ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-m9mq-p2f9-cfqv
Critical severity vulnerability that affects bleach
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
{'CVE-2018-7753'}
2022-03-04T19:40:00Z
2019-01-04T17:46:30Z
CRITICAL
9.8
{'CWE-20'}
{'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef', 'https://github.com/mozilla/bleach/releases/tag/v2.1.3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753', 'https://bugs.debian.org/892252', 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv'}
null
GHSA
GHSA-2q66-6cc3-6xm8
CSRF issue on preview pages in Bolt CMS
### Impact Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. ### Patches This has been fixed in Bolt 3.7.1 ### References Related issue: https://github.com/bolt/bolt/pull/7853
{'CVE-2020-4040'}
2022-04-19T19:02:27Z
2020-06-09T00:25:41Z
HIGH
8.6
{'CWE-352'}
{'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/advisories/GHSA-2q66-6cc3-6xm8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'http://seclists.org/fulldisclosure/2020/Jul/4', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
null
GHSA
GHSA-9q9m-m2f6-jr5q
Malicious Package in chak
All versions of `chak` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:03:18Z
2020-09-02T20:22:34Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/854', 'https://github.com/advisories/GHSA-9q9m-m2f6-jr5q'}
null
GHSA
GHSA-5q5w-mqp6-g2gh
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0472'}
2022-02-11T20:51:15Z
2022-02-06T00:01:07Z
MODERATE
5.4
{'CWE-434', 'CWE-79'}
{'https://github.com/advisories/GHSA-5q5w-mqp6-g2gh', 'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
null
GHSA
GHSA-fj7f-vq84-fh43
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.
In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. ### Exploitation To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. ### Impact This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags). This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on. ### Patches Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. ### Workarounds Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code. ### References https://cwe.mitre.org/data/definitions/88.html
{'CVE-2021-43809'}
2022-04-19T19:03:17Z
2021-12-08T19:51:36Z
MODERATE
6.7
{'CWE-88'}
{'https://github.com/rubygems/rubygems/pull/5142', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}
null
GHSA
GHSA-25jw-gcfj-283j
Directory Traversal in 360class.jansenhm
Affected versions of `360class.jansenhm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16186'}
2021-01-14T15:40:39Z
2020-09-01T18:27:04Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16186', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/360class.jansenhm', 'https://nodesecurity.io/advisories/448', 'https://github.com/advisories/GHSA-25jw-gcfj-283j', 'https://www.npmjs.com/advisories/448'}
null
GHSA
GHSA-hhrj-wp42-32v3
Generation of Error Message Containing Sensitive Information in microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0660'}
2022-02-28T22:18:01Z
2022-02-19T00:01:36Z
HIGH
7.5
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a', 'https://github.com/advisories/GHSA-hhrj-wp42-32v3', 'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291'}
null
GHSA
GHSA-g2fg-mr77-6vrm
Uncontrolled Resource Consumption in Apache Thrift
In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.
{'CVE-2020-13949'}
2022-02-08T21:37:22Z
2021-03-12T21:33:55Z
HIGH
7.5
{'CWE-400'}
{'https://lists.apache.org/thread.html/rcace846f74ea9e2af2f7c30cef0796724aa74089f109c8029b850163@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rbfbb81e7fb5d5009caf25798f02f42a7bd064a316097303ba2f9ed76@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc7a241e0af086b226ff9ccabc4a243d206f0f887037994bfd8fcaaeb@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r20f6f8f8cf07986dc5304baed3bf4d8a1c4cf135ff6fe3640be4d7ec@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r90b4473950e26607ed77f3d70f120166f6a36a3f80888e4eeabcaf91@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4d90b6d8de9697beb38814596d3a0d4994fa9aba1f6731a2c648d3ae@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r27b7d3d95ffa8498899ef1c9de553d469f8fe857640a3f6e58dba640@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r869331422580d35b4e65bd74cf3090298c4651bf4f31bfb19ae769da@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r533a172534ae67f6f17c4d33a1b814d3d5ada9ccd4eb442249f33fa2@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r1084a911dff90b2733b442ee0f5929d19b168035d447f2d25f534fe4@%3Cissues.solr.apache.org%3E', 'https://github.com/apache/hbase/pull/2958', 'https://lists.apache.org/thread.html/r93f23f74315e009f4fb68ef7fc794dceee42cf87fe6613814dcd8c70@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r8897a41f50d4eb19b268bde99328e943ba586f77779efa6de720c39f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6ae3c68b0bfe430fb32f24236475276b6302bed625b23f53b68748b5@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r143ca388b0c83fe659db14be76889d50b453b0ee06f423181f736933@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r2d180180f37c2ab5cebd711d080d01d8452efa8ad43c5d9cd7064621@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r196409cc4df929d540a2e66169104f2b3b258d8bd96b5f083c59ee51@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r950ced188d62320fdb84d9e2c6ba896328194952eff7430c4f55e4b0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r12090c81b67d21a814de6cf54428934a5e5613fde222759bbb05e99b@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r179119bbfb5610499286a84c316f6789c5afbfa5340edec6eb28d027@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r89fdd39965efb7c6d22bc21c286d203252cea476e1782724aca0748e@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rd0734d91f16d5b050f0bcff78b4719300042a34fadf5e52d0edf898e@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcae4c66f67e701db44d742156dee1f3e5e4e07ad7ce10c740a76b669@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r15eed5d21e16a5cce810c1e096ffcffc36cd08c2f78ce2f9b24b4a6a@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r515e01a30443cfa2dbb355c44c63149869afd684fb7b0344c58fa67b@%3Cissues.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13949', 'https://lists.apache.org/thread.html/r812915ecfa541ad2ca65c68a97b2c014dc87141dfaefc4de85049681@%3Ccommits.camel.apache.org%3E', 'https://security.gentoo.org/glsa/202107-32', 'https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6ba4f0817f98bf7c1cb314301cb7a24ba11a0b3e7a5be8b0ae3190b0@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r886b6d9a89b6fa0aafbf0a8f8f14351548d6c6f027886a3646dbd075@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rf75979ae0ffd526f3afa935a8f0ee13c82808ea8b2bc0325eb9dcd90@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3a1291a7ab8ee43db87cb0253371489810877028fc6e7c68dc640926@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/raea1bb8cf2eb39c5e10543f547bdbbdbb563c2ac6377652f161d4e37@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r17cca685ad53bc8300ee7fcfe874cb784a222343f217dd076e7dc1b6@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd49d53b146d94a7d3a135f6b505589655ffec24ea470e345d31351bb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r9ec75f690dd60fec8621ba992290962705d5b7f0d8fd0a42fab0ac9f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb51977d392b01434b0b5df5c19b9ad5b6178cfea59e676c14f24c053@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/rd78cdd87d84499a404202f015f55935db3658bd0983ecec81e6b18c6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r72c3d1582d50b2ca7dd1ee97e81c847a5cf3458be26d42653c39d7a6@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r635133a74fa07ef3331cae49a9a088365922266edd58099a6162a5d3@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3f3e1d562c528b4bafef2dde51f79dd444a4b68ef24920d68068b6f9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb91c32194eb5006f0b0c8bcdbd512c13495a1b277d4d51d45687f036@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r62aa6d07b23095d980f348d330ed766560f9a9e940fec051f534ce37@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r741364444c3b238ab4a161f67f0d3a8f68acc517a39e6a93aa85d753@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-g2fg-mr77-6vrm', 'https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r13f40151513ff095a44a86556c65597a7e55c00f5e19764a05530266@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/ra9f7c755790313e1adb95d29794043fb102029e803daf4212ae18063@%3Cissues.solr.apache.org%3E'}
null
GHSA
GHSA-jp4x-w63m-7wgm
Prototype Pollution in hoek
Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution. The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property. This can be demonstrated like so: ```javascript var Hoek = require('hoek'); var malicious_payload = '{"__proto__":{"oops":"It works !"}}'; var a = {}; console.log("Before : " + a.oops); Hoek.merge({}, JSON.parse(malicious_payload)); console.log("After : " + a.oops); ``` This type of attack can be used to overwrite existing properties causing a potential denial of service. ## Recommendation Update to version 4.2.1, 5.0.3 or later.
{'CVE-2018-3728'}
2021-01-08T18:33:00Z
2018-04-26T15:25:17Z
MODERATE
0
{'CWE-471'}
{'https://access.redhat.com/errata/RHSA-2018:1264', 'https://nodesecurity.io/advisories/566', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3728', 'https://www.npmjs.com/advisories/566', 'https://hackerone.com/reports/310439', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://snyk.io/vuln/npm:hoek:20180212', 'http://www.securityfocus.com/bid/103108', 'https://github.com/advisories/GHSA-jp4x-w63m-7wgm', 'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'}
null
GHSA
GHSA-883x-6fch-6wjx
Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares
### Impact This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn allows disabling Ares and having full control over the system. ### Patches Update to version `1.7.6` or later. ### Workarounds Forbid student classes in trusted packages like, e.g., described in https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371 ### References _Are there any links users can visit to find out more?_ Not that I know of. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/ls1intum/Ares/issues * Email us, see https://github.com/ls1intum/Ares/security/policy ### Detailed description Using generics, it is possible to throw checked exceptions without a `throws` clause: <details> <summary>ThrowWithoutThrowsHelper</summary> ```java public class ThrowWithoutThrowsHelper<X extends Throwable> { private final X throwable; private ThrowWithoutThrowsHelper(X throwable) { this.throwable = throwable; } private <R> R throwWithThrows() throws X { throw throwable; } public static <R> R throwWithoutThrows(Throwable throwable) { ThrowWithoutThrowsHelper<?> helper = new ThrowWithoutThrowsHelper<Throwable>(throwable); @SuppressWarnings("unchecked") ThrowWithoutThrowsHelper<RuntimeException> helperCasted = (ThrowWithoutThrowsHelper<RuntimeException>) helper; return helperCasted.throwWithThrows(); } } ``` </details> Using this, it is possible for a malicious testee to throw an instance of a malicious subclass of `InvocationTargetException` (let's call it `EvilInvocationTargetException`). This exception is catched by `org.junit.platform.commons.util.ReflectionUtils::invokeMethod`, which looks like this: <details> <summary>ReflectionUtils::invokeMethod</summary> ```java public static Object invokeMethod(Method method, Object target, Object... args) { Preconditions.notNull(method, "Method must not be null"); Preconditions.condition((target != null || isStatic(method)), () -> String.format("Cannot invoke non-static method [%s] on a null target.", method.toGenericString())); try { return makeAccessible(method).invoke(target, args); } catch (Throwable t) { throw ExceptionUtils.throwAsUncheckedException(getUnderlyingCause(t)); } } ``` </details> This method calls `getUnderlyingCause` (of the same class), passing to it the catched, malicious exception as an argument. <details> <summary>ReflectionUtils::getUnderlyingCause</summary> ```java private static Throwable getUnderlyingCause(Throwable t) { if (t instanceof InvocationTargetException) { return getUnderlyingCause(((InvocationTargetException) t).getTargetException()); } return t; } ``` </details> `getUnderlyingCause` in turn checks if the passed exception is `instanceof InvocationTargetException`, and if so, calls `getTargetException` on it. `getTargetException` can be overridden by subclasses of `InvocationTargetException`, like the `EvilInvocationTargetException`. If `EvilInvocationTargetException` is in a whitelisted package (for example `de.tum.in.test.api.security.notsealedsubpackage`), `getTargetException` will be called with the entire stack containing only whitelisted frames. This allows the attacker to uninstall the `ArtemisSecurityManager` in `EvilInvocationTargetException::getTargetException`: <details> <summary>Uninstalling ArtemisSecurityManager</summary> ```java SecurityManager secman = System.getSecurityManager(); Class<?> aresSecmanClass = secman.getClass(); Field isPartlyDisabledF = aresSecmanClass.getDeclaredField("isPartlyDisabled"); isPartlyDisabledF.setAccessible(true); isPartlyDisabledF.set(secman, true); System.setSecurityManager(null); ``` </details> After uninstalling `ArtemisSecurityManager`, the attacker is free to do anything expressible in Java; including reading and writing any files, opening network connections, and executing arbitrary shell commands.
null
2022-04-19T19:03:18Z
2022-01-21T23:39:19Z
HIGH
8.2
null
{'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/releases/tag/1.7.6', 'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392', 'https://github.com/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371'}
null
GHSA
GHSA-6x3j-x9rp-whxp
Unrestricted Upload of File with Dangerous Type in showdoc
showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0409'}
2022-03-02T20:59:35Z
2022-02-20T00:00:32Z
HIGH
7.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436', 'https://github.com/advisories/GHSA-6x3j-x9rp-whxp', 'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7'}
null
GHSA
GHSA-hwhf-64mh-r662
ReDoS vulnerability in parser_apache2
### Impact parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. ### Patches v1.14.2 ### Workarounds Either of the following: * Don't use parser_apache2 for parsing logs which cannot guarantee generated by Apache. * Put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd). ### References * [CVE-2021-41186](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41186) * [GHSA-hwhf-64mh-r662](https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662) * [GHSL-2021-102](https://securitylab.github.com/advisories/GHSL-2021-102-fluent-fluentd/) * https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142
{'CVE-2021-41186'}
2021-11-04T17:05:51Z
2021-11-01T19:16:31Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41186', 'https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142', 'https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md', 'https://github.com/advisories/GHSA-hwhf-64mh-r662'}
null
GHSA
GHSA-pfmw-vj74-ph8g
Incorrect Permission Assignment for Critical Resource in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
{'CVE-2021-43998'}
2021-12-02T17:48:31Z
2021-12-02T17:48:30Z
CRITICAL
9.1
{'CWE-732'}
{'https://github.com/advisories/GHSA-pfmw-vj74-ph8g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43998', 'https://discuss.hashicorp.com/t/hcsec-2021-30-vaults-templated-acl-policies-matched-first-created-alias-per-entity-and-auth-backend/32132'}
null
GHSA
GHSA-9gr3-7897-pp7m
XSS in Image Optimization API for Next.js
### Impact - **Affected:** All of the following must be true to be affected - Next.js between version 10.0.0 and 11.1.0 - The `next.config.js` file has [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) array assigned - The image host assigned in [`images.domains`](https://nextjs.org/docs/basic-features/image-optimization#domains) allows user-provided SVG - **Not affected**: The `next.config.js` file has [`images.loader`](https://nextjs.org/docs/basic-features/image-optimization#loader) assigned to something other than default - **Not affected**: Deployments on [Vercel](https://vercel.com) are not affected ### Patches [Next.js v11.1.1](https://github.com/vercel/next.js/releases/tag/v11.1.1)
{'CVE-2021-39178'}
2021-09-01T19:37:34Z
2021-09-01T18:24:22Z
HIGH
7.5
{'CWE-79'}
{'https://github.com/vercel/next.js/security/advisories/GHSA-9gr3-7897-pp7m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39178', 'https://github.com/advisories/GHSA-9gr3-7897-pp7m', 'https://github.com/vercel/next.js/releases/tag/v11.1.1'}
null
GHSA
GHSA-72wf-hwcq-65h9
Cross-Site Request Forgery in Filebrowser
A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim.
{'CVE-2021-46398'}
2022-02-16T22:05:45Z
2022-02-05T00:00:31Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46398', 'http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html', 'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d', 'https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://febinj.medium.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://github.com/advisories/GHSA-72wf-hwcq-65h9', 'https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html', 'https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/'}
null
GHSA
GHSA-6x85-j5j2-27jx
Moderate severity vulnerability that affects actionpack
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
{'CVE-2014-0130'}
2021-09-02T19:11:28Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-22'}
{'http://www.securityfocus.com/bid/67244', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://github.com/advisories/GHSA-6x85-j5j2-27jx', 'http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf'}
null
GHSA
GHSA-v85c-hgq5-7pfw
Arbitrary Command Injection
This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23399'}
2021-07-02T16:59:32Z
2021-06-29T18:26:05Z
CRITICAL
9.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23399', 'https://github.com/rolangom/wincred/blob/3fd39186ee32add9c12046cdccf2765d19565335/index.ts%23L20', 'https://github.com/advisories/GHSA-v85c-hgq5-7pfw', 'https://snyk.io/vuln/SNYK-JS-WINCRED-1078538'}
null
GHSA
GHSA-c3hq-7mxh-mqxf
Sandbox Breakout / Arbitrary Code Execution in lighter-vm
All versions of `lighter-vm` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-04T14:59:51Z
2020-09-04T14:59:50Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-c3hq-7mxh-mqxf', 'https://www.npmjs.com/advisories/1317'}
null
GHSA
GHSA-26q7-g57v-mxcp
HTML Injection in shout
Affected versions of `shout` do not escape the `/topic` command in messages, and are therefore vulnerable to cross-site scripting. ## Recommendation Update to version 0.50.0 or later.
{'CVE-2017-16043'}
2021-01-08T20:09:56Z
2018-11-07T00:28:11Z
MODERATE
0
{'CWE-80'}
{'https://github.com/erming/shout/pull/344', 'https://github.com/advisories/GHSA-26q7-g57v-mxcp', 'https://nodesecurity.io/advisories/322', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16043', 'https://www.npmjs.com/advisories/322'}
null
GHSA
GHSA-hhrp-qm88-xjr3
Moderate severity vulnerability that affects valine
An issue was discovered in Valine v1.3.3. It allows HTML injection, which can be exploited for JavaScript execution via an EMBED element in conjunction with a .pdf file.
{'CVE-2018-19289'}
2021-09-14T17:21:11Z
2018-11-21T22:19:41Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/xCss/Valine/issues/127', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19289', 'https://github.com/advisories/GHSA-hhrp-qm88-xjr3'}
null
GHSA
GHSA-36vc-cw62-fqvr
Hijacked Environment Variables in shadowsock
The `shadowsock` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16078'}
2021-01-08T20:03:31Z
2018-08-27T19:07:23Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-36vc-cw62-fqvr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16078', 'https://nodesecurity.io/advisories/517', 'https://www.npmjs.com/advisories/517'}
null
GHSA
GHSA-gfr2-qpxh-qj9m
Path Traversal in Ansible
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
{'CVE-2020-1735'}
2022-05-05T21:55:28Z
2021-04-07T20:35:24Z
MODERATE
4.6
{'CWE-22'}
{'https://security.gentoo.org/glsa/202006-11', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/', 'https://github.com/ansible/ansible/issues/67793', 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes-7', 'https://github.com/advisories/GHSA-gfr2-qpxh-qj9m', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}
null
GHSA
GHSA-gvpx-9459-w3mj
Cross-Site Scripting in @ckeditor/ckeditor5-link
Versions of `status-board` prior to 10.0.1 are vulnerable to Cross-Site Scripting. The `_createPreviewButton()` function fails to sanitize the `href` attribute of a created `<a>` tag. This may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 10.0.1 or later.
{'CVE-2018-11093'}
2021-09-13T13:35:55Z
2018-05-23T20:37:46Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/1154', 'https://github.com/ckeditor/ckeditor5-link/blob/master/CHANGELOG.md#1001-2018-05-22', 'https://ckeditor.com/blog/CKEditor-5-v10.0.1-released/', 'https://github.com/advisories/GHSA-gvpx-9459-w3mj', 'https://snyk.io/vuln/SNYK-JS-CKEDITORCKEDITOR5LINK-72892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11093'}
null
GHSA
GHSA-wpw7-wxjm-cw8r
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
{'CVE-2013-6417'}
2021-09-21T21:52:53Z
2017-10-24T18:33:36Z
MODERATE
0
null
{'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://rhn.redhat.com/errata/RHSA-2014-0469.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417', 'https://puppet.com/security/cve/cve-2013-6417', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ', 'https://github.com/advisories/GHSA-wpw7-wxjm-cw8r', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}
null
GHSA
GHSA-m929-7fr6-cvjg
Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability caused by improper restriction of XML external entity references
Spring Data Commons, versions 1.13 prior to 1.13.12 and 2.0 prior to 2.0.7, used in combination with XMLBeam 1.4.14 or earlier versions, contains a property binder vulnerability caused by improper restriction of XML external entity references as underlying library XMLBeam does not restrict external reference expansion. An unauthenticated remote malicious user can supply specially crafted request parameters against Spring Data's projection-based request payload binding to access arbitrary files on the system.
{'CVE-2018-1259'}
2022-04-27T13:58:01Z
2018-10-17T17:23:36Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/advisories/GHSA-m929-7fr6-cvjg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1259', 'https://access.redhat.com/errata/RHSA-2018:1809', 'https://pivotal.io/security/cve-2018-1259', 'https://access.redhat.com/errata/RHSA-2018:3768'}
null
GHSA
GHSA-ffvq-7w96-97p7
Denial of Service in Spring Framework
Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.
{'CVE-2018-15756'}
2021-10-21T21:26:45Z
2020-06-15T19:34:50Z
HIGH
7.5
null
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/bb354962cb51fff65740d5fb1bc2aac56af577c06244b57c36f98e4d@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/d6a84f52db89804b0ad965f3ea2b24bb880edee29107a1c5069cc3dd@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/77886fec378ee6064debb1efb6b464a4a0173b2ff0d151ed86d3a228@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html', 'https://lists.apache.org/thread.html/efaa52b0aa67aae7cbd9e6ef96945387e422d7ce0e65434570a37b1d@%3Cissues.activemq.apache.org%3E', 'https://pivotal.io/security/cve-2018-15756', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15756', 'https://github.com/advisories/GHSA-ffvq-7w96-97p7', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/a3071e11c6fbd593022074ec1b4693f6d948c2b02cfa4a5d854aed68@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/339fd112517e4873695b5115b96acdddbfc8f83b10598528d37c7d12@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/8a1fe70534fc52ff5c9db5ac29c55657f802cbefd7e9d9850c7052bd@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.securityfocus.com/bid/105703', 'https://lists.apache.org/thread.html/f8905507a2c94af6b08b72d7be0c4b8c6660e585f00abfafeccc86bc@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/7b156ee50ba3ecce87b33c06bf7a749d84ffee55e69bfb5eca88fcc3@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-6p5r-g9mq-ggh2
Reference binding to nullptr in `MatrixSetDiagV*` ops
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`: ```python import tensorflow as tf tf.raw_ops.MatrixSetDiagV3( input=[1,2,3], diagonal=[1,1], k=[], align='RIGHT_LEFT') ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong: ```cc auto& diag_index = context->input(1); ... lower_diag_index = diag_index.flat<int32>()(0); ``` ### Patches We have patched the issue in GitHub commit [ff8894044dfae5568ecbf2ed514c1a37dc394f1b](https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37658'}
2021-08-25T14:42:49Z
2021-08-25T14:42:49Z
HIGH
7.1
{'CWE-824'}
{'https://github.com/advisories/GHSA-6p5r-g9mq-ggh2', 'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37658', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2'}
null
GHSA
GHSA-6cf8-qhqj-vjqm
Prototype pollution in total.js
There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
{'CVE-2020-28495'}
2021-02-05T20:43:19Z
2021-02-05T20:43:19Z
HIGH
0
{'CWE-400'}
{'https://github.com/totaljs/framework/blob/master/utils.js%23L6617', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28495', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671', 'https://github.com/advisories/GHSA-6cf8-qhqj-vjqm', 'https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set', 'https://www.npmjs.com/package/total.js', 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'}
null
GHSA
GHSA-crf7-fvjx-863q
Path Traversal in zero
Versions of `zero` prior to 1.0.6 are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation Upgrade to version 1.0.6 or later.
null
2021-09-28T21:18:23Z
2020-09-03T17:09:26Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-crf7-fvjx-863q', 'https://www.npmjs.com/advisories/1025'}
null
GHSA
GHSA-6wpv-cj6x-v3jw
Moderate severity vulnerability that affects http
The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
{'CVE-2015-1828'}
2021-09-02T18:34:58Z
2018-03-13T16:15:57Z
MODERATE
5.9
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-1828', 'https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU', 'https://github.com/ruby/openssl/issues/8', 'https://rubysec.com/advisories/http-CVE-2015-1828', 'https://github.com/advisories/GHSA-6wpv-cj6x-v3jw'}
null
GHSA
GHSA-c9f3-9wfr-wgh7
Lack of validation in data format attributes in TensorFlow
### Impact The `tf.raw_ops.DataFormatVecPermute` API does not validate the `src_format` and `dst_format` attributes. [The code](https://github.com/tensorflow/tensorflow/blob/304b96815324e6a73d046df10df6626d63ac12ad/tensorflow/core/kernels/data_format_ops.cc) assumes that these two arguments define a permutation of `NHWC`. However, these assumptions are not checked and this can result in uninitialized memory accesses, read outside of bounds and even crashes. ```python >>> import tensorflow as tf >>> tf.raw_ops.DataFormatVecPermute(x=[1,4], src_format='1234', dst_format='1234') <tf.Tensor: shape=(2,), dtype=int32, numpy=array([4, 757100143], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[1,4], src_format='HHHH', dst_format='WWWW') <tf.Tensor: shape=(2,), dtype=int32, numpy=array([4, 32701], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[1,4], src_format='H', dst_format='W') <tf.Tensor: shape=(2,), dtype=int32, numpy=array([4, 32701], dtype=int32)> >>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4], src_format='1234', dst_format='1253') <tf.Tensor: shape=(4,), dtype=int32, numpy=array([4, 2, 939037184, 3], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4], src_format='1234', dst_format='1223') <tf.Tensor: shape=(4,), dtype=int32, numpy=array([4, 32701, 2, 3], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4], src_format='1224', dst_format='1423') <tf.Tensor: shape=(4,), dtype=int32, numpy=array([1, 4, 3, 32701], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4], src_format='1234', dst_format='432') <tf.Tensor: shape=(4,), dtype=int32, numpy=array([4, 3, 2, 32701], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[1,2,3,4], src_format='12345678', dst_format='87654321') munmap_chunk(): invalid pointer Aborted ... >>> tf.raw_ops.DataFormatVecPermute(x=[[1,5],[2,6],[3,7],[4,8]], src_format='12345678', dst_format='87654321') <tf.Tensor: shape=(4, 2), dtype=int32, numpy= array([[71364624, 0], [71365824, 0], [ 560, 0], [ 48, 0]], dtype=int32)> ... >>> tf.raw_ops.DataFormatVecPermute(x=[[1,5],[2,6],[3,7],[4,8]], src_format='12345678', dst_format='87654321') free(): invalid next size (fast) Aborted ``` A similar issue occurs in `tf.raw_ops.DataFormatDimMap`, for the same reasons: ```python >>> tf.raw_ops.DataFormatDimMap(x=[[1,5],[2,6],[3,7],[4,8]], src_format='1234', >>> dst_format='8765') <tf.Tensor: shape=(4, 2), dtype=int32, numpy= array([[1954047348, 1954047348], [1852793646, 1852793646], [1954047348, 1954047348], [1852793632, 1852793632]], dtype=int32)> ``` ### Patches We have patched the issue in GitHub commit [ebc70b7a592420d3d2f359e4b1694c236b82c7ae](https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-26267'}
2021-08-26T15:20:59Z
2020-12-10T19:07:26Z
LOW
4.4
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26267', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae'}
null
GHSA
GHSA-m6mm-q862-j366
Improper Input Validation in Keycloak
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
{'CVE-2020-1714'}
2022-02-09T00:56:14Z
2022-02-09T00:56:14Z
MODERATE
8.8
{'CWE-20'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1714', 'https://github.com/advisories/GHSA-m6mm-q862-j366', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1714', 'https://github.com/keycloak/keycloak/pull/7053'}
null
GHSA
GHSA-hjxc-462x-x77j
TOCTOU Race Condition in Yarn
The package integrity validation in yarn &lt; 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It&#39;s not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0.
{'CVE-2019-15608'}
2022-02-09T22:49:38Z
2022-02-09T22:49:38Z
MODERATE
5.9
{'CWE-367'}
{'https://github.com/advisories/GHSA-hjxc-462x-x77j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608', 'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c', 'https://hackerone.com/reports/703138', 'https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190'}
null
GHSA
GHSA-2p69-gxpm-5469
Downloads Resources over HTTP in alto-saxophone
Affected versions of `alto-saxophone` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `alto-saxophone`. ## Recommendation Update to version 2.25.1 or later.
{'CVE-2016-10694'}
2021-01-08T20:06:56Z
2018-07-31T22:34:45Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/172', 'https://github.com/advisories/GHSA-2p69-gxpm-5469', 'https://nodesecurity.io/advisories/172', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10694'}
null
GHSA
GHSA-5x7p-gm79-383m
Malicious Package in regenraotr
All versions of `regenraotr` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:28:52Z
2020-09-01T21:11:57Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-5x7p-gm79-383m', 'https://www.npmjs.com/advisories/684'}
null
GHSA
GHSA-p4c6-77gc-694x
Moderate severity vulnerability that affects rails
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
{'CVE-2007-6077'}
2021-09-15T21:29:44Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-362'}
{'http://www.vupen.com/english/advisories/2007/4009', 'https://github.com/advisories/GHSA-p4c6-77gc-694x', 'http://secunia.com/advisories/27781', 'http://www.securityfocus.com/bid/26598', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077', 'http://secunia.com/advisories/28136', 'http://docs.info.apple.com/article.html?artnum=307179', 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release', 'http://dev.rubyonrails.org/changeset/8177', 'http://dev.rubyonrails.org/ticket/10048', 'http://www.vupen.com/english/advisories/2007/4238', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}
null
GHSA
GHSA-gq5r-cc4w-g8xf
Denial of Service (DoS)
This affects all versions up to and including 0.6.0 of package github.com/russellhaering/gosaml2. There is a crash on nil-pointer dereference caused by sending malformed XML signatures.
{'CVE-2020-7731'}
2021-06-23T17:25:08Z
2021-06-23T17:25:08Z
HIGH
7.5
{'CWE-476'}
{'https://github.com/russellhaering/gosaml2/issues/59', 'https://github.com/advisories/GHSA-gq5r-cc4w-g8xf', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUSSELLHAERINGGOSAML2-608302', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7731'}
null
GHSA
GHSA-4fg4-p75j-w5xj
Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization`
### Impact An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`: ```python import tensorflow as tf t = tf.constant([1], shape=[1, 1, 1, 1], dtype=tf.quint8) t_min = tf.constant([], shape=[0], dtype=tf.float32) t_max = tf.constant([], shape=[0], dtype=tf.float32) m = tf.constant([1], shape=[1], dtype=tf.quint8) m_min = tf.constant([], shape=[0], dtype=tf.float32) m_max = tf.constant([], shape=[0], dtype=tf.float32) v = tf.constant([1], shape=[1], dtype=tf.quint8) v_min = tf.constant([], shape=[0], dtype=tf.float32) v_max = tf.constant([], shape=[0], dtype=tf.float32) beta = tf.constant([1], shape=[1], dtype=tf.quint8) beta_min = tf.constant([], shape=[0], dtype=tf.float32) beta_max = tf.constant([], shape=[0], dtype=tf.float32) gamma = tf.constant([1], shape=[1], dtype=tf.quint8) gamma_min = tf.constant([], shape=[0], dtype=tf.float32) gamma_max = tf.constant([], shape=[0], dtype=tf.float32) tf.raw_ops.QuantizedBatchNormWithGlobalNormalization( t=t, t_min=t_min, t_max=t_max, m=m, m_min=m_min, m_max=m_max, v=v, v_min=v_min, v_max=v_max, beta=beta, beta_min=beta_min, beta_max=beta_max, gamma=gamma, gamma_min=gamma_min, gamma_max=gamma_max, out_type=tf.qint32, variance_epsilon=0.1, scale_after_normalization=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc#L176-L189) assumes the inputs are not empty: ```cc const float input_min = context->input(1).flat<float>()(0); const float input_max = context->input(2).flat<float>()(0); ... const float mean_min = context->input(4).flat<float>()(0); const float mean_max = context->input(5).flat<float>()(0); ... const float var_min = context->input(7).flat<float>()(0); const float var_max = context->input(8).flat<float>()(0); ... const float beta_min = context->input(10).flat<float>()(0); const float beta_max = context->input(11).flat<float>()(0); ... const float gamma_min = context->input(13).flat<float>()(0); const float gamma_max = context->input(14).flat<float>()(0); ``` If any of these inputs is empty, `.flat<T>()` is an empty buffer, so accessing the element at index 0 is accessing data outside of bounds. ### Patches We have patched the issue in GitHub commit [d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b](https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29547'}
2021-05-21T14:23:31Z
2021-05-21T14:23:31Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29547'}
null
GHSA
GHSA-9hx7-rg7w-xm79
XSS vulnerability in company name field in Mautic
### Impact Mautic version 2.11.0 and earlier contains a Cross Site Scripting (XSS) vulnerability in Company's name that can result in denial of service and execution of javascript code. ### Patches Update to 2.14.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-11200'}
2022-04-19T19:02:45Z
2021-01-19T21:16:26Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/mautic/mautic/releases/tag/2.14.0', 'https://github.com/advisories/GHSA-9hx7-rg7w-xm79', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11200', 'https://github.com/mautic/mautic/security/advisories/GHSA-9hx7-rg7w-xm79'}
null
GHSA
GHSA-2cf5-4w76-r9qv
Arbitrary Code Execution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.5.2 are vulnerable to Arbitrary Code Execution. The package's lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript in the system. It can be used to run arbitrary code in a server processing Handlebars templates or on a victim's browser (effectively serving as Cross-Site Scripting). The following template can be used to demonstrate the vulnerability: ```{{#with "constructor"}} {{#with split as |a|}} {{pop (push "alert('Vulnerable Handlebars JS');")}} {{#with (concat (lookup join (slice 0 1)))}} {{#each (slice 2 3)}} {{#with (apply 0 a)}} {{.}} {{/with}} {{/each}} {{/with}} {{/with}} {{/with}}``` ## Recommendation Upgrade to version 3.0.8, 4.5.2 or later.
null
2020-09-04T14:57:38Z
2020-09-04T14:57:38Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1316', 'https://github.com/advisories/GHSA-2cf5-4w76-r9qv'}
null
GHSA
GHSA-j86v-p27c-73fm
Unitialized access in `EinsumHelper::ParseEquation`
### Impact During execution, [`EinsumHelper::ParseEquation()`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/linalg/einsum_op_impl.h#L126-L181) is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whether there is ellipsis in the corresponding inputs and output. However, the code only changes these flags to `true` and never assigns `false`. ```cc for (int i = 0; i < num_inputs; ++i) { input_label_counts->at(i).resize(num_labels); for (const int label : input_labels->at(i)) { if (label != kEllipsisLabel) input_label_counts->at(i)[label] += 1; else input_has_ellipsis->at(i) = true; } } output_label_counts->resize(num_labels); for (const int label : *output_labels) { if (label != kEllipsisLabel) output_label_counts->at(label) += 1; else *output_has_ellipsis = true; } ``` This results in unitialized variable access if callers assume that `EinsumHelper::ParseEquation()` always sets these flags. ### Patches We have patched the issue in GitHub commit [f09caa532b6e1ac8d2aa61b7832c78c5b79300c6](https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-41201'}
2021-11-10T19:17:43Z
2021-11-10T19:17:43Z
HIGH
7.8
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41201', 'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm', 'https://github.com/advisories/GHSA-j86v-p27c-73fm'}
null
GHSA
GHSA-22hc-47cc-7x6f
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
{'CVE-2022-0894'}
2022-03-29T21:21:30Z
2022-03-16T00:00:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-22hc-47cc-7x6f', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'}
null
GHSA
GHSA-v6w3-2prq-h95f
Improper Input Validation in Jakarta Expression Language
In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.
{'CVE-2021-28170'}
2022-04-26T18:07:57Z
2021-10-06T17:48:38Z
MODERATE
5.3
{'CWE-917', 'CWE-20'}
{'https://github.com/eclipse-ee4j/el-ri/issues/155', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-v6w3-2prq-h95f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170', 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/', 'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}
null
GHSA
GHSA-cfpj-3q4c-jhvr
Division by zero in TFLite
### Impact The implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226): ```cc const int batch_size = input_size / filter->dims->data[1]; ``` An attacker can craft a model such that `filter->dims->data[1]` is 0. ### Patches We have patched the issue in GitHub commit [718721986aa137691ee23f03638867151f74935f](https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it has also been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37680'}
2021-08-25T14:40:38Z
2021-08-25T14:40:38Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f', 'https://github.com/advisories/GHSA-cfpj-3q4c-jhvr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37680', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr'}
null
GHSA
GHSA-649c-x44h-4q7v
Low severity vulnerability that affects public
A XSS vulnerability was found in module public <0.1.4 that allows malicious Javascript code to run in the browser, due to the absence of sanitization of the file/folder names before rendering.
{'CVE-2018-16480'}
2021-01-08T19:47:32Z
2019-02-07T18:14:37Z
LOW
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-649c-x44h-4q7v', 'https://hackerone.com/reports/329950', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16480', 'https://www.npmjs.com/package/public'}
null
GHSA
GHSA-gpvj-q7fp-jcch
Moderate severity vulnerability that affects simplehttpserver
Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server.
{'CVE-2018-3787'}
2021-01-08T18:45:46Z
2018-09-06T03:22:59Z
MODERATE
0
{'CWE-22'}
{'https://hackerone.com/reports/357109', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3787', 'https://github.com/advisories/GHSA-gpvj-q7fp-jcch'}
null
GHSA
GHSA-3pxh-h8hw-mj8w
Moderate severity vulnerability that affects rack
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
{'CVE-2013-0183'}
2021-08-31T21:21:31Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-119'}
{'http://www.debian.org/security/2013/dsa-2783', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=895282', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183', 'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI', 'http://rack.github.com/'}
null
GHSA
GHSA-wcm2-9c89-wmfm
Cross-site Scripting in jquery-ui
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
{'CVE-2010-5312'}
2022-01-20T15:38:29Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://www.securityfocus.com/bid/71106', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312', 'https://github.com/advisories/GHSA-wcm2-9c89-wmfm', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'http://www.debian.org/security/2015/dsa-3249', 'http://www.securitytracker.com/id/1037035', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://seclists.org/oss-sec/2014/q4/616', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696', 'https://www.drupal.org/sa-core-2022-002', 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3', 'http://seclists.org/oss-sec/2014/q4/613', 'http://bugs.jqueryui.com/ticket/6016'}
null
GHSA
GHSA-jvf5-q4h5-2jmj
Prototype Pollution in madlib-object-utils
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
{'CVE-2020-7701'}
2021-07-29T21:55:23Z
2021-05-06T17:28:57Z
CRITICAL
9.8
{'CWE-915'}
{'https://github.com/advisories/GHSA-jvf5-q4h5-2jmj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7701', 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676'}
null
GHSA
GHSA-43g8-79x3-j898
Unrestricted access to predictable file paths in hov/jobfair
An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).
{'CVE-2021-43564'}
2021-11-17T21:24:12Z
2021-11-15T17:36:22Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-43g8-79x3-j898', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43564', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-018'}
null
GHSA
GHSA-54hw-mhgh-x4vc
Business Logic Errors in pimcore
In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior.
{'CVE-2021-4146'}
2022-01-26T22:09:49Z
2022-01-26T22:09:49Z
MODERATE
4.3
null
{'https://github.com/pimcore/pimcore/pull/11206', 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/advisories/GHSA-54hw-mhgh-x4vc'}
null
GHSA
GHSA-5v72-xg48-5rpm
Denial of Service in ws
Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent. ## Proof of concept ``` const WebSocket = require('ws'); const net = require('net'); const wss = new WebSocket.Server({ port: 3000 }, function () { const payload = 'constructor'; // or ',;constructor' const request = [ 'GET / HTTP/1.1', 'Connection: Upgrade', 'Sec-WebSocket-Key: test', 'Sec-WebSocket-Version: 8', `Sec-WebSocket-Extensions: ${payload}`, 'Upgrade: websocket', '\r\n' ].join('\r\n'); const socket = net.connect(3000, function () { socket.resume(); socket.write(request); }); }); ``` ## Recommendation Update to version 3.3.1 or later.
null
2021-08-04T21:29:06Z
2019-06-04T19:37:52Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/npm:ws:20171108', 'https://www.npmjs.com/advisories/550/versions', 'https://github.com/advisories/GHSA-5v72-xg48-5rpm', 'https://www.npmjs.com/advisories/550', 'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a', 'https://nodesecurity.io/advisories/550'}
null
GHSA
GHSA-fwcw-5qw2-87mp
Cross-Site Scripting in fuelux
Affected versions of `fuelux` contain a cross-site scripting vulnerability in the Pillbox feature. By supplying a script as a value for a new pillbox, it is possible to cause arbitrary script execution. ## Recommendation Update to version 3.15.7 or later.
{'CVE-2016-1000235'}
2021-09-23T21:34:24Z
2020-09-01T15:55:56Z
HIGH
0
{'CWE-79'}
{'https://github.com/ExactTarget/fuelux/issues/1841', 'https://github.com/ExactTarget/fuelux/pull/1856', 'https://github.com/advisories/GHSA-fwcw-5qw2-87mp', 'https://www.npmjs.com/advisories/133', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000235'}
null
GHSA
GHSA-hhw2-pqhf-vmx2
Use after free in actix-utils
An issue was discovered in the actix-utils crate before 2.0.0 for Rust. The Cell implementation allows obtaining more than one mutable reference to the same data.
{'CVE-2020-35898'}
2021-08-25T20:49:09Z
2021-08-25T20:49:09Z
CRITICAL
9.1
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35898', 'https://rustsec.org/advisories/RUSTSEC-2020-0045.html', 'https://github.com/advisories/GHSA-hhw2-pqhf-vmx2', 'https://github.com/actix/actix-net/issues/160'}
null
GHSA
GHSA-2p62-c4rm-mr72
Malicious Package in another-date-picker
Version 2.0.43 of `another-date-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 2.0.43 of this module is found installed you will want to replace it with a version before or after 2.0.43. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:50:57Z
2020-09-01T19:44:57Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/kekeh/mydatepicker', 'https://github.com/advisories/GHSA-2p62-c4rm-mr72', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATEPICKER-451013', 'https://www.npmjs.com/advisories/616', 'https://github.com/bi-a/mydatepicker'}
null
GHSA
GHSA-36c4-4r89-6whg
Prototype Pollution in @commercial/subtext
Versions of `@commercial/subtext` prior to 5.1.2 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. ## Recommendation Upgrade to version 5.1.2 or later.
null
2021-10-04T21:05:04Z
2020-09-03T15:49:02Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-36c4-4r89-6whg', 'https://www.npmjs.com/advisories/1484'}
null
GHSA
GHSA-7mpx-vg3c-cmr4
Improper Authentication in react-adal
This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.
{'CVE-2020-7787'}
2021-04-13T15:22:37Z
2021-04-13T15:22:37Z
HIGH
8.2
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7787', 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9', 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907', 'https://github.com/salvoravida/react-adal/pull/115', 'https://github.com/advisories/GHSA-7mpx-vg3c-cmr4'}
null
GHSA
GHSA-f2j6-wrhh-v25m
High severity vulnerability that affects paramiko
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
{'CVE-2018-1000805'}
2022-04-07T15:08:23Z
2018-10-10T16:10:10Z
HIGH
8.8
{'CWE-863', 'CWE-732'}
{'https://github.com/paramiko/paramiko/issues/1283', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000805', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html', 'https://github.com/advisories/GHSA-f2j6-wrhh-v25m', 'https://access.redhat.com/errata/RHBA-2018:3497', 'https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt', 'https://access.redhat.com/errata/RHSA-2018:3505', 'https://usn.ubuntu.com/3796-3/', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html', 'https://usn.ubuntu.com/3796-1/', 'https://access.redhat.com/errata/RHSA-2018:3406', 'https://usn.ubuntu.com/3796-2/', 'https://access.redhat.com/errata/RHSA-2018:3347'}
null
GHSA
GHSA-25xm-hr59-7c27
Release v0.5.8 of github.com/ulikunitz/xz fixes readUvarint denial of service
### Impact The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. ### Patches The problem has been fixed in release v0.5.8. ### Workarounds Limit the size of the compressed file input to a reasonable size for your use case. ### References The standard library had recently the same issue and got the [CVE-2020-16845](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845) allocated. ### For more information If you have any questions or comments about this advisory: * Open an issue in [xz](https://github.com/ulikunitz/xz/issues).
{'CVE-2021-29482'}
2022-04-19T19:02:33Z
2021-05-25T18:39:37Z
HIGH
7.5
{'CWE-835'}
{'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://github.com/advisories/GHSA-25xm-hr59-7c27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29482'}
null
GHSA
GHSA-9vvp-fxw6-jcxr
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
{'CVE-2020-11113'}
2021-10-21T21:11:15Z
2020-05-15T18:58:47Z
HIGH
8.8
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2670', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11113', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-9vvp-fxw6-jcxr'}
null
GHSA
GHSA-6qqj-rx4w-r3cj
CSRF Vulnerability in jquery-ujs
Versions 1.0.3 and earlier of jquery-ujs are vulnerable to an information leakage attack that may enable attackers to launch CSRF attacks, as it allows attackers to send CSRF tokens to external domains. When an attacker controls the href attribute of an anchor tag, or the action attribute of a form tag triggering a POST action, the attacker can set the href or action to " https://attacker.com". By prepending a space to the external domain, it causes jQuery to consider it a same origin request, resulting in the user's CSRF token being sent to the external domain. ## Recommendation Upgrade jquery-ujs to version 1.0.4 or later.
null
2021-09-23T19:45:14Z
2020-08-31T22:48:44Z
MODERATE
6.5
{'CWE-352'}
{'https://hackerone.com/reports/49935', 'https://www.npmjs.com/advisories/15', 'https://snyk.io/vuln/npm:jquery-ujs:20150624', 'https://groups.google.com/forum/#!msg/rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'https://github.com/advisories/GHSA-6qqj-rx4w-r3cj'}
null
GHSA
GHSA-qgfr-5hqp-vrw9
Path Traversal in decompress
Versions of `decompress` prior to 4.2.1 are vulnerable to Arbitrary File Write. The package fails to prevent extraction of files with relative paths, allowing attackers to write to any folder in the system by including filenames containing`../`. ## Recommendation Upgrade to version 4.2.1 or later.
{'CVE-2020-12265'}
2021-07-29T16:07:53Z
2020-09-03T21:16:27Z
CRITICAL
9.8
{'CWE-59', 'CWE-22'}
{'https://github.com/kevva/decompress/issues/71', 'https://www.npmjs.com/advisories/1217', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12265', 'https://github.com/advisories/GHSA-qgfr-5hqp-vrw9', 'https://github.com/kevva/decompress/pull/73'}
null
GHSA
GHSA-xp5j-wj4h-2jq9
Injection and Improper Input Validation in Apache Unomi
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
{'CVE-2020-13942'}
2022-02-10T00:30:54Z
2022-02-10T00:30:54Z
CRITICAL
9.8
{'CWE-74', 'CWE-20'}
{'https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E', 'https://lists.apache.org/thread.html/rcb6d2eafcf15def433aaddfa06738e5faa5060cef2647769e178999a@%3Cdev.unomi.apache.org%3E', 'http://unomi.apache.org./security/cve-2020-13942.txt', 'https://advisory.checkmarx.net/advisory/CX-2020-4284', 'https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cdev.unomi.apache.org%3E', 'https://lists.apache.org/thread.html/r4a8fa91836687eaca42b5420a778ca8c8fd3a3740e4cf4401acc9118@%3Cusers.unomi.apache.org%3E', 'https://github.com/advisories/GHSA-xp5j-wj4h-2jq9', 'http://www.openwall.com/lists/oss-security/2020/11/24/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13942', 'https://lists.apache.org/thread.html/rcb6d2eafcf15def433aaddfa06738e5faa5060cef2647769e178999a@%3Cusers.unomi.apache.org%3E', 'https://lists.apache.org/thread.html/r08a4057ff7196b8880117edaa4b6207cbd36ed692d8dd1f5a56b4d0f@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-5q5w-mf87-57x4
Downloads Resources over HTTP in sfml
Affected versions of `sfml` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10654'}
2021-01-08T19:48:41Z
2019-02-18T23:45:18Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/256', 'https://github.com/advisories/GHSA-5q5w-mf87-57x4', 'https://nodesecurity.io/advisories/256', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10654'}
null
GHSA
GHSA-p5xp-6vpf-jwvh
Improper Input Validation and Cross-Site Request Forgery in Keycloak
It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.
{'CVE-2019-10199'}
2021-10-29T22:01:59Z
2019-09-23T18:32:27Z
HIGH
8.8
{'CWE-352', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10199', 'https://github.com/advisories/GHSA-p5xp-6vpf-jwvh', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10199'}
null
GHSA
GHSA-g336-c7wv-8hp3
Cross-Site Scripting in swagger-ui
Affected versions of `swagger-ui` are vulnerable to cross-site scripting via the `url` query string parameter. ## Recommendation Update to 2.2.1 or later.
null
2021-09-23T21:35:43Z
2020-09-01T15:58:06Z
CRITICAL
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-g336-c7wv-8hp3', 'https://www.npmjs.com/advisories/137', 'https://github.com/swagger-api/swagger-ui/issues/1617'}
null
GHSA
GHSA-w3cg-6577-wx9f
Directory Traversal in cuciuci
Affected versions of `cuciuci` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16122'}
2021-01-14T15:49:57Z
2020-09-01T17:20:41Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/381', 'https://github.com/advisories/GHSA-w3cg-6577-wx9f', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cuciuci', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16122', 'https://www.npmjs.com/advisories/381'}
null
GHSA
GHSA-vx8v-g3p3-88vg
Weak password hash in LiveHelperChat
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
{'CVE-2022-1235'}
2022-04-19T18:01:54Z
2022-04-06T00:01:31Z
HIGH
7.5
{'CWE-916'}
{'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://github.com/advisories/GHSA-vx8v-g3p3-88vg', 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}
null
GHSA
GHSA-f58w-649r-qjr9
Moderate severity vulnerability that affects splunk-sdk
Splunk-SDK-Python before 1.6.6 does not properly verify untrusted TLS server certificates, which could result in man-in-the-middle attacks.
{'CVE-2019-5729'}
2021-09-09T21:39:33Z
2019-03-25T16:18:04Z
HIGH
8.1
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5729', 'https://github.com/advisories/GHSA-f58w-649r-qjr9', 'https://www.splunk.com/view/SP-CAAAQAD'}
null
GHSA
GHSA-m42h-mh85-4qgc
Moderate severity vulnerability that affects railties
# Possible Remote Code Execution Exploit in Rails Development Mode Impact ------ With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations. Workarounds ----------- This issue can be mitigated by specifying a secret key in development mode. In "config/environments/development.rb" add this: ``` config.secret_key_base = SecureRandom.hex(64) ``` Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to ooooooo_q
{'CVE-2019-5420'}
2021-11-04T17:09:22Z
2019-03-13T17:28:35Z
CRITICAL
9.8
{'CWE-330', 'CWE-77'}
{'http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw', 'https://github.com/advisories/GHSA-m42h-mh85-4qgc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5420', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/', 'https://www.exploit-db.com/exploits/46785/'}
null
GHSA
GHSA-5x8q-gj67-rhf2
Malicious Package in discord_debug_log
All versions of `discord_debug_log` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T21:23:25Z
2020-09-02T21:18:33Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/873', 'https://github.com/advisories/GHSA-5x8q-gj67-rhf2'}
null
GHSA
GHSA-25xj-89g5-fm6h
Information Disclosure in HashiCorp Vault
HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File.
{'CVE-2020-13223'}
2022-02-24T13:07:51Z
2021-05-18T18:21:09Z
HIGH
7.5
{'CWE-200', 'CWE-532'}
{'https://github.com/advisories/GHSA-25xj-89g5-fm6h', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020', 'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13223', 'https://www.hashicorp.com/blog/category/vault/'}
null
GHSA
GHSA-rc7p-gmvh-xfx2
Attack on Kubernetes via Misconfigured Argo Workflows
### Impact Users running using the Argo Server with `--auth-mode=server` (which is the default < v3.0.0) AND have exposed their UI to the Internet may allow remote users to execute arbitrary code on their cluster, e.g. crypto-mining. ### Resolution * Do not expose your user interface to the Internet. * Change configuration. `--auth-mode=client`. For users using an older 2.x version of Argo Server, consider upgrading to Argo Server version 3.x or later.
null
2021-08-02T17:19:52Z
2021-08-02T17:19:52Z
MODERATE
0
null
{'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-rc7p-gmvh-xfx2', 'https://www.intezer.com/blog/container-security/new-attacks-on-kubernetes-via-misconfigured-argo-workflows/', 'https://github.com/advisories/GHSA-rc7p-gmvh-xfx2'}
null
GHSA
GHSA-hrcp-8f3q-4w2c
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21351](https://x-stream.github.io/CVE-2021-21351.html). ### Credits wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21351'}
2022-04-19T19:02:49Z
2021-03-22T23:29:37Z
MODERATE
5.4
{'CWE-434', 'CWE-502'}
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://x-stream.github.io/CVE-2021-21351.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c', 'http://x-stream.github.io/changes.html#1.4.16', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21351', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://github.com/advisories/GHSA-hrcp-8f3q-4w2c', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-qx9m-27wh-7fjg
Downloads Resources over HTTP in jvminstall
Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10631'}
2021-01-08T01:58:17Z
2019-02-18T23:57:03Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10631', 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg', 'https://nodesecurity.io/advisories/225', 'https://www.npmjs.com/advisories/225'}
null
GHSA
GHSA-mg5h-9rhq-4cqx
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0937'}
2022-03-23T15:40:21Z
2022-03-15T00:01:02Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-mg5h-9rhq-4cqx', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3', 'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937'}
null
GHSA
GHSA-364w-9g92-3grq
Withdrawn: Laravel Framework does not sufficiently block the upload of executable PHP content.
# Withdrawn This advisory has been withdrawn after the maintainers of Laravel noted this issue is not a security vulnerability with Laravel itself, but rather a userland issue. ## Original CVE based description Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. In some use cases, this may be related to file-type validation for image upload (e.g., differences between getClientOriginalExtension and other approaches).
{'CVE-2021-43617'}
2021-11-19T14:43:07Z
2021-11-16T23:40:08Z
MODERATE
0
{'CWE-434'}
{'https://salsa.debian.org/php-team/php/-/commit/dc253886b5b2e9bc8d9e36db787abb083a667fd8', 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1331-L1333', 'https://github.com/advisories/GHSA-364w-9g92-3grq', 'https://salsa.debian.org/php-team/php/-/blob/dc253886b5b2e9bc8d9e36db787abb083a667fd8/debian/php-cgi.conf#L5-6', 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1130-L1132', 'https://hosein-vita.medium.com/laravel-8-x-image-upload-bypass-zero-day-852bd806019b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43617'}
null
GHSA
GHSA-4qrp-27r3-66fj
Improper sanitize of SVG files during content upload ('Cross-site Scripting') in sylius/sylius
### Impact There is a possibility to upload an SVG file containing XSS code in the admin panel. In order to perform an XSS attack, the file itself has to be opened in a new card (or loaded outside of the IMG tag). The problem applies both to the files opened on the admin panel and shop pages. ### Patches The issue is fixed in versions: 1.9.10, 1.10.11, 1.11.2, and above. ### Workarounds If there is a need to upload an SVG image type, on-upload sanitization has to be added. The way to achieve this is to require a library that will do the trick: ``` composer require enshrined/svg-sanitize ``` The second step is all about performing a file content sanitization before writing it to the filesystem. It can be done by overwriting the service: ```php <?php declare(strict_types=1); namespace App\Uploader; use enshrined\svgSanitize\Sanitizer; use Gaufrette\Filesystem; use Sylius\Component\Core\Generator\ImagePathGeneratorInterface; use Sylius\Component\Core\Generator\UploadedImagePathGenerator; use Sylius\Component\Core\Model\ImageInterface; use Sylius\Component\Core\Uploader\ImageUploaderInterface; use Symfony\Component\HttpFoundation\File\File; use Webmozart\Assert\Assert; final class ImageUploader implements ImageUploaderInterface { private const MIME_SVG_XML = 'image/svg+xml'; private const MIME_SVG = 'image/svg'; /** @var Filesystem */ protected $filesystem; /** @var ImagePathGeneratorInterface */ protected $imagePathGenerator; /** @var Sanitizer */ protected $sanitizer; public function __construct( Filesystem $filesystem, ?ImagePathGeneratorInterface $imagePathGenerator = null ) { $this->filesystem = $filesystem; if ($imagePathGenerator === null) { @trigger_error(sprintf( 'Not passing an $imagePathGenerator to %s constructor is deprecated since Sylius 1.6 and will be not possible in Sylius 2.0.', self::class ), \E_USER_DEPRECATED); } $this->imagePathGenerator = $imagePathGenerator ?? new UploadedImagePathGenerator(); $this->sanitizer = new Sanitizer(); } public function upload(ImageInterface $image): void { if (!$image->hasFile()) { return; } /** @var File $file */ $file = $image->getFile(); Assert::isInstanceOf($file, File::class); $fileContent = $this->sanitizeContent(file_get_contents($file->getPathname()), $file->getMimeType()); if (null !== $image->getPath() && $this->has($image->getPath())) { $this->remove($image->getPath()); } do { $path = $this->imagePathGenerator->generate($image); } while ($this->isAdBlockingProne($path) || $this->filesystem->has($path)); $image->setPath($path); $this->filesystem->write($image->getPath(), $fileContent); } public function remove(string $path): bool { if ($this->filesystem->has($path)) { return $this->filesystem->delete($path); } return false; } protected function sanitizeContent(string $fileContent, string $mimeType): string { if (self::MIME_SVG_XML === $mimeType || self::MIME_SVG === $mimeType) { $fileContent = $this->sanitizer->sanitize($fileContent); } return $fileContent; } private function has(string $path): bool { return $this->filesystem->has($path); } /** * Will return true if the path is prone to be blocked by ad blockers */ private function isAdBlockingProne(string $path): bool { return strpos($path, 'ad') !== false; } } ``` After that, register service in the container: ```yaml services: sylius.image_uploader: class: App\Uploader\ImageUploader arguments: - '@gaufrette.sylius_image_filesystem' - '@Sylius\Component\Core\Generator\ImagePathGeneratorInterface' ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at security@sylius.com
{'CVE-2022-24749'}
2022-04-04T21:38:48Z
2022-03-14T22:38:14Z
MODERATE
6.1
{'CWE-434', 'CWE-79', 'CWE-80'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24749', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj', 'https://github.com/Sylius/Sylius/releases/tag/v1.10.11', 'https://github.com/Sylius/Sylius/releases/tag/v1.9.10', 'https://github.com/advisories/GHSA-4qrp-27r3-66fj', 'https://github.com/Sylius/Sylius/releases/tag/v1.11.2'}
null
GHSA
GHSA-fmpq-w5q6-9vf9
Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
{'CVE-2019-0224'}
2021-06-10T23:43:18Z
2019-04-02T15:46:48Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E', 'https://github.com/advisories/GHSA-fmpq-w5q6-9vf9', 'https://lists.apache.org/thread.html/b4b4992a93d899050c1117a07c3c7fc9a175ec0672ab97065228de67@%3Cdev.jspwiki.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0224', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-0224', 'http://www.securityfocus.com/bid/107631', 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}
null
GHSA
GHSA-m2v2-8227-59f5
Exposure of sensitive information in concrete5/core
In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in "add / edit message”.
{'CVE-2021-22967'}
2021-11-24T19:01:00Z
2021-11-23T17:54:39Z
MODERATE
0
{'CWE-200', 'CWE-639'}
{'https://github.com/advisories/GHSA-m2v2-8227-59f5', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22967', 'https://hackerone.com/reports/869612'}
null
GHSA
GHSA-7vrm-3jc8-5wwm
Incorrect Comparison in Vyper
### Impact bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g. ```vyper b1: Bytes[32] = b"abcdef" b1 = slice(b1, 0, 1) b2: Bytes[32] = b"abcdef" t: bool = b1 == b2 # incorrectly evaluates to True ``` even without dirty nonzero bytes, because there is no comparison of the length, two bytestrings can compare to equal if one ends with `"\x00"`. ```vyper b1: Bytes[32] = b"abc\0" b2: Bytes[32] = b"abc" t: bool = b1 == b2 # incorrectly evaluates to True ``` ### Patches fixed in https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508
null
2022-04-06T17:39:51Z
2022-04-04T21:40:45Z
HIGH
7.5
{'CWE-697'}
{'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508', 'https://github.com/advisories/GHSA-7vrm-3jc8-5wwm', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}
null
GHSA
GHSA-pjxw-22xf-6pwc
Prototype Pollution in defaults-deep
All versions of `defaults-deep` are vulnerable to prototype pollution. Provided certain input `defaults-deep` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation As no patch is currently available for this vulnerability it is our recommendation to select another module that can provide this functionality.
{'CVE-2018-16486'}
2021-09-16T20:59:39Z
2019-02-07T18:16:38Z
MODERATE
0
{'CWE-400', 'CWE-345'}
{'https://hackerone.com/reports/380878', 'https://www.npmjs.com/advisories/778', 'https://github.com/advisories/GHSA-pjxw-22xf-6pwc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16486'}
null
GHSA
GHSA-j8qh-3xrq-c825
Division by zero in TFLite's implementation of `OneHot`
### Impact The implementation of the `OneHot` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72): ```cc int prefix_dim_size = 1; for (int i = 0; i < op_context.axis; ++i) { prefix_dim_size *= op_context.indices->dims->data[i]; } const int suffix_dim_size = NumElements(op_context.indices) / prefix_dim_size; ``` An attacker can craft a model such that at least one of the dimensions of `indices` would be 0. In turn, the `prefix_dim_size` value would become 0. ### Patches We have patched the issue in GitHub commit [3ebedd7e345453d68e279cfc3e4072648e5e12e5](https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29600'}
2021-05-21T14:28:04Z
2021-05-21T14:28:04Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-j8qh-3xrq-c825', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29600', 'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825'}
null
GHSA
GHSA-mxr5-p36v-479m
Moderate severity vulnerability that affects jquery-file-upload
Arbitrary file upload in jQuery Upload File <= 4.0.2
{'CVE-2018-9207'}
2021-09-15T21:05:49Z
2018-12-19T19:24:03Z
CRITICAL
9.8
{'CWE-434'}
{'https://github.com/advisories/GHSA-mxr5-p36v-479m', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9207', 'http://www.vapidlabs.com/advisory.php?v=206'}
null
GHSA
GHSA-hx7c-qpfq-xcrp
Cross-site Scripting in django-cms
Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
{'CVE-2021-44649'}
2022-01-21T13:25:20Z
2022-01-13T20:10:53Z
MODERATE
5.4
{'CWE-79'}
{'https://www.django-cms.org/en/blog/2020/07/22/django-cms-security-updates-1/', 'https://github.com/advisories/GHSA-hx7c-qpfq-xcrp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44649', 'https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/'}
null
GHSA
GHSA-3mqv-8gxg-pfm4
Cross-site scripting in twitter-server
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
{'CVE-2020-35774'}
2022-02-09T22:37:28Z
2022-02-09T22:37:28Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0', 'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/advisories/GHSA-3mqv-8gxg-pfm4'}
null
GHSA
GHSA-7rpc-9m88-cf9w
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
There is an OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier versions Vulnerability OS Command Injection Vulnerability. Countermeasures Update to the latest version of baserCMS Credits Akagi Yusuke @NTT-ME
{'CVE-2021-41243'}
2021-12-01T18:29:42Z
2021-12-01T18:29:42Z
CRITICAL
9.1
{'CWE-78'}
{'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff', 'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/advisories/GHSA-7rpc-9m88-cf9w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243'}
null
GHSA
GHSA-g4gm-pxh3-29fq
Unrestricted Uploads in Concrete5
Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value.
{'CVE-2020-14961'}
2022-02-10T22:28:41Z
2022-02-10T22:28:41Z
MODERATE
5.3
{'CWE-434'}
{'https://github.com/concrete5/concrete5/releases/tag/8.5.3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14961', 'https://github.com/concrete5/concrete5/pull/8651', 'https://github.com/advisories/GHSA-g4gm-pxh3-29fq'}
null
GHSA
GHSA-2r8f-2665-3gxq
Malicious Package in froever
All versions of `froever` contain malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:54:32Z
2020-09-02T21:36:36Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-2r8f-2665-3gxq', 'https://www.npmjs.com/advisories/904'}
null
GHSA
GHSA-f9xr-3m55-5q2v
Data races in cgc
An issue was discovered in the cgc crate through 2020-12-10 for Rust. Ptr implements Send and Sync for all types.
{'CVE-2020-36466'}
2021-08-25T20:56:14Z
2021-08-25T20:56:14Z
MODERATE
5.9
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0148.html', 'https://github.com/playXE/cgc/issues/5', 'https://github.com/advisories/GHSA-f9xr-3m55-5q2v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36466'}
null
GHSA
GHSA-fhv8-fx5f-7fxf
Prototype Pollution in the merge and clone helper methods
### Impact Using `merge` and `clone` helper methods in the `src/core/util.ts` module will have prototype pollution. It will affect the popular data visualization library Apache ECharts, which is using and exported these two methods directly. ### Patches It has been patched in https://github.com/ecomfe/zrender/pull/826. Users should update zrender to `5.2.1`. and update echarts to `5.2.1` if project is using echarts. ### References NA ### For more information NA
{'CVE-2021-39227'}
2022-04-19T19:03:09Z
2021-09-20T19:53:15Z
MODERATE
6.2
{'CWE-1321', 'CWE-915'}
{'https://github.com/ecomfe/zrender/releases/tag/5.2.1', 'https://github.com/ecomfe/zrender/pull/826', 'https://github.com/ecomfe/zrender/security/advisories/GHSA-fhv8-fx5f-7fxf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39227', 'https://github.com/advisories/GHSA-fhv8-fx5f-7fxf'}
null
GHSA
GHSA-24g6-5rx7-58wj
Missing Initialization of Resource in pnet
An issue was discovered in the pnet crate before 0.27.2 for Rust. There is a segmentation fault (upon attempted dereference of an uninitialized descriptor) because of an erroneous IcmpTransportChannelIterator compiler optimization.
{'CVE-2019-25054'}
2022-01-07T16:13:37Z
2022-01-06T22:18:07Z
HIGH
7.5
{'CWE-909'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0037.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/pnet/RUSTSEC-2019-0037.md', 'https://github.com/advisories/GHSA-24g6-5rx7-58wj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25054'}
null
GHSA
GHSA-2xpj-f5g2-8p7m
Access of Uninitialized Pointer
asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.
{'CVE-2020-17446'}
2021-04-20T16:30:51Z
2021-04-20T16:30:51Z
HIGH
9.8
{'CWE-824'}
{'https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17446', 'https://github.com/advisories/GHSA-2xpj-f5g2-8p7m', 'https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0'}
null
GHSA
GHSA-6pw2-5hjv-9pf7
Sandbox bypass in vm2
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
{'CVE-2021-23555'}
2022-02-24T13:46:57Z
2022-02-12T00:00:38Z
CRITICAL
9.8
{'CWE-1321', 'CWE-1265'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23555', 'https://snyk.io/vuln/SNYK-JS-VM2-2309905', 'https://github.com/advisories/GHSA-6pw2-5hjv-9pf7', 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}
null
GHSA
GHSA-24wf-7vf2-pv59
XXE vulnerability on Launch import with externally-defined DTD file
### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. ### Patches Fixed with: https://github.com/reportportal/service-api/pull/1392 ### Binaries `docker pull reportportal/service-api:5.4.0` https://github.com/reportportal/service-api/packages/846871?version=5.4.0 ### For more information If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
{'CVE-2021-29620'}
2021-06-28T16:38:29Z
2021-06-28T16:38:29Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29620'}
null
GHSA
GHSA-8w3j-g983-8jh5
Sensitive Data Exposure in parse-server
Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking. `ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses. ### For more information If you have any questions or comments about this advisory, Open an issue in the [parse-server](https://github.com/parse-community/parse-server) [Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md)
{'CVE-2019-1020013'}
2022-04-19T19:02:41Z
2019-07-11T14:23:09Z
MODERATE
5.3
{'CWE-209'}
{'https://www.npmjs.com/advisories/1114', 'https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002)#Description_of_the_Issue', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-8w3j-g983-8jh5', 'https://github.com/advisories/GHSA-8w3j-g983-8jh5', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637', 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013'}
null
GHSA
GHSA-chj8-5xgw-wcvj
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf
Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.
{'CVE-2016-8750'}
2021-09-09T18:04:46Z
2019-01-07T19:14:46Z
MODERATE
6.5
{'CWE-90'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8750', 'https://access.redhat.com/errata/RHSA-2018:1322', 'https://karaf.apache.org/security/cve-2016-8750.txt', 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj', 'http://www.securityfocus.com/bid/103098'}
null
GHSA
GHSA-9mrv-456v-pf22
Cross-site Scripting in vis-timeline
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
{'CVE-2020-28487'}
2021-04-13T15:19:50Z
2021-04-13T15:19:50Z
MODERATE
6.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28487', 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500', 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f', 'https://github.com/visjs/vis-timeline/issues/838', 'https://github.com/advisories/GHSA-9mrv-456v-pf22', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502', 'https://github.com/visjs/vis-timeline/pull/840', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501'}
null
GHSA
GHSA-cxrj-66c5-9fmh
Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
{'CVE-2018-1258'}
2022-04-27T15:07:47Z
2018-10-17T20:05:49Z
HIGH
8.8
{'CWE-863'}
{'https://access.redhat.com/errata/RHSA-2019:2413', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.securitytracker.com/id/1041888', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://pivotal.io/security/cve-2018-1258', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://github.com/advisories/GHSA-cxrj-66c5-9fmh', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1041896', 'http://www.securityfocus.com/bid/104222', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1258'}
null
GHSA
GHSA-29q4-gxjq-rx5c
Remote Code Execution in SCIMono
### Impact It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system. ### Patches The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19)
{'CVE-2021-21479'}
2021-11-02T16:11:14Z
2021-02-10T02:31:53Z
HIGH
0
{'CWE-690', 'CWE-59', 'CWE-74', 'CWE-917', 'CWE-62', 'CWE-77'}
{'https://github.com/advisories/GHSA-29q4-gxjq-rx5c', 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80', 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19'}
null