ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-m9mq-p2f9-cfqv
|
Critical severity vulnerability that affects bleach
|
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
|
{'CVE-2018-7753'}
|
2022-03-04T19:40:00Z
|
2019-01-04T17:46:30Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef', 'https://github.com/mozilla/bleach/releases/tag/v2.1.3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753', 'https://bugs.debian.org/892252', 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv'}
| null |
GHSA
|
GHSA-2q66-6cc3-6xm8
|
CSRF issue on preview pages in Bolt CMS
|
### Impact
Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview.
### Patches
This has been fixed in Bolt 3.7.1
### References
Related issue: https://github.com/bolt/bolt/pull/7853
|
{'CVE-2020-4040'}
|
2022-04-19T19:02:27Z
|
2020-06-09T00:25:41Z
|
HIGH
| 8.6
|
{'CWE-352'}
|
{'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/advisories/GHSA-2q66-6cc3-6xm8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'http://seclists.org/fulldisclosure/2020/Jul/4', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
| null |
GHSA
|
GHSA-9q9m-m2f6-jr5q
|
Malicious Package in chak
|
All versions of `chak` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:03:18Z
|
2020-09-02T20:22:34Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/854', 'https://github.com/advisories/GHSA-9q9m-m2f6-jr5q'}
| null |
GHSA
|
GHSA-5q5w-mqp6-g2gh
|
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
|
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
|
{'CVE-2022-0472'}
|
2022-02-11T20:51:15Z
|
2022-02-06T00:01:07Z
|
MODERATE
| 5.4
|
{'CWE-434', 'CWE-79'}
|
{'https://github.com/advisories/GHSA-5q5w-mqp6-g2gh', 'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
| null |
GHSA
|
GHSA-fj7f-vq84-fh43
|
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.
|
In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false.
To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the
commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables.
Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.
### Exploitation
To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL
will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.
### Impact
This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags).
This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on.
### Patches
Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue.
### Workarounds
Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.
### References
https://cwe.mitre.org/data/definitions/88.html
|
{'CVE-2021-43809'}
|
2022-04-19T19:03:17Z
|
2021-12-08T19:51:36Z
|
MODERATE
| 6.7
|
{'CWE-88'}
|
{'https://github.com/rubygems/rubygems/pull/5142', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}
| null |
GHSA
|
GHSA-25jw-gcfj-283j
|
Directory Traversal in 360class.jansenhm
|
Affected versions of `360class.jansenhm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16186'}
|
2021-01-14T15:40:39Z
|
2020-09-01T18:27:04Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16186', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm', 'https://nodesecurity.io/advisories/448', 'https://github.com/advisories/GHSA-25jw-gcfj-283j', 'https://www.npmjs.com/advisories/448'}
| null |
GHSA
|
GHSA-hhrj-wp42-32v3
|
Generation of Error Message Containing Sensitive Information in microweber
|
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0660'}
|
2022-02-28T22:18:01Z
|
2022-02-19T00:01:36Z
|
HIGH
| 7.5
|
{'CWE-209'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a', 'https://github.com/advisories/GHSA-hhrj-wp42-32v3', 'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291'}
| null |
GHSA
|
GHSA-g2fg-mr77-6vrm
|
Uncontrolled Resource Consumption in Apache Thrift
|
In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.
|
{'CVE-2020-13949'}
|
2022-02-08T21:37:22Z
|
2021-03-12T21:33:55Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://lists.apache.org/thread.html/rcace846f74ea9e2af2f7c30cef0796724aa74089f109c8029b850163@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rbfbb81e7fb5d5009caf25798f02f42a7bd064a316097303ba2f9ed76@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc7a241e0af086b226ff9ccabc4a243d206f0f887037994bfd8fcaaeb@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r20f6f8f8cf07986dc5304baed3bf4d8a1c4cf135ff6fe3640be4d7ec@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r90b4473950e26607ed77f3d70f120166f6a36a3f80888e4eeabcaf91@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4d90b6d8de9697beb38814596d3a0d4994fa9aba1f6731a2c648d3ae@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r27b7d3d95ffa8498899ef1c9de553d469f8fe857640a3f6e58dba640@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r869331422580d35b4e65bd74cf3090298c4651bf4f31bfb19ae769da@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r533a172534ae67f6f17c4d33a1b814d3d5ada9ccd4eb442249f33fa2@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r1084a911dff90b2733b442ee0f5929d19b168035d447f2d25f534fe4@%3Cissues.solr.apache.org%3E', 'https://github.com/apache/hbase/pull/2958', 'https://lists.apache.org/thread.html/r93f23f74315e009f4fb68ef7fc794dceee42cf87fe6613814dcd8c70@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r8897a41f50d4eb19b268bde99328e943ba586f77779efa6de720c39f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6ae3c68b0bfe430fb32f24236475276b6302bed625b23f53b68748b5@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r143ca388b0c83fe659db14be76889d50b453b0ee06f423181f736933@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r2d180180f37c2ab5cebd711d080d01d8452efa8ad43c5d9cd7064621@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r196409cc4df929d540a2e66169104f2b3b258d8bd96b5f083c59ee51@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r950ced188d62320fdb84d9e2c6ba896328194952eff7430c4f55e4b0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r12090c81b67d21a814de6cf54428934a5e5613fde222759bbb05e99b@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r179119bbfb5610499286a84c316f6789c5afbfa5340edec6eb28d027@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r89fdd39965efb7c6d22bc21c286d203252cea476e1782724aca0748e@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rd0734d91f16d5b050f0bcff78b4719300042a34fadf5e52d0edf898e@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcae4c66f67e701db44d742156dee1f3e5e4e07ad7ce10c740a76b669@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r15eed5d21e16a5cce810c1e096ffcffc36cd08c2f78ce2f9b24b4a6a@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r515e01a30443cfa2dbb355c44c63149869afd684fb7b0344c58fa67b@%3Cissues.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13949', 'https://lists.apache.org/thread.html/r812915ecfa541ad2ca65c68a97b2c014dc87141dfaefc4de85049681@%3Ccommits.camel.apache.org%3E', 'https://security.gentoo.org/glsa/202107-32', 'https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6ba4f0817f98bf7c1cb314301cb7a24ba11a0b3e7a5be8b0ae3190b0@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r886b6d9a89b6fa0aafbf0a8f8f14351548d6c6f027886a3646dbd075@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rf75979ae0ffd526f3afa935a8f0ee13c82808ea8b2bc0325eb9dcd90@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3a1291a7ab8ee43db87cb0253371489810877028fc6e7c68dc640926@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/raea1bb8cf2eb39c5e10543f547bdbbdbb563c2ac6377652f161d4e37@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r17cca685ad53bc8300ee7fcfe874cb784a222343f217dd076e7dc1b6@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd49d53b146d94a7d3a135f6b505589655ffec24ea470e345d31351bb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r9ec75f690dd60fec8621ba992290962705d5b7f0d8fd0a42fab0ac9f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb51977d392b01434b0b5df5c19b9ad5b6178cfea59e676c14f24c053@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rd78cdd87d84499a404202f015f55935db3658bd0983ecec81e6b18c6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r72c3d1582d50b2ca7dd1ee97e81c847a5cf3458be26d42653c39d7a6@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r635133a74fa07ef3331cae49a9a088365922266edd58099a6162a5d3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3f3e1d562c528b4bafef2dde51f79dd444a4b68ef24920d68068b6f9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb91c32194eb5006f0b0c8bcdbd512c13495a1b277d4d51d45687f036@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r62aa6d07b23095d980f348d330ed766560f9a9e940fec051f534ce37@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r741364444c3b238ab4a161f67f0d3a8f68acc517a39e6a93aa85d753@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-g2fg-mr77-6vrm', 'https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r13f40151513ff095a44a86556c65597a7e55c00f5e19764a05530266@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra9f7c755790313e1adb95d29794043fb102029e803daf4212ae18063@%3Cissues.solr.apache.org%3E'}
| null |
GHSA
|
GHSA-jp4x-w63m-7wgm
|
Prototype Pollution in hoek
|
Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution.
The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property.
This can be demonstrated like so:
```javascript
var Hoek = require('hoek');
var malicious_payload = '{"__proto__":{"oops":"It works !"}}';
var a = {};
console.log("Before : " + a.oops);
Hoek.merge({}, JSON.parse(malicious_payload));
console.log("After : " + a.oops);
```
This type of attack can be used to overwrite existing properties causing a potential denial of service.
## Recommendation
Update to version 4.2.1, 5.0.3 or later.
|
{'CVE-2018-3728'}
|
2021-01-08T18:33:00Z
|
2018-04-26T15:25:17Z
|
MODERATE
| 0
|
{'CWE-471'}
|
{'https://access.redhat.com/errata/RHSA-2018:1264', 'https://nodesecurity.io/advisories/566', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3728', 'https://www.npmjs.com/advisories/566', 'https://hackerone.com/reports/310439', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://snyk.io/vuln/npm:hoek:20180212', 'http://www.securityfocus.com/bid/103108', 'https://github.com/advisories/GHSA-jp4x-w63m-7wgm', 'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'}
| null |
GHSA
|
GHSA-883x-6fch-6wjx
|
Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares
|
### Impact
This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn allows disabling Ares and having full control over the system.
### Patches
Update to version `1.7.6` or later.
### Workarounds
Forbid student classes in trusted packages like, e.g., described in https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371
### References
_Are there any links users can visit to find out more?_
Not that I know of.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/ls1intum/Ares/issues
* Email us, see https://github.com/ls1intum/Ares/security/policy
### Detailed description
Using generics, it is possible to throw checked exceptions without a `throws` clause:
<details>
<summary>ThrowWithoutThrowsHelper</summary>
```java
public class ThrowWithoutThrowsHelper<X extends Throwable>
{
private final X throwable;
private ThrowWithoutThrowsHelper(X throwable)
{
this.throwable = throwable;
}
private <R> R throwWithThrows() throws X
{
throw throwable;
}
public static <R> R throwWithoutThrows(Throwable throwable)
{
ThrowWithoutThrowsHelper<?> helper = new ThrowWithoutThrowsHelper<Throwable>(throwable);
@SuppressWarnings("unchecked")
ThrowWithoutThrowsHelper<RuntimeException> helperCasted = (ThrowWithoutThrowsHelper<RuntimeException>) helper;
return helperCasted.throwWithThrows();
}
}
```
</details>
Using this, it is possible for a malicious testee to throw an instance of a malicious subclass of `InvocationTargetException` (let's call it `EvilInvocationTargetException`).
This exception is catched by `org.junit.platform.commons.util.ReflectionUtils::invokeMethod`, which looks like this:
<details>
<summary>ReflectionUtils::invokeMethod</summary>
```java
public static Object invokeMethod(Method method, Object target, Object... args) {
Preconditions.notNull(method, "Method must not be null");
Preconditions.condition((target != null || isStatic(method)),
() -> String.format("Cannot invoke non-static method [%s] on a null target.", method.toGenericString()));
try {
return makeAccessible(method).invoke(target, args);
}
catch (Throwable t) {
throw ExceptionUtils.throwAsUncheckedException(getUnderlyingCause(t));
}
}
```
</details>
This method calls `getUnderlyingCause` (of the same class), passing to it the catched, malicious exception as an argument.
<details>
<summary>ReflectionUtils::getUnderlyingCause</summary>
```java
private static Throwable getUnderlyingCause(Throwable t) {
if (t instanceof InvocationTargetException) {
return getUnderlyingCause(((InvocationTargetException) t).getTargetException());
}
return t;
}
```
</details>
`getUnderlyingCause` in turn checks if the passed exception is `instanceof InvocationTargetException`, and if so, calls `getTargetException` on it. `getTargetException` can be overridden by subclasses of `InvocationTargetException`, like the `EvilInvocationTargetException`.
If `EvilInvocationTargetException` is in a whitelisted package (for example `de.tum.in.test.api.security.notsealedsubpackage`), `getTargetException` will be called with the entire stack containing only whitelisted frames.
This allows the attacker to uninstall the `ArtemisSecurityManager` in `EvilInvocationTargetException::getTargetException`:
<details>
<summary>Uninstalling ArtemisSecurityManager</summary>
```java
SecurityManager secman = System.getSecurityManager();
Class<?> aresSecmanClass = secman.getClass();
Field isPartlyDisabledF = aresSecmanClass.getDeclaredField("isPartlyDisabled");
isPartlyDisabledF.setAccessible(true);
isPartlyDisabledF.set(secman, true);
System.setSecurityManager(null);
```
</details>
After uninstalling `ArtemisSecurityManager`, the attacker is free to do anything expressible in Java; including reading and writing any files, opening network connections, and executing arbitrary shell commands.
| null |
2022-04-19T19:03:18Z
|
2022-01-21T23:39:19Z
|
HIGH
| 8.2
| null |
{'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/releases/tag/1.7.6', 'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392', 'https://github.com/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371'}
| null |
GHSA
|
GHSA-6x3j-x9rp-whxp
|
Unrestricted Upload of File with Dangerous Type in showdoc
|
showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type.
|
{'CVE-2022-0409'}
|
2022-03-02T20:59:35Z
|
2022-02-20T00:00:32Z
|
HIGH
| 7.8
|
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436', 'https://github.com/advisories/GHSA-6x3j-x9rp-whxp', 'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7'}
| null |
GHSA
|
GHSA-hwhf-64mh-r662
|
ReDoS vulnerability in parser_apache2
|
### Impact
parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack.
### Patches
v1.14.2
### Workarounds
Either of the following:
* Don't use parser_apache2 for parsing logs which cannot guarantee generated by Apache.
* Put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).
### References
* [CVE-2021-41186](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41186)
* [GHSA-hwhf-64mh-r662](https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662)
* [GHSL-2021-102](https://securitylab.github.com/advisories/GHSL-2021-102-fluent-fluentd/)
* https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142
|
{'CVE-2021-41186'}
|
2021-11-04T17:05:51Z
|
2021-11-01T19:16:31Z
|
MODERATE
| 5.9
|
{'CWE-400'}
|
{'https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41186', 'https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142', 'https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md', 'https://github.com/advisories/GHSA-hwhf-64mh-r662'}
| null |
GHSA
|
GHSA-pfmw-vj74-ph8g
|
Incorrect Permission Assignment for Critical Resource in HashiCorp Vault
|
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
|
{'CVE-2021-43998'}
|
2021-12-02T17:48:31Z
|
2021-12-02T17:48:30Z
|
CRITICAL
| 9.1
|
{'CWE-732'}
|
{'https://github.com/advisories/GHSA-pfmw-vj74-ph8g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43998', 'https://discuss.hashicorp.com/t/hcsec-2021-30-vaults-templated-acl-policies-matched-first-created-alias-per-entity-and-auth-backend/32132'}
| null |
GHSA
|
GHSA-9gr3-7897-pp7m
|
XSS in Image Optimization API for Next.js
|
### Impact
- **Affected:** All of the following must be true to be affected
- Next.js between version 10.0.0 and 11.1.0
- The `next.config.js` file has [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) array assigned
- The image host assigned in [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) allows user-provided SVG
- **Not affected**: The `next.config.js` file has [`images.loader`](https://nextjs.org/docs/basic-features/image-optimization#loader) assigned to something other than default
- **Not affected**: Deployments on [Vercel](https://vercel.com) are not affected
### Patches
[Next.js v11.1.1](https://github.com/vercel/next.js/releases/tag/v11.1.1)
|
{'CVE-2021-39178'}
|
2021-09-01T19:37:34Z
|
2021-09-01T18:24:22Z
|
HIGH
| 7.5
|
{'CWE-79'}
|
{'https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39178', 'https://github.com/advisories/GHSA-9gr3-7897-pp7m', 'https://github.com/vercel/next.js/releases/tag/v11.1.1'}
| null |
GHSA
|
GHSA-72wf-hwcq-65h9
|
Cross-Site Request Forgery in Filebrowser
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim.
|
{'CVE-2021-46398'}
|
2022-02-16T22:05:45Z
|
2022-02-05T00:00:31Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46398', 'http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html', 'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d', 'https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://febinj.medium.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://github.com/advisories/GHSA-72wf-hwcq-65h9', 'https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html', 'https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/'}
| null |
GHSA
|
GHSA-6x85-j5j2-27jx
|
Moderate severity vulnerability that affects actionpack
|
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
|
{'CVE-2014-0130'}
|
2021-09-02T19:11:28Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'http://www.securityfocus.com/bid/67244', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://github.com/advisories/GHSA-6x85-j5j2-27jx', 'http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf'}
| null |
GHSA
|
GHSA-v85c-hgq5-7pfw
|
Arbitrary Command Injection
|
This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23399'}
|
2021-07-02T16:59:32Z
|
2021-06-29T18:26:05Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23399', 'https://github.com/rolangom/wincred/blob/3fd39186ee32add9c12046cdccf2765d19565335/index.ts%23L20', 'https://github.com/advisories/GHSA-v85c-hgq5-7pfw', 'https://snyk.io/vuln/SNYK-JS-WINCRED-1078538'}
| null |
GHSA
|
GHSA-c3hq-7mxh-mqxf
|
Sandbox Breakout / Arbitrary Code Execution in lighter-vm
|
All versions of `lighter-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-04T14:59:51Z
|
2020-09-04T14:59:50Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-c3hq-7mxh-mqxf', 'https://www.npmjs.com/advisories/1317'}
| null |
GHSA
|
GHSA-26q7-g57v-mxcp
|
HTML Injection in shout
|
Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting.
## Recommendation
Update to version 0.50.0 or later.
|
{'CVE-2017-16043'}
|
2021-01-08T20:09:56Z
|
2018-11-07T00:28:11Z
|
MODERATE
| 0
|
{'CWE-80'}
|
{'https://github.com/erming/shout/pull/344', 'https://github.com/advisories/GHSA-26q7-g57v-mxcp', 'https://nodesecurity.io/advisories/322', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043', 'https://www.npmjs.com/advisories/322'}
| null |
GHSA
|
GHSA-hhrp-qm88-xjr3
|
Moderate severity vulnerability that affects valine
|
An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.
|
{'CVE-2018-19289'}
|
2021-09-14T17:21:11Z
|
2018-11-21T22:19:41Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/xCss/Valine/issues/127', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289', 'https://github.com/advisories/GHSA-hhrp-qm88-xjr3'}
| null |
GHSA
|
GHSA-36vc-cw62-fqvr
|
Hijacked Environment Variables in shadowsock
|
The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16078'}
|
2021-01-08T20:03:31Z
|
2018-08-27T19:07:23Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-36vc-cw62-fqvr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078', 'https://nodesecurity.io/advisories/517', 'https://www.npmjs.com/advisories/517'}
| null |
GHSA
|
GHSA-gfr2-qpxh-qj9m
|
Path Traversal in Ansible
|
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
|
{'CVE-2020-1735'}
|
2022-05-05T21:55:28Z
|
2021-04-07T20:35:24Z
|
MODERATE
| 4.6
|
{'CWE-22'}
|
{'https://security.gentoo.org/glsa/202006-11', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/ansible/ansible/issues/67793', 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes-7', 'https://github.com/advisories/GHSA-gfr2-qpxh-qj9m', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}
| null |
GHSA
|
GHSA-gvpx-9459-w3mj
|
Cross-Site Scripting in @ckeditor/ckeditor5-link
|
Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 10.0.1 or later.
|
{'CVE-2018-11093'}
|
2021-09-13T13:35:55Z
|
2018-05-23T20:37:46Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1154', 'https://github.com/ckeditor/ckeditor5-link/blob/master/CHANGELOG.md#1001-2018-05-22', 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/', 'https://github.com/advisories/GHSA-gvpx-9459-w3mj', 'https://snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LINK-72892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093'}
| null |
GHSA
|
GHSA-wpw7-wxjm-cw8r
|
Moderate severity vulnerability that affects actionpack
|
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
|
{'CVE-2013-6417'}
|
2021-09-21T21:52:53Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
| null |
{'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://rhn.redhat.com/errata/RHSA-2014-0469.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417', 'https://puppet.com/security/cve/cve-2013-6417', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ', 'https://github.com/advisories/GHSA-wpw7-wxjm-cw8r', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}
| null |
GHSA
|
GHSA-m929-7fr6-cvjg
|
Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability caused by improper restriction of XML external entity references
|
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
|
{'CVE-2018-1259'}
|
2022-04-27T13:58:01Z
|
2018-10-17T17:23:36Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-m929-7fr6-cvjg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1259', 'https://access.redhat.com/errata/RHSA-2018:1809', 'https://pivotal.io/security/cve-2018-1259', 'https://access.redhat.com/errata/RHSA-2018:3768'}
| null |
GHSA
|
GHSA-ffvq-7w96-97p7
|
Denial of Service in Spring Framework
|
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
|
{'CVE-2018-15756'}
|
2021-10-21T21:26:45Z
|
2020-06-15T19:34:50Z
|
HIGH
| 7.5
| null |
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html', 'https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d@%3Cissues.activemq.apache.org%3E', 'https://pivotal.io/security/cve-2018-15756', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15756', 'https://github.com/advisories/GHSA-ffvq-7w96-97p7', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.securityfocus.com/bid/105703', 'https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-6p5r-g9mq-ggh2
|
Reference binding to nullptr in `MatrixSetDiagV*` ops
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`:
```python
import tensorflow as tf
tf.raw_ops.MatrixSetDiagV3(
input=[1,2,3],
diagonal=[1,1],
k=[],
align='RIGHT_LEFT')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong:
```cc
auto& diag_index = context->input(1);
...
lower_diag_index = diag_index.flat<int32>()(0);
```
### Patches
We have patched the issue in GitHub commit [ff8894044dfae5568ecbf2ed514c1a37dc394f1b](https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37658'}
|
2021-08-25T14:42:49Z
|
2021-08-25T14:42:49Z
|
HIGH
| 7.1
|
{'CWE-824'}
|
{'https://github.com/advisories/GHSA-6p5r-g9mq-ggh2', 'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37658', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2'}
| null |
GHSA
|
GHSA-6cf8-qhqj-vjqm
|
Prototype pollution in total.js
|
There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
|
{'CVE-2020-28495'}
|
2021-02-05T20:43:19Z
|
2021-02-05T20:43:19Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://github.com/totaljs/framework/blob/master/utils.js%23L6617', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28495', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671', 'https://github.com/advisories/GHSA-6cf8-qhqj-vjqm', 'https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set', 'https://www.npmjs.com/package/total.js', 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'}
| null |
GHSA
|
GHSA-crf7-fvjx-863q
|
Path Traversal in zero
|
Versions of `zero` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
Upgrade to version 1.0.6 or later.
| null |
2021-09-28T21:18:23Z
|
2020-09-03T17:09:26Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-crf7-fvjx-863q', 'https://www.npmjs.com/advisories/1025'}
| null |
GHSA
|
GHSA-6wpv-cj6x-v3jw
|
Moderate severity vulnerability that affects http
|
The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
|
{'CVE-2015-1828'}
|
2021-09-02T18:34:58Z
|
2018-03-13T16:15:57Z
|
MODERATE
| 5.9
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-1828', 'https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU', 'https://github.com/ruby/openssl/issues/8', 'https://rubysec.com/advisories/http-CVE-2015-1828', 'https://github.com/advisories/GHSA-6wpv-cj6x-v3jw'}
| null |
GHSA
|
GHSA-c9f3-9wfr-wgh7
|
Lack of validation in data format attributes in TensorFlow
|
### Impact
The `tf.raw_ops.DataFormatVecPermute` API does not validate the `src_format` and `dst_format` attributes. [The code](https://github.com/tensorflow/tensorflow/blob/304b96815324e6a73d046df10df6626d63ac12ad/tensorflow/core/kernels/data_format_ops.cc) assumes that these two arguments define a permutation of `NHWC`.
However, these assumptions are not checked and this can result in uninitialized memory accesses, read outside of bounds and even crashes.
```python
>>> import tensorflow as tf
>>> tf.raw_ops.DataFormatVecPermute(x=[1,4], src_format='1234', dst_format='1234')
<tf.Tensor: shape=(2,), dtype=int32, numpy=array([4, 757100143], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[1,4], src_format='HHHH', dst_format='WWWW')
<tf.Tensor: shape=(2,), dtype=int32, numpy=array([4, 32701], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[1,4], src_format='H', dst_format='W')
<tf.Tensor: shape=(2,), dtype=int32, numpy=array([4, 32701], dtype=int32)>
>>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4],
src_format='1234', dst_format='1253')
<tf.Tensor: shape=(4,), dtype=int32, numpy=array([4, 2, 939037184, 3], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4],
src_format='1234', dst_format='1223')
<tf.Tensor: shape=(4,), dtype=int32, numpy=array([4, 32701, 2, 3], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4],
src_format='1224', dst_format='1423')
<tf.Tensor: shape=(4,), dtype=int32, numpy=array([1, 4, 3, 32701], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4], src_format='1234', dst_format='432')
<tf.Tensor: shape=(4,), dtype=int32, numpy=array([4, 3, 2, 32701], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4],
src_format='12345678', dst_format='87654321')
munmap_chunk(): invalid pointer
Aborted
...
>>> tf.raw_ops.DataFormatVecPermute(x=[[1,5],[2,6],[3,7],[4,8]],
src_format='12345678', dst_format='87654321')
<tf.Tensor: shape=(4, 2), dtype=int32, numpy=
array([[71364624, 0],
[71365824, 0],
[ 560, 0],
[ 48, 0]], dtype=int32)>
...
>>> tf.raw_ops.DataFormatVecPermute(x=[[1,5],[2,6],[3,7],[4,8]],
src_format='12345678', dst_format='87654321')
free(): invalid next size (fast)
Aborted
```
A similar issue occurs in `tf.raw_ops.DataFormatDimMap`, for the same reasons:
```python
>>> tf.raw_ops.DataFormatDimMap(x=[[1,5],[2,6],[3,7],[4,8]], src_format='1234',
>>> dst_format='8765')
<tf.Tensor: shape=(4, 2), dtype=int32, numpy=
array([[1954047348, 1954047348],
[1852793646, 1852793646],
[1954047348, 1954047348],
[1852793632, 1852793632]], dtype=int32)>
```
### Patches
We have patched the issue in GitHub commit [ebc70b7a592420d3d2f359e4b1694c236b82c7ae](https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2020-26267'}
|
2021-08-26T15:20:59Z
|
2020-12-10T19:07:26Z
|
LOW
| 4.4
|
{'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26267', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae'}
| null |
GHSA
|
GHSA-m6mm-q862-j366
|
Improper Input Validation in Keycloak
|
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
|
{'CVE-2020-1714'}
|
2022-02-09T00:56:14Z
|
2022-02-09T00:56:14Z
|
MODERATE
| 8.8
|
{'CWE-20'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1714', 'https://github.com/advisories/GHSA-m6mm-q862-j366', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1714', 'https://github.com/keycloak/keycloak/pull/7053'}
| null |
GHSA
|
GHSA-hjxc-462x-x77j
|
TOCTOU Race Condition in Yarn
|
The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0.
|
{'CVE-2019-15608'}
|
2022-02-09T22:49:38Z
|
2022-02-09T22:49:38Z
|
MODERATE
| 5.9
|
{'CWE-367'}
|
{'https://github.com/advisories/GHSA-hjxc-462x-x77j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608', 'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c', 'https://hackerone.com/reports/703138', 'https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190'}
| null |
GHSA
|
GHSA-2p69-gxpm-5469
|
Downloads Resources over HTTP in alto-saxophone
|
Affected versions of `alto-saxophone` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `alto-saxophone`.
## Recommendation
Update to version 2.25.1 or later.
|
{'CVE-2016-10694'}
|
2021-01-08T20:06:56Z
|
2018-07-31T22:34:45Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/172', 'https://github.com/advisories/GHSA-2p69-gxpm-5469', 'https://nodesecurity.io/advisories/172', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10694'}
| null |
GHSA
|
GHSA-5x7p-gm79-383m
|
Malicious Package in regenraotr
|
All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:28:52Z
|
2020-09-01T21:11:57Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-5x7p-gm79-383m', 'https://www.npmjs.com/advisories/684'}
| null |
GHSA
|
GHSA-p4c6-77gc-694x
|
Moderate severity vulnerability that affects rails
|
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
|
{'CVE-2007-6077'}
|
2021-09-15T21:29:44Z
|
2017-10-24T18:33:38Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'http://www.vupen.com/english/advisories/2007/4009', 'https://github.com/advisories/GHSA-p4c6-77gc-694x', 'http://secunia.com/advisories/27781', 'http://www.securityfocus.com/bid/26598', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077', 'http://secunia.com/advisories/28136', 'http://docs.info.apple.com/article.html?artnum=307179', 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release', 'http://dev.rubyonrails.org/changeset/8177', 'http://dev.rubyonrails.org/ticket/10048', 'http://www.vupen.com/english/advisories/2007/4238', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}
| null |
GHSA
|
GHSA-gq5r-cc4w-g8xf
|
Denial of Service (DoS)
|
This affects all versions up to and including 0.6.0 of package github.com/russellhaering/gosaml2. There is a crash on nil-pointer dereference caused by sending malformed XML signatures.
|
{'CVE-2020-7731'}
|
2021-06-23T17:25:08Z
|
2021-06-23T17:25:08Z
|
HIGH
| 7.5
|
{'CWE-476'}
|
{'https://github.com/russellhaering/gosaml2/issues/59', 'https://github.com/advisories/GHSA-gq5r-cc4w-g8xf', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7731'}
| null |
GHSA
|
GHSA-4fg4-p75j-w5xj
|
Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization`
|
### Impact
An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`:
```python
import tensorflow as tf
t = tf.constant([1], shape=[1, 1, 1, 1], dtype=tf.quint8)
t_min = tf.constant([], shape=[0], dtype=tf.float32)
t_max = tf.constant([], shape=[0], dtype=tf.float32)
m = tf.constant([1], shape=[1], dtype=tf.quint8)
m_min = tf.constant([], shape=[0], dtype=tf.float32)
m_max = tf.constant([], shape=[0], dtype=tf.float32)
v = tf.constant([1], shape=[1], dtype=tf.quint8)
v_min = tf.constant([], shape=[0], dtype=tf.float32)
v_max = tf.constant([], shape=[0], dtype=tf.float32)
beta = tf.constant([1], shape=[1], dtype=tf.quint8)
beta_min = tf.constant([], shape=[0], dtype=tf.float32)
beta_max = tf.constant([], shape=[0], dtype=tf.float32)
gamma = tf.constant([1], shape=[1], dtype=tf.quint8)
gamma_min = tf.constant([], shape=[0], dtype=tf.float32)
gamma_max = tf.constant([], shape=[0], dtype=tf.float32)
tf.raw_ops.QuantizedBatchNormWithGlobalNormalization(
t=t, t_min=t_min, t_max=t_max, m=m, m_min=m_min, m_max=m_max,
v=v, v_min=v_min, v_max=v_max, beta=beta, beta_min=beta_min,
beta_max=beta_max, gamma=gamma, gamma_min=gamma_min,
gamma_max=gamma_max, out_type=tf.qint32,
variance_epsilon=0.1, scale_after_normalization=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty:
```cc
const float input_min = context->input(1).flat<float>()(0);
const float input_max = context->input(2).flat<float>()(0);
...
const float mean_min = context->input(4).flat<float>()(0);
const float mean_max = context->input(5).flat<float>()(0);
...
const float var_min = context->input(7).flat<float>()(0);
const float var_max = context->input(8).flat<float>()(0);
...
const float beta_min = context->input(10).flat<float>()(0);
const float beta_max = context->input(11).flat<float>()(0);
...
const float gamma_min = context->input(13).flat<float>()(0);
const float gamma_max = context->input(14).flat<float>()(0);
```
If any of these inputs is empty, `.flat<T>()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds.
### Patches
We have patched the issue in GitHub commit [d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b](https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29547'}
|
2021-05-21T14:23:31Z
|
2021-05-21T14:23:31Z
|
LOW
| 2.5
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29547'}
| null |
GHSA
|
GHSA-9hx7-rg7w-xm79
|
XSS vulnerability in company name field in Mautic
|
### Impact
Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code.
### Patches
Update to 2.14.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2018-11200'}
|
2022-04-19T19:02:45Z
|
2021-01-19T21:16:26Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/mautic/mautic/releases/tag/2.14.0', 'https://github.com/advisories/GHSA-9hx7-rg7w-xm79', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11200', 'https://github.com/mautic/mautic/security/advisories/GHSA-9hx7-rg7w-xm79'}
| null |
GHSA
|
GHSA-2cf5-4w76-r9qv
|
Arbitrary Code Execution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.5.2 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting).
The following template can be used to demonstrate the vulnerability:
```{{#with "constructor"}}
{{#with split as |a|}}
{{pop (push "alert('Vulnerable Handlebars JS');")}}
{{#with (concat (lookup join (slice 0 1)))}}
{{#each (slice 2 3)}}
{{#with (apply 0 a)}}
{{.}}
{{/with}}
{{/each}}
{{/with}}
{{/with}}
{{/with}}```
## Recommendation
Upgrade to version 3.0.8, 4.5.2 or later.
| null |
2020-09-04T14:57:38Z
|
2020-09-04T14:57:38Z
|
HIGH
| 0
| null |
{'https://www.npmjs.com/advisories/1316', 'https://github.com/advisories/GHSA-2cf5-4w76-r9qv'}
| null |
GHSA
|
GHSA-j86v-p27c-73fm
|
Unitialized access in `EinsumHelper::ParseEquation`
|
### Impact
During execution, [`EinsumHelper::ParseEquation()`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/linalg/einsum_op_impl.h#L126-L181) is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whether there is ellipsis in the corresponding inputs and output.
However, the code only changes these flags to `true` and never assigns `false`.
```cc
for (int i = 0; i < num_inputs; ++i) {
input_label_counts->at(i).resize(num_labels);
for (const int label : input_labels->at(i)) {
if (label != kEllipsisLabel)
input_label_counts->at(i)[label] += 1;
else
input_has_ellipsis->at(i) = true;
}
}
output_label_counts->resize(num_labels);
for (const int label : *output_labels) {
if (label != kEllipsisLabel)
output_label_counts->at(label) += 1;
else
*output_has_ellipsis = true;
}
```
This results in unitialized variable access if callers assume that `EinsumHelper::ParseEquation()` always sets these flags.
### Patches
We have patched the issue in GitHub commit [f09caa532b6e1ac8d2aa61b7832c78c5b79300c6](https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2021-41201'}
|
2021-11-10T19:17:43Z
|
2021-11-10T19:17:43Z
|
HIGH
| 7.8
|
{'CWE-824'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41201', 'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm', 'https://github.com/advisories/GHSA-j86v-p27c-73fm'}
| null |
GHSA
|
GHSA-22hc-47cc-7x6f
|
Cross-site Scripting in Pimcore
|
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
|
{'CVE-2022-0894'}
|
2022-03-29T21:21:30Z
|
2022-03-16T00:00:48Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-22hc-47cc-7x6f', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'}
| null |
GHSA
|
GHSA-v6w3-2prq-h95f
|
Improper Input Validation in Jakarta Expression Language
|
In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.
|
{'CVE-2021-28170'}
|
2022-04-26T18:07:57Z
|
2021-10-06T17:48:38Z
|
MODERATE
| 5.3
|
{'CWE-917', 'CWE-20'}
|
{'https://github.com/eclipse-ee4j/el-ri/issues/155', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-v6w3-2prq-h95f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170', 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/', 'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}
| null |
GHSA
|
GHSA-cfpj-3q4c-jhvr
|
Division by zero in TFLite
|
### Impact
The implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226):
```cc
const int batch_size = input_size / filter->dims->data[1];
```
An attacker can craft a model such that `filter->dims->data[1]` is 0.
### Patches
We have patched the issue in GitHub commit [718721986aa137691ee23f03638867151f74935f](https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it has also been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37680'}
|
2021-08-25T14:40:38Z
|
2021-08-25T14:40:38Z
|
MODERATE
| 5.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f', 'https://github.com/advisories/GHSA-cfpj-3q4c-jhvr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37680', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr'}
| null |
GHSA
|
GHSA-649c-x44h-4q7v
|
Low severity vulnerability that affects public
|
A XSS vulnerability was found in module public <0.1.4 that allows malicious Javascript code to run in the browser, due to the absence of sanitization of the file/folder names before rendering.
|
{'CVE-2018-16480'}
|
2021-01-08T19:47:32Z
|
2019-02-07T18:14:37Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-649c-x44h-4q7v', 'https://hackerone.com/reports/329950', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16480', 'https://www.npmjs.com/package/public'}
| null |
GHSA
|
GHSA-gpvj-q7fp-jcch
|
Moderate severity vulnerability that affects simplehttpserver
|
Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server.
|
{'CVE-2018-3787'}
|
2021-01-08T18:45:46Z
|
2018-09-06T03:22:59Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/357109', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3787', 'https://github.com/advisories/GHSA-gpvj-q7fp-jcch'}
| null |
GHSA
|
GHSA-3pxh-h8hw-mj8w
|
Moderate severity vulnerability that affects rack
|
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
|
{'CVE-2013-0183'}
|
2021-08-31T21:21:31Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-119'}
|
{'http://www.debian.org/security/2013/dsa-2783', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=895282', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183', 'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI', 'http://rack.github.com/'}
| null |
GHSA
|
GHSA-wcm2-9c89-wmfm
|
Cross-site Scripting in jquery-ui
|
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
|
{'CVE-2010-5312'}
|
2022-01-20T15:38:29Z
|
2017-10-24T18:33:38Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/71106', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312', 'https://github.com/advisories/GHSA-wcm2-9c89-wmfm', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'http://www.debian.org/security/2015/dsa-3249', 'http://www.securitytracker.com/id/1037035', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://seclists.org/oss-sec/2014/q4/616', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696', 'https://www.drupal.org/sa-core-2022-002', 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3', 'http://seclists.org/oss-sec/2014/q4/613', 'http://bugs.jqueryui.com/ticket/6016'}
| null |
GHSA
|
GHSA-jvf5-q4h5-2jmj
|
Prototype Pollution in madlib-object-utils
|
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
|
{'CVE-2020-7701'}
|
2021-07-29T21:55:23Z
|
2021-05-06T17:28:57Z
|
CRITICAL
| 9.8
|
{'CWE-915'}
|
{'https://github.com/advisories/GHSA-jvf5-q4h5-2jmj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7701', 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676'}
| null |
GHSA
|
GHSA-43g8-79x3-j898
|
Unrestricted access to predictable file paths in hov/jobfair
|
An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).
|
{'CVE-2021-43564'}
|
2021-11-17T21:24:12Z
|
2021-11-15T17:36:22Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-43g8-79x3-j898', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43564', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-018'}
| null |
GHSA
|
GHSA-54hw-mhgh-x4vc
|
Business Logic Errors in pimcore
|
In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior.
|
{'CVE-2021-4146'}
|
2022-01-26T22:09:49Z
|
2022-01-26T22:09:49Z
|
MODERATE
| 4.3
| null |
{'https://github.com/pimcore/pimcore/pull/11206', 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/advisories/GHSA-54hw-mhgh-x4vc'}
| null |
GHSA
|
GHSA-5v72-xg48-5rpm
|
Denial of Service in ws
|
Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent.
## Proof of concept
```
const WebSocket = require('ws');
const net = require('net');
const wss = new WebSocket.Server({ port: 3000 }, function () {
const payload = 'constructor'; // or ',;constructor'
const request = [
'GET / HTTP/1.1',
'Connection: Upgrade',
'Sec-WebSocket-Key: test',
'Sec-WebSocket-Version: 8',
`Sec-WebSocket-Extensions: ${payload}`,
'Upgrade: websocket',
'\r\n'
].join('\r\n');
const socket = net.connect(3000, function () {
socket.resume();
socket.write(request);
});
});
```
## Recommendation
Update to version 3.3.1 or later.
| null |
2021-08-04T21:29:06Z
|
2019-06-04T19:37:52Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://snyk.io/vuln/npm:ws:20171108', 'https://www.npmjs.com/advisories/550/versions', 'https://github.com/advisories/GHSA-5v72-xg48-5rpm', 'https://www.npmjs.com/advisories/550', 'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a', 'https://nodesecurity.io/advisories/550'}
| null |
GHSA
|
GHSA-fwcw-5qw2-87mp
|
Cross-Site Scripting in fuelux
|
Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution.
## Recommendation
Update to version 3.15.7 or later.
|
{'CVE-2016-1000235'}
|
2021-09-23T21:34:24Z
|
2020-09-01T15:55:56Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/ExactTarget/fuelux/issues/1841', 'https://github.com/ExactTarget/fuelux/pull/1856', 'https://github.com/advisories/GHSA-fwcw-5qw2-87mp', 'https://www.npmjs.com/advisories/133', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000235'}
| null |
GHSA
|
GHSA-hhw2-pqhf-vmx2
|
Use after free in actix-utils
|
An issue was discovered in the actix-utils crate before 2.0.0 for Rust. The Cell implementation allows obtaining more than one mutable reference to the same data.
|
{'CVE-2020-35898'}
|
2021-08-25T20:49:09Z
|
2021-08-25T20:49:09Z
|
CRITICAL
| 9.1
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35898', 'https://rustsec.org/advisories/RUSTSEC-2020-0045.html', 'https://github.com/advisories/GHSA-hhw2-pqhf-vmx2', 'https://github.com/actix/actix-net/issues/160'}
| null |
GHSA
|
GHSA-2p62-c4rm-mr72
|
Malicious Package in another-date-picker
|
Version 2.0.43 of `another-date-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 2.0.43 of this module is found installed you will want to replace it with a version before or after 2.0.43. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T14:50:57Z
|
2020-09-01T19:44:57Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/kekeh/mydatepicker', 'https://github.com/advisories/GHSA-2p62-c4rm-mr72', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATEPICKER-451013', 'https://www.npmjs.com/advisories/616', 'https://github.com/bi-a/mydatepicker'}
| null |
GHSA
|
GHSA-36c4-4r89-6whg
|
Prototype Pollution in @commercial/subtext
|
Versions of `@commercial/subtext` prior to 5.1.2 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed.
## Recommendation
Upgrade to version 5.1.2 or later.
| null |
2021-10-04T21:05:04Z
|
2020-09-03T15:49:02Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-36c4-4r89-6whg', 'https://www.npmjs.com/advisories/1484'}
| null |
GHSA
|
GHSA-7mpx-vg3c-cmr4
|
Improper Authentication in react-adal
|
This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.
|
{'CVE-2020-7787'}
|
2021-04-13T15:22:37Z
|
2021-04-13T15:22:37Z
|
HIGH
| 8.2
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7787', 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9', 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907', 'https://github.com/salvoravida/react-adal/pull/115', 'https://github.com/advisories/GHSA-7mpx-vg3c-cmr4'}
| null |
GHSA
|
GHSA-f2j6-wrhh-v25m
|
High severity vulnerability that affects paramiko
|
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
|
{'CVE-2018-1000805'}
|
2022-04-07T15:08:23Z
|
2018-10-10T16:10:10Z
|
HIGH
| 8.8
|
{'CWE-863', 'CWE-732'}
|
{'https://github.com/paramiko/paramiko/issues/1283', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000805', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://github.com/advisories/GHSA-f2j6-wrhh-v25m', 'https://access.redhat.com/errata/RHBA-2018:3497', 'https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt', 'https://access.redhat.com/errata/RHSA-2018:3505', 'https://usn.ubuntu.com/3796-3/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html', 'https://usn.ubuntu.com/3796-1/', 'https://access.redhat.com/errata/RHSA-2018:3406', 'https://usn.ubuntu.com/3796-2/', 'https://access.redhat.com/errata/RHSA-2018:3347'}
| null |
GHSA
|
GHSA-25xm-hr59-7c27
|
Release v0.5.8 of github.com/ulikunitz/xz fixes readUvarint denial of service
|
### Impact
The function readUvarint used to read the xz container format may not terminate a loop provide malicous input.
### Patches
The problem has been fixed in release v0.5.8.
### Workarounds
Limit the size of the compressed file input to a reasonable size for your use case.
### References
The standard library had recently the same issue and got the [CVE-2020-16845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845) allocated.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [xz](https://github.com/ulikunitz/xz/issues).
|
{'CVE-2021-29482'}
|
2022-04-19T19:02:33Z
|
2021-05-25T18:39:37Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://github.com/advisories/GHSA-25xm-hr59-7c27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29482'}
| null |
GHSA
|
GHSA-9vvp-fxw6-jcxr
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
|
{'CVE-2020-11113'}
|
2021-10-21T21:11:15Z
|
2020-05-15T18:58:47Z
|
HIGH
| 8.8
|
{'CWE-502'}
|
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2670', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11113', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-9vvp-fxw6-jcxr'}
| null |
GHSA
|
GHSA-6qqj-rx4w-r3cj
|
CSRF Vulnerability in jquery-ujs
|
Versions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains.
When an attacker controls the href attribute of an anchor tag, or
the action attribute of a form tag triggering a POST action, the attacker can set the
href or action to " https://attacker.com". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain.
## Recommendation
Upgrade jquery-ujs to version 1.0.4 or later.
| null |
2021-09-23T19:45:14Z
|
2020-08-31T22:48:44Z
|
MODERATE
| 6.5
|
{'CWE-352'}
|
{'https://hackerone.com/reports/49935', 'https://www.npmjs.com/advisories/15', 'https://snyk.io/vuln/npm:jquery-ujs:20150624', 'https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'https://github.com/advisories/GHSA-6qqj-rx4w-r3cj'}
| null |
GHSA
|
GHSA-qgfr-5hqp-vrw9
|
Path Traversal in decompress
|
Versions of `decompress` prior to 4.2.1 are vulnerable to Arbitrary File Write. The package fails to prevent extraction of files with relative paths, allowing attackers to write to any folder in the system by including filenames containing`../`.
## Recommendation
Upgrade to version 4.2.1 or later.
|
{'CVE-2020-12265'}
|
2021-07-29T16:07:53Z
|
2020-09-03T21:16:27Z
|
CRITICAL
| 9.8
|
{'CWE-59', 'CWE-22'}
|
{'https://github.com/kevva/decompress/issues/71', 'https://www.npmjs.com/advisories/1217', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12265', 'https://github.com/advisories/GHSA-qgfr-5hqp-vrw9', 'https://github.com/kevva/decompress/pull/73'}
| null |
GHSA
|
GHSA-xp5j-wj4h-2jq9
|
Injection and Improper Input Validation in Apache Unomi
|
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
|
{'CVE-2020-13942'}
|
2022-02-10T00:30:54Z
|
2022-02-10T00:30:54Z
|
CRITICAL
| 9.8
|
{'CWE-74', 'CWE-20'}
|
{'https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E', 'https://lists.apache.org/thread.html/rcb6d2eafcf15def433aaddfa06738e5faa5060cef2647769e178999a@%3Cdev.unomi.apache.org%3E', 'http://unomi.apache.org./security/cve-2020-13942.txt', 'https://advisory.checkmarx.net/advisory/CX-2020-4284', 'https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cdev.unomi.apache.org%3E', 'https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cusers.unomi.apache.org%3E', 'https://github.com/advisories/GHSA-xp5j-wj4h-2jq9', 'http://www.openwall.com/lists/oss-security/2020/11/24/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13942', 'https://lists.apache.org/thread.html/rcb6d2eafcf15def433aaddfa06738e5faa5060cef2647769e178999a@%3Cusers.unomi.apache.org%3E', 'https://lists.apache.org/thread.html/r08a4057ff7196b8880117edaa4b6207cbd36ed692d8dd1f5a56b4d0f@%3Cannounce.apache.org%3E'}
| null |
GHSA
|
GHSA-5q5w-mf87-57x4
|
Downloads Resources over HTTP in sfml
|
Affected versions of `sfml` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10654'}
|
2021-01-08T19:48:41Z
|
2019-02-18T23:45:18Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/256', 'https://github.com/advisories/GHSA-5q5w-mf87-57x4', 'https://nodesecurity.io/advisories/256', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10654'}
| null |
GHSA
|
GHSA-p5xp-6vpf-jwvh
|
Improper Input Validation and Cross-Site Request Forgery in Keycloak
|
It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.
|
{'CVE-2019-10199'}
|
2021-10-29T22:01:59Z
|
2019-09-23T18:32:27Z
|
HIGH
| 8.8
|
{'CWE-352', 'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10199', 'https://github.com/advisories/GHSA-p5xp-6vpf-jwvh', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10199'}
| null |
GHSA
|
GHSA-g336-c7wv-8hp3
|
Cross-Site Scripting in swagger-ui
|
Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter.
## Recommendation
Update to 2.2.1 or later.
| null |
2021-09-23T21:35:43Z
|
2020-09-01T15:58:06Z
|
CRITICAL
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-g336-c7wv-8hp3', 'https://www.npmjs.com/advisories/137', 'https://github.com/swagger-api/swagger-ui/issues/1617'}
| null |
GHSA
|
GHSA-w3cg-6577-wx9f
|
Directory Traversal in cuciuci
|
Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16122'}
|
2021-01-14T15:49:57Z
|
2020-09-01T17:20:41Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/381', 'https://github.com/advisories/GHSA-w3cg-6577-wx9f', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122', 'https://www.npmjs.com/advisories/381'}
| null |
GHSA
|
GHSA-vx8v-g3p3-88vg
|
Weak password hash in LiveHelperChat
|
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
|
{'CVE-2022-1235'}
|
2022-04-19T18:01:54Z
|
2022-04-06T00:01:31Z
|
HIGH
| 7.5
|
{'CWE-916'}
|
{'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://github.com/advisories/GHSA-vx8v-g3p3-88vg', 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}
| null |
GHSA
|
GHSA-f58w-649r-qjr9
|
Moderate severity vulnerability that affects splunk-sdk
|
Splunk-SDK-Python before 1.6.6 does not properly verify untrusted TLS server certificates, which could result in man-in-the-middle attacks.
|
{'CVE-2019-5729'}
|
2021-09-09T21:39:33Z
|
2019-03-25T16:18:04Z
|
HIGH
| 8.1
|
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5729', 'https://github.com/advisories/GHSA-f58w-649r-qjr9', 'https://www.splunk.com/view/SP-CAAAQAD'}
| null |
GHSA
|
GHSA-m42h-mh85-4qgc
|
Moderate severity vulnerability that affects railties
|
# Possible Remote Code Execution Exploit in Rails Development Mode
Impact
------
With some knowledge of a target application it is possible for an attacker to
guess the automatically generated development mode secret token. This secret
token can be used in combination with other Rails internals to escalate to a
remote code execution exploit.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations.
Workarounds
-----------
This issue can be mitigated by specifying a secret key in development mode.
In "config/environments/development.rb" add this:
```
config.secret_key_base = SecureRandom.hex(64)
```
Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported
at present. Users of earlier unsupported releases are advised to upgrade as
soon as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thanks to ooooooo_q
|
{'CVE-2019-5420'}
|
2021-11-04T17:09:22Z
|
2019-03-13T17:28:35Z
|
CRITICAL
| 9.8
|
{'CWE-330', 'CWE-77'}
|
{'http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw', 'https://github.com/advisories/GHSA-m42h-mh85-4qgc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5420', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/', 'https://www.exploit-db.com/exploits/46785/'}
| null |
GHSA
|
GHSA-5x8q-gj67-rhf2
|
Malicious Package in discord_debug_log
|
All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts.
## Recommendation
Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
| null |
2021-09-30T21:23:25Z
|
2020-09-02T21:18:33Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/873', 'https://github.com/advisories/GHSA-5x8q-gj67-rhf2'}
| null |
GHSA
|
GHSA-25xj-89g5-fm6h
|
Information Disclosure in HashiCorp Vault
|
HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File.
|
{'CVE-2020-13223'}
|
2022-02-24T13:07:51Z
|
2021-05-18T18:21:09Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-532'}
|
{'https://github.com/advisories/GHSA-25xj-89g5-fm6h', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020', 'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13223', 'https://www.hashicorp.com/blog/category/vault/'}
| null |
GHSA
|
GHSA-rc7p-gmvh-xfx2
|
Attack on Kubernetes via Misconfigured Argo Workflows
|
### Impact
Users running using the Argo Server with `--auth-mode=server` (which is the default < v3.0.0) AND have exposed their UI to the Internet may allow remote users to execute arbitrary code on their cluster, e.g. crypto-mining.
### Resolution
* Do not expose your user interface to the Internet.
* Change configuration. `--auth-mode=client`.
For users using an older 2.x version of Argo Server, consider upgrading to Argo Server version 3.x or later.
| null |
2021-08-02T17:19:52Z
|
2021-08-02T17:19:52Z
|
MODERATE
| 0
| null |
{'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-rc7p-gmvh-xfx2', 'https://www.intezer.com/blog/container-security/new-attacks-on-kubernetes-via-misconfigured-argo-workflows/', 'https://github.com/advisories/GHSA-rc7p-gmvh-xfx2'}
| null |
GHSA
|
GHSA-hrcp-8f3q-4w2c
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21351](https://x-stream.github.io/CVE-2021-21351.html).
### Credits
wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21351'}
|
2022-04-19T19:02:49Z
|
2021-03-22T23:29:37Z
|
MODERATE
| 5.4
|
{'CWE-434', 'CWE-502'}
|
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://x-stream.github.io/CVE-2021-21351.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21351', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://github.com/advisories/GHSA-hrcp-8f3q-4w2c', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-qx9m-27wh-7fjg
|
Downloads Resources over HTTP in jvminstall
|
Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10631'}
|
2021-01-08T01:58:17Z
|
2019-02-18T23:57:03Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10631', 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg', 'https://nodesecurity.io/advisories/225', 'https://www.npmjs.com/advisories/225'}
| null |
GHSA
|
GHSA-mg5h-9rhq-4cqx
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0937'}
|
2022-03-23T15:40:21Z
|
2022-03-15T00:01:02Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mg5h-9rhq-4cqx', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3', 'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937'}
| null |
GHSA
|
GHSA-364w-9g92-3grq
|
Withdrawn: Laravel Framework does not sufficiently block the upload of executable PHP content.
|
# Withdrawn
This advisory has been withdrawn after the maintainers of Laravel noted this issue is not a security vulnerability with Laravel itself, but rather a userland issue.
## Original CVE based description
Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. In some use cases, this may be related to file-type validation for image upload (e.g., differences between getClientOriginalExtension and other approaches).
|
{'CVE-2021-43617'}
|
2021-11-19T14:43:07Z
|
2021-11-16T23:40:08Z
|
MODERATE
| 0
|
{'CWE-434'}
|
{'https://salsa.debian.org/php-team/php/-/commit/dc253886b5b2e9bc8d9e36db787abb083a667fd8', 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1331-L1333', 'https://github.com/advisories/GHSA-364w-9g92-3grq', 'https://salsa.debian.org/php-team/php/-/blob/dc253886b5b2e9bc8d9e36db787abb083a667fd8/debian/php-cgi.conf#L5-6', 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1130-L1132', 'https://hosein-vita.medium.com/laravel-8-x-image-upload-bypass-zero-day-852bd806019b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43617'}
| null |
GHSA
|
GHSA-4qrp-27r3-66fj
|
Improper sanitize of SVG files during content upload ('Cross-site Scripting') in sylius/sylius
|
### Impact
There is a possibility to upload an SVG file containing XSS code in the admin panel. In order to perform an XSS attack, the file itself has to be opened in a new card (or loaded outside of the IMG tag). The problem applies both to the files opened on the admin panel and shop pages.
### Patches
The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2, and above.
### Workarounds
If there is a need to upload an SVG image type, on-upload sanitization has to be added. The way to achieve this is to require a library that will do the trick:
```
composer require enshrined/svg-sanitize
```
The second step is all about performing a file content sanitization before writing it to the filesystem. It can be done by overwriting the service:
```php
<?php
declare(strict_types=1);
namespace App\Uploader;
use enshrined\svgSanitize\Sanitizer;
use Gaufrette\Filesystem;
use Sylius\Component\Core\Generator\ImagePathGeneratorInterface;
use Sylius\Component\Core\Generator\UploadedImagePathGenerator;
use Sylius\Component\Core\Model\ImageInterface;
use Sylius\Component\Core\Uploader\ImageUploaderInterface;
use Symfony\Component\HttpFoundation\File\File;
use Webmozart\Assert\Assert;
final class ImageUploader implements ImageUploaderInterface
{
private const MIME_SVG_XML = 'image/svg+xml';
private const MIME_SVG = 'image/svg';
/** @var Filesystem */
protected $filesystem;
/** @var ImagePathGeneratorInterface */
protected $imagePathGenerator;
/** @var Sanitizer */
protected $sanitizer;
public function __construct(
Filesystem $filesystem,
?ImagePathGeneratorInterface $imagePathGenerator = null
) {
$this->filesystem = $filesystem;
if ($imagePathGenerator === null) {
@trigger_error(sprintf(
'Not passing an $imagePathGenerator to %s constructor is deprecated since Sylius 1.6 and will be not possible in Sylius 2.0.', self::class
), \E_USER_DEPRECATED);
}
$this->imagePathGenerator = $imagePathGenerator ?? new UploadedImagePathGenerator();
$this->sanitizer = new Sanitizer();
}
public function upload(ImageInterface $image): void
{
if (!$image->hasFile()) {
return;
}
/** @var File $file */
$file = $image->getFile();
Assert::isInstanceOf($file, File::class);
$fileContent = $this->sanitizeContent(file_get_contents($file->getPathname()), $file->getMimeType());
if (null !== $image->getPath() && $this->has($image->getPath())) {
$this->remove($image->getPath());
}
do {
$path = $this->imagePathGenerator->generate($image);
} while ($this->isAdBlockingProne($path) || $this->filesystem->has($path));
$image->setPath($path);
$this->filesystem->write($image->getPath(), $fileContent);
}
public function remove(string $path): bool
{
if ($this->filesystem->has($path)) {
return $this->filesystem->delete($path);
}
return false;
}
protected function sanitizeContent(string $fileContent, string $mimeType): string
{
if (self::MIME_SVG_XML === $mimeType || self::MIME_SVG === $mimeType) {
$fileContent = $this->sanitizer->sanitize($fileContent);
}
return $fileContent;
}
private function has(string $path): bool
{
return $this->filesystem->has($path);
}
/**
* Will return true if the path is prone to be blocked by ad blockers
*/
private function isAdBlockingProne(string $path): bool
{
return strpos($path, 'ad') !== false;
}
}
```
After that, register service in the container:
```yaml
services:
sylius.image_uploader:
class: App\Uploader\ImageUploader
arguments:
- '@gaufrette.sylius_image_filesystem'
- '@Sylius\Component\Core\Generator\ImagePathGeneratorInterface'
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues)
* Email us at security@sylius.com
|
{'CVE-2022-24749'}
|
2022-04-04T21:38:48Z
|
2022-03-14T22:38:14Z
|
MODERATE
| 6.1
|
{'CWE-434', 'CWE-79', 'CWE-80'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24749', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10', 'https://github.com/advisories/GHSA-4qrp-27r3-66fj', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'}
| null |
GHSA
|
GHSA-fmpq-w5q6-9vf9
|
Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main
|
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
|
{'CVE-2019-0224'}
|
2021-06-10T23:43:18Z
|
2019-04-02T15:46:48Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://github.com/advisories/GHSA-fmpq-w5q6-9vf9', 'https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0224', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224', 'http://www.securityfocus.com/bid/107631', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}
| null |
GHSA
|
GHSA-m2v2-8227-59f5
|
Exposure of sensitive information in concrete5/core
|
In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in "add / edit message”.
|
{'CVE-2021-22967'}
|
2021-11-24T19:01:00Z
|
2021-11-23T17:54:39Z
|
MODERATE
| 0
|
{'CWE-200', 'CWE-639'}
|
{'https://github.com/advisories/GHSA-m2v2-8227-59f5', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22967', 'https://hackerone.com/reports/869612'}
| null |
GHSA
|
GHSA-7vrm-3jc8-5wwm
|
Incorrect Comparison in Vyper
|
### Impact
bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g.
```vyper
b1: Bytes[32] = b"abcdef"
b1 = slice(b1, 0, 1)
b2: Bytes[32] = b"abcdef"
t: bool = b1 == b2 # incorrectly evaluates to True
```
even without dirty nonzero bytes, because there is no comparison of the length, two bytestrings can compare to equal if one ends with `"\x00"`.
```vyper
b1: Bytes[32] = b"abc\0"
b2: Bytes[32] = b"abc"
t: bool = b1 == b2 # incorrectly evaluates to True
```
### Patches
fixed in https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508
| null |
2022-04-06T17:39:51Z
|
2022-04-04T21:40:45Z
|
HIGH
| 7.5
|
{'CWE-697'}
|
{'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508', 'https://github.com/advisories/GHSA-7vrm-3jc8-5wwm', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}
| null |
GHSA
|
GHSA-pjxw-22xf-6pwc
|
Prototype Pollution in defaults-deep
|
All versions of `defaults-deep` are vulnerable to prototype pollution. Provided certain input `defaults-deep` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
As no patch is currently available for this vulnerability it is our recommendation to select another module that can provide this functionality.
|
{'CVE-2018-16486'}
|
2021-09-16T20:59:39Z
|
2019-02-07T18:16:38Z
|
MODERATE
| 0
|
{'CWE-400', 'CWE-345'}
|
{'https://hackerone.com/reports/380878', 'https://www.npmjs.com/advisories/778', 'https://github.com/advisories/GHSA-pjxw-22xf-6pwc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16486'}
| null |
GHSA
|
GHSA-j8qh-3xrq-c825
|
Division by zero in TFLite's implementation of `OneHot`
|
### Impact
The implementation of the `OneHot` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72):
```cc
int prefix_dim_size = 1;
for (int i = 0; i < op_context.axis; ++i) {
prefix_dim_size *= op_context.indices->dims->data[i];
}
const int suffix_dim_size = NumElements(op_context.indices) / prefix_dim_size;
```
An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0.
### Patches
We have patched the issue in GitHub commit [3ebedd7e345453d68e279cfc3e4072648e5e12e5](https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29600'}
|
2021-05-21T14:28:04Z
|
2021-05-21T14:28:04Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-j8qh-3xrq-c825', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29600', 'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'}
| null |
GHSA
|
GHSA-mxr5-p36v-479m
|
Moderate severity vulnerability that affects jquery-file-upload
|
Arbitrary file upload in jQuery Upload File <= 4.0.2
|
{'CVE-2018-9207'}
|
2021-09-15T21:05:49Z
|
2018-12-19T19:24:03Z
|
CRITICAL
| 9.8
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-mxr5-p36v-479m', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9207', 'http://www.vapidlabs.com/advisory.php?v=206'}
| null |
GHSA
|
GHSA-hx7c-qpfq-xcrp
|
Cross-site Scripting in django-cms
|
Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
|
{'CVE-2021-44649'}
|
2022-01-21T13:25:20Z
|
2022-01-13T20:10:53Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://www.django-cms.org/en/blog/2020/07/22/django-cms-security-updates-1/', 'https://github.com/advisories/GHSA-hx7c-qpfq-xcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44649', 'https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/'}
| null |
GHSA
|
GHSA-3mqv-8gxg-pfm4
|
Cross-site scripting in twitter-server
|
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
|
{'CVE-2020-35774'}
|
2022-02-09T22:37:28Z
|
2022-02-09T22:37:28Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0', 'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/advisories/GHSA-3mqv-8gxg-pfm4'}
| null |
GHSA
|
GHSA-7rpc-9m88-cf9w
|
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
|
There is an OS Command Injection Vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
Target
baserCMS 4.5.3 and earlier versions
Vulnerability
OS Command Injection Vulnerability.
Countermeasures
Update to the latest version of baserCMS
Credits
Akagi Yusuke @NTT-ME
|
{'CVE-2021-41243'}
|
2021-12-01T18:29:42Z
|
2021-12-01T18:29:42Z
|
CRITICAL
| 9.1
|
{'CWE-78'}
|
{'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff', 'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/advisories/GHSA-7rpc-9m88-cf9w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243'}
| null |
GHSA
|
GHSA-g4gm-pxh3-29fq
|
Unrestricted Uploads in Concrete5
|
Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value.
|
{'CVE-2020-14961'}
|
2022-02-10T22:28:41Z
|
2022-02-10T22:28:41Z
|
MODERATE
| 5.3
|
{'CWE-434'}
|
{'https://github.com/concrete5/concrete5/releases/tag/8.5.3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14961', 'https://github.com/concrete5/concrete5/pull/8651', 'https://github.com/advisories/GHSA-g4gm-pxh3-29fq'}
| null |
GHSA
|
GHSA-2r8f-2665-3gxq
|
Malicious Package in froever
|
All versions of `froever` contain malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:54:32Z
|
2020-09-02T21:36:36Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-2r8f-2665-3gxq', 'https://www.npmjs.com/advisories/904'}
| null |
GHSA
|
GHSA-f9xr-3m55-5q2v
|
Data races in cgc
|
An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr implements Send and Sync for all types.
|
{'CVE-2020-36466'}
|
2021-08-25T20:56:14Z
|
2021-08-25T20:56:14Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0148.html', 'https://github.com/playXE/cgc/issues/5', 'https://github.com/advisories/GHSA-f9xr-3m55-5q2v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36466'}
| null |
GHSA
|
GHSA-fhv8-fx5f-7fxf
|
Prototype Pollution in the merge and clone helper methods
|
### Impact
Using `merge` and `clone` helper methods in the `src/core/util.ts` module will have prototype pollution. It will affect the popular data visualization library Apache ECharts, which is using and exported these two methods directly.
### Patches
It has been patched in https://github.com/ecomfe/zrender/pull/826.
Users should update zrender to `5.2.1`. and update echarts to `5.2.1` if project is using echarts.
### References
NA
### For more information
NA
|
{'CVE-2021-39227'}
|
2022-04-19T19:03:09Z
|
2021-09-20T19:53:15Z
|
MODERATE
| 6.2
|
{'CWE-1321', 'CWE-915'}
|
{'https://github.com/ecomfe/zrender/releases/tag/5.2.1', 'https://github.com/ecomfe/zrender/pull/826', 'https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39227', 'https://github.com/advisories/GHSA-fhv8-fx5f-7fxf'}
| null |
GHSA
|
GHSA-24g6-5rx7-58wj
|
Missing Initialization of Resource in pnet
|
An issue was discovered in the pnet crate before 0.27.2 for Rust. There is a segmentation fault (upon attempted dereference of an uninitialized descriptor) because of an erroneous IcmpTransportChannelIterator compiler optimization.
|
{'CVE-2019-25054'}
|
2022-01-07T16:13:37Z
|
2022-01-06T22:18:07Z
|
HIGH
| 7.5
|
{'CWE-909'}
|
{'https://rustsec.org/advisories/RUSTSEC-2019-0037.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/pnet/RUSTSEC-2019-0037.md', 'https://github.com/advisories/GHSA-24g6-5rx7-58wj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25054'}
| null |
GHSA
|
GHSA-2xpj-f5g2-8p7m
|
Access of Uninitialized Pointer
|
asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.
|
{'CVE-2020-17446'}
|
2021-04-20T16:30:51Z
|
2021-04-20T16:30:51Z
|
HIGH
| 9.8
|
{'CWE-824'}
|
{'https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17446', 'https://github.com/advisories/GHSA-2xpj-f5g2-8p7m', 'https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0'}
| null |
GHSA
|
GHSA-6pw2-5hjv-9pf7
|
Sandbox bypass in vm2
|
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
|
{'CVE-2021-23555'}
|
2022-02-24T13:46:57Z
|
2022-02-12T00:00:38Z
|
CRITICAL
| 9.8
|
{'CWE-1321', 'CWE-1265'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23555', 'https://snyk.io/vuln/SNYK-JS-VM2-2309905', 'https://github.com/advisories/GHSA-6pw2-5hjv-9pf7', 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}
| null |
GHSA
|
GHSA-24wf-7vf2-pv59
|
XXE vulnerability on Launch import with externally-defined DTD file
|
### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery.
### Patches
Fixed with: https://github.com/reportportal/service-api/pull/1392
### Binaries
`docker pull reportportal/service-api:5.4.0`
https://github.com/reportportal/service-api/packages/846871?version=5.4.0
### For more information
If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
|
{'CVE-2021-29620'}
|
2021-06-28T16:38:29Z
|
2021-06-28T16:38:29Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620'}
| null |
GHSA
|
GHSA-8w3j-g983-8jh5
|
Sensitive Data Exposure in parse-server
|
Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking.
`ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses.
### For more information
If you have any questions or comments about this advisory,
Open an issue in the [parse-server](https://github.com/parse-community/parse-server)
[Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md)
|
{'CVE-2019-1020013'}
|
2022-04-19T19:02:41Z
|
2019-07-11T14:23:09Z
|
MODERATE
| 5.3
|
{'CWE-209'}
|
{'https://www.npmjs.com/advisories/1114', 'https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002)#Description_of_the_Issue', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-8w3j-g983-8jh5', 'https://github.com/advisories/GHSA-8w3j-g983-8jh5', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637', 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013'}
| null |
GHSA
|
GHSA-chj8-5xgw-wcvj
|
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
|
Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
|
{'CVE-2016-8750'}
|
2021-09-09T18:04:46Z
|
2019-01-07T19:14:46Z
|
MODERATE
| 6.5
|
{'CWE-90'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8750', 'https://access.redhat.com/errata/RHSA-2018:1322', 'https://karaf.apache.org/security/cve-2016-8750.txt', 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj', 'http://www.securityfocus.com/bid/103098'}
| null |
GHSA
|
GHSA-9mrv-456v-pf22
|
Cross-site Scripting in vis-timeline
|
This affects the package vis-timeline before 7.4.4.
An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
|
{'CVE-2020-28487'}
|
2021-04-13T15:19:50Z
|
2021-04-13T15:19:50Z
|
MODERATE
| 6.8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28487', 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500', 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f', 'https://github.com/visjs/vis-timeline/issues/838', 'https://github.com/advisories/GHSA-9mrv-456v-pf22', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502', 'https://github.com/visjs/vis-timeline/pull/840', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501'}
| null |
GHSA
|
GHSA-cxrj-66c5-9fmh
|
Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass
|
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
|
{'CVE-2018-1258'}
|
2022-04-27T15:07:47Z
|
2018-10-17T20:05:49Z
|
HIGH
| 8.8
|
{'CWE-863'}
|
{'https://access.redhat.com/errata/RHSA-2019:2413', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.securitytracker.com/id/1041888', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://pivotal.io/security/cve-2018-1258', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://github.com/advisories/GHSA-cxrj-66c5-9fmh', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1041896', 'http://www.securityfocus.com/bid/104222', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1258'}
| null |
GHSA
|
GHSA-29q4-gxjq-rx5c
|
Remote Code Execution in SCIMono
|
### Impact
It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system.
### Patches
The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19)
|
{'CVE-2021-21479'}
|
2021-11-02T16:11:14Z
|
2021-02-10T02:31:53Z
|
HIGH
| 0
|
{'CWE-690', 'CWE-59', 'CWE-74', 'CWE-917', 'CWE-62', 'CWE-77'}
|
{'https://github.com/advisories/GHSA-29q4-gxjq-rx5c', 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80', 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.