ImportExportController` by a theoretical victim. 3. Convince the victim to export above data as a CSV and run it in vulnerable spreadsheet software while also bypassing any sanity checks by said software. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a & https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484 to your installation manually if unable to upgrade to Build 466. ### References Reported by @chrisvidal initially & [Sivanesh Ashok](https://stazot.com/) later. ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: Given the number of hoops that a potential attacker would have to jump through, this vulnerability really boils down to the possibility of abusing the trust that a user may have in the export functionality of the project. Thus, this has been rated low severity as it requires vulnerabilities to also exist in other software used by any potential victims as well as successful social engineering attacks.
{'CVE-2020-5299'}
2022-04-19T19:02:26Z
2020-06-03T21:58:35Z
MODERATE
4
{'CWE-77'}
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'https://github.com/advisories/GHSA-4rhm-m2fp-hx7q', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://github.com/octobercms/october/security/advisories/GHSA-4rhm-m2fp-hx7q'}
null
GHSA
GHSA-2j6v-xpf3-xvrv
Use of Externally-Controlled Format String in wire-avs
### Impact A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code. ### Patches * The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x) ### Workarounds * No workaround known ### References * Fixed in commit https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe ### For more information If you have any questions or comments about this advisory feel free to email us at [vulnerability-report@wire.com](mailto:vulnerability-report@wire.com)
{'CVE-2021-41193'}
2022-03-10T15:59:42Z
2022-03-01T18:58:23Z
HIGH
9.8
{'CWE-134'}
{'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv', 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41193', 'https://github.com/advisories/GHSA-2j6v-xpf3-xvrv'}
null
GHSA
GHSA-h5h8-pc6h-jvvx
Missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial in composer
URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow commands to be executed in the HgDriver if hg/Mercurial is installed on the system. ### Impact - The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. - The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote command injection. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. - Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately ### Patches 1.10.22 and 2.0.13 include patches for this issue.
{'CVE-2021-29472'}
2022-04-19T19:02:55Z
2021-04-29T21:52:04Z
HIGH
8.8
{'CWE-88', 'CWE-94'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29472', 'https://www.debian.org/security/2021/dsa-4907', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html', 'https://getcomposer.org/', 'https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx', 'https://github.com/advisories/GHSA-h5h8-pc6h-jvvx'}
null
GHSA
GHSA-q3gh-5r98-j4h3
RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign
### Impact Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature. - If you are not use RSA-PSS signature validation, this vulnerability is not affected. - Risk to accept a forged or crafted message to be signed is low. - Risk to raise memory corruption is low since jsrsasign uses BigInteger class. ### Patches Users using RSA-PSS signature validation should upgrade to 8.0.17. ### Workarounds Reject RSA-PSS signatures with unnecessary prepending zeros. ### References https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3 [https://github.com/kjur/jsrsasign/issues/438](https://github.com/kjur/jsrsasign/issues/438) https://nvd.nist.gov/vuln/detail/CVE-2020-14968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968 https://vuldb.com/?id.157125 https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS
{'CVE-2020-14968'}
2021-10-06T21:44:42Z
2020-06-26T16:26:50Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14968', 'https://kjur.github.io/jsrsasign/api/symbols/RSAKey.html#.verifyWithMessageHashPSS', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.18', 'https://github.com/advisories/GHSA-q3gh-5r98-j4h3', 'https://github.com/kjur/jsrsasign/issues/438', 'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968', 'https://www.npmjs.com/advisories/1541', 'https://vuldb.com/?id.157125', 'https://www.npmjs.com/package/jsrsasign'}
null
GHSA
GHSA-wp4h-pvgw-5727
Improperly Controlled Modification of Dynamically-Determined Object Attributes in Apache Struts
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
{'CVE-2019-0230'}
2021-12-02T14:50:51Z
2021-12-02T14:50:51Z
CRITICAL
9.8
{'CWE-915'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html', 'https://cwiki.apache.org/confluence/display/ww/s2-059', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0230', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-wp4h-pvgw-5727', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://launchpad.support.sap.com/#/notes/2982840'}
null
GHSA
GHSA-53qw-q765-4fww
Denial-of-service in Django
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.
{'CVE-2021-45115'}
2022-02-14T22:16:19Z
2022-01-12T19:20:53Z
HIGH
7.5
{'CWE-400'}
{'https://www.djangoproject.com/weblog/2022/jan/04/security-releases/', 'https://security.netapp.com/advisory/ntap-20220121-0005/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://github.com/advisories/GHSA-53qw-q765-4fww', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45115', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-42qm-c3cf-9wv2
Code injection in dolibarr/dolibarr
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s parameter
{'CVE-2022-0819'}
2022-03-10T15:55:04Z
2022-03-03T00:00:49Z
HIGH
8.8
{'CWE-94'}
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://github.com/advisories/GHSA-42qm-c3cf-9wv2'}
null
GHSA
GHSA-v768-w7m9-2vmm
Reference binding to nullptr in shape inference
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`: ```python import tensorflow as tf tf.compat.v1.disable_v2_behavior() tf.raw_ops.SparseFillEmptyRows( indices = tf.constant([], shape=[0, 0], dtype=tf.int64), values = tf.constant([], shape=[0], dtype=tf.int64), dense_shape = tf.constant([], shape=[0], dtype=tf.int64), default_value = 0) ``` The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/sparse_ops.cc#L608-L634) does not validate that the input arguments are not empty tensors. ### Patches We have patched the issue in GitHub commit [578e634b4f1c1c684d4b4294f9e5281b2133b3ed](https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security
{'CVE-2021-37676'}
2021-08-25T14:41:26Z
2021-08-25T14:41:26Z
HIGH
7.8
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed', 'https://github.com/advisories/GHSA-v768-w7m9-2vmm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37676', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm'}
null
GHSA
GHSA-j66h-cc96-c32q
Cross-site Scripting in SilverStripe Framework
SilverStripe Framework through 4.8.1 allows XSS.
{'CVE-2021-36150'}
2021-12-22T20:59:33Z
2021-10-12T18:42:30Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/silverstripe/silverstripe-framework/releases', 'https://www.silverstripe.org/download/security-releases/CVE-2021-36150', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36150', 'https://github.com/advisories/GHSA-j66h-cc96-c32q'}
null
GHSA
GHSA-5qgp-p5jc-w2rm
Arbitrary Code Execution in Docker
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
{'CVE-2014-6407'}
2022-02-15T00:41:12Z
2022-02-15T00:41:12Z
HIGH
7.3
{'CWE-59'}
{'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407', 'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e', 'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://www.openwall.com/lists/oss-security/2014/11/24/5', 'https://docs.docker.com/v1.3/release-notes/', 'https://secunia.com/advisories/60171', 'https://secunia.com/advisories/60241', 'https://github.com/advisories/GHSA-5qgp-p5jc-w2rm', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6407', 'https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html'}
null
GHSA
GHSA-5mh9-r3rr-9597
Code execution vulnerability in HtmlUnit
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
{'CVE-2020-5529'}
2021-08-25T21:12:10Z
2020-05-21T21:08:33Z
HIGH
8.1
{'CWE-665'}
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00023.html', 'https://jvn.jp/en/jp/JVN34535327/', 'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367', 'https://github.com/HtmlUnit/htmlunit/releases/tag/2.37.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529', 'https://usn.ubuntu.com/4584-1/', 'https://github.com/advisories/GHSA-5mh9-r3rr-9597', 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46aa63ad10f237ee363e26e8563@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-83r8-p8v6-6gfm
Slock<T> allows sending non-Send types across thread boundaries
`Slock<T>` unconditionally implements `Send`/`Sync`. Affected versions of this crate allows sending non-Send types to other threads, which can lead to data races and memory corruption due to the data race.
null
2021-08-25T21:00:20Z
2021-08-25T21:00:20Z
MODERATE
0
{'CWE-362'}
{'https://github.com/BrokenLamp/slock-rs/issues/2', 'https://github.com/advisories/GHSA-83r8-p8v6-6gfm', 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'}
null
GHSA
GHSA-gq77-3r6x-383w
Cross-site Scripting in ShowDoc
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0880'}
2022-03-23T15:37:14Z
2022-03-13T00:00:54Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf', 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c', 'https://github.com/advisories/GHSA-gq77-3r6x-383w'}
null
GHSA
GHSA-59x8-7wx6-4hj9
Malicious Package in secure_identity_login_module
All versions of `secure_identity_login_module` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:01:36Z
2020-09-03T17:47:52Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-59x8-7wx6-4hj9', 'https://www.npmjs.com/advisories/1063'}
null
GHSA
GHSA-rvmq-4x66-q7j3
Remote code execution in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
{'CVE-2020-11978'}
2021-09-22T21:16:27Z
2020-07-27T16:57:33Z
HIGH
8.8
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11978', 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-rvmq-4x66-q7j3'}
null
GHSA
GHSA-f7f4-hqp2-7prc
Improper Input Validation in sails-hook-sockets
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
{'CVE-2018-21036'}
2021-09-22T21:11:20Z
2020-07-24T20:10:21Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e', 'http://www.openwall.com/lists/oss-security/2020/07/19/1', 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md', 'https://github.com/advisories/GHSA-f7f4-hqp2-7prc'}
null